epare+0x27b/0x3f0 [ 563.350854] do_syscall_64+0x3f/0x90 [ 563.351392] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 563.352092] RIP: 0033:0x7f7756c3269c [ 563.352601] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 563.354907] RSP: 002b:00007f77541f5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 563.355911] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f7756c3269c [ 563.356857] RDX: 000000000000000f RSI: 00007f77541f51e0 RDI: 0000000000000003 [ 563.357816] RBP: 00007f77541f51d0 R08: 0000000000000000 R09: 0000000020000000 [ 563.358774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 563.359730] R13: 00007ffc011ab87f R14: 00007f77541f5300 R15: 0000000000022000 [ 563.360723] 06:28:40 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000400)) [ 563.474639] loop3: detected capacity change from 0 to 10 06:28:51 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000400)) 06:28:51 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:28:51 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 3) 06:28:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@utf8}, {@overriderock}]}) 06:28:51 executing program 7: r0 = openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x100}, 0x18) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) getdents(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="8c2b00000308050000000000000000000c0000040900010073797a300000000005000300210000000900010073796d3100000000c142ba2933f4660a293d8d7bc5ba7df0066aa9d3bfddb57c9e548707bc8555ffc021fbc78897cf03701dc73d3f408402e426535adcdb7e88683736339f599a20abd60af74e0283406d90bab9837bde0340c7869bd53d6176817e408a8848f3db711e5102d26972c07509970725b379282f3f3ce939e4d62581326a0db00add90b91dc81cb1ab"], 0x34}, 0x1, 0x0, 0x0, 0x40050}, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x50, r0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x8010, r0, 0x10000000) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0xc3d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x61) 06:28:51 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = gettid() setpriority(0x0, r1, 0x88) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0xfa, 0x1, 0x9, 0x0, 0x0, 0x1000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x7, 0x4}, 0x210, 0xfffffffffffffff7, 0x9, 0x7, 0x10a4, 0x1f, 0x0, 0x0, 0x6, 0x0, 0x6}, r1, 0x3, r0, 0x8) socket$inet6(0xa, 0x1, 0x7) unshare(0x8000000) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1400}], 0x1, 0x0) unshare(0x48040080) r2 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000240)=[0x1000]) semop(r2, &(0x7f00000000c0)=[{}], 0x1) semop(r2, &(0x7f0000000000)=[{}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$SETVAL(r2, 0x1, 0x10, &(0x7f0000000180)=0xfffffff9) 06:28:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:28:51 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000400)) [ 574.665707] No source specified [ 574.668328] syz-executor.2: attempt to access beyond end of device [ 574.668328] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 574.669241] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 574.678542] FAULT_INJECTION: forcing a failure. [ 574.678542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.679341] CPU: 1 PID: 6183 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 574.679875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 574.680394] Call Trace: [ 574.680566] [ 574.680720] dump_stack_lvl+0xc1/0xf0 [ 574.680989] should_fail_ex+0x4b4/0x5b0 [ 574.681265] _copy_from_user+0x30/0xf0 [ 574.681534] __do_sys_memfd_create+0x2ca/0xa20 [ 574.681848] ? fput+0x2f/0x1a0 [ 574.682072] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 574.682401] ? ksys_write+0x19e/0x250 [ 574.682653] ? __pfx_ksys_write+0x10/0x10 [ 574.682926] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 574.683283] do_syscall_64+0x3f/0x90 [ 574.683549] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 574.683892] RIP: 0033:0x7fa185d39b19 [ 574.684144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.685280] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 574.685772] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 574.686221] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 574.686666] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 574.687111] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 574.687554] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 574.688024] [ 574.702145] syz-executor.4: attempt to access beyond end of device [ 574.702145] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 06:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:28:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 574.714020] FAT-fs (loop4): unable to read boot sector 06:28:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 4) [ 574.779812] syz-executor.2: attempt to access beyond end of device [ 574.779812] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 574.779842] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 574.810545] No source specified [ 574.821115] No source specified [ 574.890957] FAULT_INJECTION: forcing a failure. [ 574.890957] name failslab, interval 1, probability 0, space 0, times 0 [ 574.890999] CPU: 0 PID: 6204 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 574.891032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 574.891048] Call Trace: [ 574.891056] [ 574.891067] dump_stack_lvl+0xc1/0xf0 [ 574.891122] should_fail_ex+0x4b4/0x5b0 [ 574.891163] should_failslab+0x9/0x20 [ 574.891194] kmem_cache_alloc_lru+0x7a/0x680 [ 574.891231] ? find_held_lock+0x2c/0x110 [ 574.891277] ? shmem_alloc_inode+0x27/0x50 [ 574.891309] ? alloc_fd+0x2eb/0x760 [ 574.891358] ? shmem_alloc_inode+0x27/0x50 [ 574.891389] shmem_alloc_inode+0x27/0x50 [ 574.891419] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 574.891450] alloc_inode+0x63/0x240 [ 574.891479] new_inode+0x25/0x1f0 [ 574.891511] shmem_get_inode+0x183/0xe00 [ 574.891543] ? do_raw_spin_unlock+0x53/0x220 [ 574.891595] __shmem_file_setup+0x171/0x300 [ 574.891637] __do_sys_memfd_create+0x385/0xa20 [ 574.891667] ? fput+0x2f/0x1a0 [ 574.891710] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 574.891739] ? ksys_write+0x19e/0x250 [ 574.891769] ? __pfx_ksys_write+0x10/0x10 [ 574.891805] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 574.891849] do_syscall_64+0x3f/0x90 [ 574.891896] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 574.891927] RIP: 0033:0x7fa185d39b19 [ 574.891948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.891977] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 574.892017] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 574.892038] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 574.892057] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 574.892077] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 574.892096] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 574.892140] [ 575.331875] loop3: detected capacity change from 0 to 10 06:29:03 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x2a501) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getpeername$inet(r2, &(0x7f0000000080)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="a6b929bd7000fddbdf25050000000c0072ad7c2a1dd65b94c50180060002002f000000"], 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x4044001) signalfd(r1, &(0x7f0000000040)={[0x3]}, 0x8) getdents(r0, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f00000001c0)=0x2) 06:29:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:03 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r4, 0x8004f50e, &(0x7f0000000400)) 06:29:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000480) unshare(0x66020800) r1 = gettid() setpriority(0x0, r1, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000004180)=0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r4, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r5 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x0) r6 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r5, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r9, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r7}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r8}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r9}}]}}) lstat(&(0x7f00000041c0)='./file0\x00', &(0x7f0000004200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004400)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4000000}, 0xc, &(0x7f00000003c0)=[{&(0x7f0000000140)={0x218, 0x1e, 0x20, 0x70bd28, 0x25dfdbfd, "", [@typed={0x8, 0x46, 0x0, 0x0, @pid}, @nested={0x7c, 0xe, 0x0, 0x1, [@typed={0x63, 0x63, 0x0, 0x0, @binary="75527fc84a9fb93185eb2966f647f0ea379b80fb0107ac61f3926404a3a131a7c7bb8364464319f4a07aeb78cfd63092d30b85e814d6d0cd911a348977772427f753cce59e6f31aeb32e242adf87f7b4955633a66a2ed493ea0165735eff5c"}, @typed={0x8, 0x58, 0x0, 0x0, @uid=0xee01}, @typed={0xc, 0x74, 0x0, 0x0, @u64=0x4}]}, @typed={0x8, 0x1, 0x0, 0x0, @uid}, @generic="217e8b9a3f7a1c4ba3f710280e1fcdc91a4e495231cb9a08e7084d0f2528e5b5dbdc703d1e5d3d14df507878e8c02935751e319fde6fe6b2c88129293a22fe7c5afa5a31a3de8e3f772ba94950e9f418540a0b3fa00eeeaa4dc1f7c5fbd62760fbd496ce011db79c01513106e4c76ab898160cbbae80d76008f61c8b7857670f3e2103cf43d7f86c93a02f3d98535a2903f1a72b3150e0d84bcbe8b2", @generic="8e3114c9806ed455650d63926e4f40353aebc8bb11b4688f1a251cff3fcacf197d38ebd99715a5b19d5bc76fc5ef42589fcb171a91af21a2623cef26edcfa8a643fcba1a24dd4bb11c9834b8560e4109a9f9b64d5e7895c4bc3e30bbe8302c2a1714f2ed4c0ff7f455498008ce76a1ed1685c11845be5b4764d1a40e61e1e4e02284c8baae6f2204a4e0", @nested={0x51, 0x76, 0x0, 0x1, [@generic="6322c84436123a09406154918de620338a385423111b5ed21a7bf8dda787c998db0327aa69d35c44957f5ad82f9b6eadb3cc5330de5bc61298e56ee30887003b5170b0a233187866c2971c1837"]}]}, 0x218}, {&(0x7f0000000380)={0x14, 0x1d, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x4, 0x2c}]}, 0x14}], 0x2, &(0x7f0000004280)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r1, r7, r10}}}], 0x158, 0x404c008}, 0x20000000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8, 0x8, 0x5, 0x81, 0x0, 0x9, 0x51000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x1, 0x4}, 0x2, 0x81, 0xfff, 0x1, 0x7fffffff, 0x9, 0x7ff, 0x0, 0xbdf, 0x0, 0x9}, r1, 0x3, r0, 0x8) 06:29:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 5) 06:29:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 1) 06:29:03 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=@updpolicy={0x1d4, 0x19, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, [@sec_ctx={0xc4, 0x8, {0xc0, 0x8, 0x0, 0x0, 0xb8, "bc85d1777040a193d70bafc22547f69c2ed2675f6f5b2689a5e0037c296cd05f76ccc700df0d1cc1c76ad57ac2ef15e6e8ff62363b9bce8ea1df5854f8bdf7642ada2f596425623b95a6361ed924801fd750802fca3cab63d8e8532ee3f583bacab697855c80a86b68ba7ad283fe6b6f33ba51c8a22067602dd7dac2925f88ee2306f05185a6bf7300a6d20b5d10ca8adc7d2e152b2f1bfd3077843d372a49b45883a4393c08369ba4e89bc5147f94be260fdb74ac008f2e"}}, @extra_flags={0x8}, @sec_ctx={0x39, 0x8, {0x35, 0x8, 0x0, 0x0, 0x18, "2ab32000cdc64aefe6772c1173e920d57654f2f6ec7a14596f22bfc355e2972ab112ea425326f0a99f21c6702f"}}, @lastused={0xc}, @extra_flags={0x8}]}, 0x1d4}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=@report={0xf0, 0x20, 0x1, 0x70bd25, 0x25dfdbff, {0x62, {@in=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e23, 0x800, 0x4e20, 0x6, 0xa, 0xa0, 0x0, 0x32, 0x0, 0xee01}}, [@algo_aead={0x95, 0x12, {{'rfc4106-gcm-aesni\x00'}, 0x248, 0x40, "76350a11dd8c89a28ca5072f9e361b8ca0948ce258898d3760e304354d05019352bff1135568305ddc862596c83bc4bbd82dec4a90a2d46e107b4021a2764412ec690858176104c714"}}, @policy_type={0xa}]}, 0xf0}, 0x1, 0x0, 0x0, 0x8000}, 0x20000840) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@mcast1}, 0x14) [ 586.592506] No source specified 06:29:03 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 586.604391] No source specified [ 586.613226] syz-executor.6: attempt to access beyond end of device [ 586.613226] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 586.616607] loop3: detected capacity change from 0 to 10 [ 586.627134] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:29:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 586.643879] FAULT_INJECTION: forcing a failure. [ 586.643879] name failslab, interval 1, probability 0, space 0, times 0 [ 586.645656] CPU: 1 PID: 6232 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 586.646819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 586.648014] Call Trace: [ 586.648425] [ 586.648763] dump_stack_lvl+0xc1/0xf0 [ 586.649354] should_fail_ex+0x4b4/0x5b0 [ 586.649951] ? __do_sys_memfd_create+0x17d/0xa20 [ 586.650643] should_failslab+0x9/0x20 [ 586.651232] __kmem_cache_alloc_node+0x66/0x310 [ 586.651937] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 586.652743] ? __do_sys_memfd_create+0x17d/0xa20 [ 586.653477] ? __do_sys_memfd_create+0x17d/0xa20 [ 586.654196] __kmalloc+0x4a/0x160 [ 586.654758] __do_sys_memfd_create+0x17d/0xa20 [ 586.655460] ? fput+0x2f/0x1a0 [ 586.655972] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 586.656766] ? ksys_write+0x19e/0x250 [ 586.657359] ? __pfx_ksys_write+0x10/0x10 [ 586.657979] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 586.658777] do_syscall_64+0x3f/0x90 [ 586.659350] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 586.660138] RIP: 0033:0x7f7ed559bb19 [ 586.660710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.663292] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 586.664426] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 586.665437] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 586.666484] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 586.667498] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 586.668528] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 586.668943] syz-executor.4: attempt to access beyond end of device [ 586.668943] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 586.669566] [ 586.670400] FAT-fs (loop4): unable to read boot sector [ 586.723857] No source specified [ 586.724626] No source specified 06:29:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 6) 06:29:04 executing program 1: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') bind$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x4, 0x800) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x94) clone3(&(0x7f0000000600)={0x800, 0x0, &(0x7f00000003c0), &(0x7f0000000400), {}, &(0x7f0000000440)=""/66, 0x42, &(0x7f00000004c0), 0x0}, 0x58) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000000)) 06:29:04 executing program 7: r0 = getpgid(0x0) getpgrp(r0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='fdinfo\x00') getdents(r2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r3) r4 = gettid() setpriority(0x0, r4, 0x88) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x8, 0x5b, 0xee, 0x0, 0x81, 0xc02c0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000080)}, 0x1048, 0xc39, 0x6, 0x3, 0x53f, 0x4, 0x1ff, 0x0, 0x1f, 0x0, 0x401}, r4, 0xffffffffffffffff, r2, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='children\x00') [ 586.778847] FAULT_INJECTION: forcing a failure. [ 586.778847] name failslab, interval 1, probability 0, space 0, times 0 [ 586.780599] CPU: 1 PID: 6244 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 586.781630] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 586.782692] Call Trace: [ 586.783049] [ 586.783364] dump_stack_lvl+0xc1/0xf0 [ 586.783905] should_fail_ex+0x4b4/0x5b0 [ 586.784477] ? security_inode_alloc+0x38/0x160 [ 586.785109] should_failslab+0x9/0x20 [ 586.785632] kmem_cache_alloc+0x61/0x390 [ 586.786198] security_inode_alloc+0x38/0x160 [ 586.786807] inode_init_always+0xbb2/0xea0 [ 586.787390] alloc_inode+0x84/0x240 [ 586.787883] new_inode+0x25/0x1f0 [ 586.788377] shmem_get_inode+0x183/0xe00 [ 586.789057] ? do_raw_spin_unlock+0x53/0x220 [ 586.789673] __shmem_file_setup+0x171/0x300 [ 586.790411] __do_sys_memfd_create+0x385/0xa20 [ 586.791025] ? fput+0x2f/0x1a0 [ 586.791593] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 586.792279] ? ksys_write+0x19e/0x250 [ 586.792788] ? __pfx_ksys_write+0x10/0x10 [ 586.793489] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 586.794198] do_syscall_64+0x3f/0x90 [ 586.794852] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 586.795526] RIP: 0033:0x7fa185d39b19 [ 586.796139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 586.798425] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 586.799395] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 586.800349] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 586.801268] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 586.802171] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 586.803080] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 586.804016] 06:29:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 2) 06:29:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 586.878962] syz-executor.2: attempt to access beyond end of device [ 586.878962] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 06:29:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 7) [ 586.890465] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 586.909705] No source specified [ 586.922246] No source specified 06:29:04 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = clone3(&(0x7f0000000400)={0x41000, &(0x7f0000000100)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), {0x39}, &(0x7f00000001c0)=""/202, 0xca, &(0x7f00000002c0)=""/227, &(0x7f00000003c0)=[0xffffffffffffffff, 0x0], 0x2, {r0}}, 0x58) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x7, 0x1, 0x7, 0x0, 0x0, 0xfff, 0x4a812, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x1200, 0x0, 0x5, 0x3, 0x7f, 0x450, 0x80, 0x0, 0x3f, 0x0, 0xffffffff8f4d57a1}, r1, 0x1, r0, 0x3) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480), 0x400082, 0x0) pread64(r3, &(0x7f00000004c0)=""/47, 0x2f, 0x8000000000000000) 06:29:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 3) [ 586.990551] syz-executor.6: attempt to access beyond end of device [ 586.990551] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 587.000847] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 587.055505] FAULT_INJECTION: forcing a failure. [ 587.055505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.056384] CPU: 0 PID: 6262 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 587.056981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 587.057581] Call Trace: [ 587.057758] [ 587.057921] dump_stack_lvl+0xc1/0xf0 [ 587.058212] should_fail_ex+0x4b4/0x5b0 [ 587.058495] _copy_from_user+0x30/0xf0 [ 587.058769] __do_sys_memfd_create+0x2ca/0xa20 [ 587.059086] ? fput+0x2f/0x1a0 [ 587.059320] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 587.059676] ? ksys_write+0x19e/0x250 [ 587.059950] ? __pfx_ksys_write+0x10/0x10 [ 587.060262] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 587.060637] do_syscall_64+0x3f/0x90 [ 587.060908] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 587.061272] RIP: 0033:0x7f7ed559bb19 [ 587.061535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 587.062725] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 587.063229] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 587.063713] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 587.064201] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 587.064687] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 587.065164] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 587.065663] 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:18 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 8) [ 600.780240] No source specified [ 600.781641] FAULT_INJECTION: forcing a failure. [ 600.781641] name failslab, interval 1, probability 0, space 0, times 0 [ 600.782454] CPU: 1 PID: 6280 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 600.783004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 600.783543] Call Trace: [ 600.783729] [ 600.783889] dump_stack_lvl+0xc1/0xf0 [ 600.784165] should_fail_ex+0x4b4/0x5b0 [ 600.784451] should_failslab+0x9/0x20 [ 600.784715] kmem_cache_alloc_lru+0x7a/0x680 [ 600.785018] ? find_held_lock+0x2c/0x110 [ 600.785301] ? shmem_alloc_inode+0x27/0x50 [ 600.785588] ? alloc_fd+0x2eb/0x760 [ 600.785852] ? shmem_alloc_inode+0x27/0x50 [ 600.786145] shmem_alloc_inode+0x27/0x50 [ 600.786419] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 600.786747] alloc_inode+0x63/0x240 [ 600.786998] new_inode+0x25/0x1f0 [ 600.787239] shmem_get_inode+0x183/0xe00 [ 600.787515] ? do_raw_spin_unlock+0x53/0x220 [ 600.787827] __shmem_file_setup+0x171/0x300 [ 600.788123] __do_sys_memfd_create+0x385/0xa20 [ 600.788456] ? fput+0x2f/0x1a0 [ 600.788684] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 600.789028] ? ksys_write+0x19e/0x250 [ 600.789287] ? __pfx_ksys_write+0x10/0x10 [ 600.789569] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 600.789926] do_syscall_64+0x3f/0x90 [ 600.790191] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 600.790536] RIP: 0033:0x7f7ed559bb19 [ 600.790789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.792005] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 600.792531] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 600.793024] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 600.793512] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 600.794001] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 600.794482] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 600.794975] [ 600.799561] No source specified 06:29:18 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:29:18 executing program 0: openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r2, r2, 0x77, 0x0) fsetxattr(r2, &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f0000000080)=']##\x00', 0x4, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 4) 06:29:18 executing program 7: r0 = fork() r1 = gettid() ptrace$setopts(0x4200, r0, 0x1, 0x8) r2 = getpgid(r0) setpriority(0x0, r1, 0x88) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='cmdline\x00') getdents(r3, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) setpriority(0x0, 0x0, 0x88) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) clone3(&(0x7f0000000280)={0x200004800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f0000000100)=""/1, 0x1, &(0x7f0000000140)=""/29, &(0x7f0000000240)=[r2, r0, 0xffffffffffffffff, r4, 0x0, r5, r0, r0, r0], 0x9, {r3}}, 0x58) 06:29:18 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r4, 0x8004f50e, &(0x7f0000000400)) 06:29:18 executing program 1: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') bind$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x4, 0x800) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x94) clone3(&(0x7f0000000600)={0x800, 0x0, &(0x7f00000003c0), &(0x7f0000000400), {}, &(0x7f0000000440)=""/66, 0x42, &(0x7f00000004c0), 0x0}, 0x58) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000000)) [ 600.823325] FAULT_INJECTION: forcing a failure. [ 600.823325] name failslab, interval 1, probability 0, space 0, times 0 [ 600.824183] CPU: 1 PID: 6285 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 600.824757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 600.825317] Call Trace: [ 600.825497] [ 600.825662] dump_stack_lvl+0xc1/0xf0 [ 600.825952] should_fail_ex+0x4b4/0x5b0 [ 600.826244] should_failslab+0x9/0x20 [ 600.826518] kmem_cache_alloc_lru+0x7a/0x680 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 600.826833] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 600.827373] ? __d_alloc+0x31/0x9c0 [ 600.827652] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 600.828026] ? __d_alloc+0x31/0x9c0 [ 600.828282] __d_alloc+0x31/0x9c0 [ 600.828540] ? get_random_u32+0x3b2/0x670 [ 600.828842] d_alloc_pseudo+0x1d/0x70 [ 600.829121] alloc_file_pseudo+0xd2/0x260 [ 600.829423] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 600.829765] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 600.830161] ? shmem_get_inode+0x6a6/0xe00 [ 600.830460] ? do_raw_spin_unlock+0x53/0x220 [ 600.830787] __shmem_file_setup+0x202/0x300 [ 600.831094] __do_sys_memfd_create+0x385/0xa20 [ 600.831415] ? fput+0x2f/0x1a0 [ 600.831656] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 600.832007] ? ksys_write+0x19e/0x250 [ 600.832281] ? __pfx_ksys_write+0x10/0x10 [ 600.832585] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 600.832964] do_syscall_64+0x3f/0x90 [ 600.833241] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 600.833599] RIP: 0033:0x7fa185d39b19 [ 600.833863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.835087] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 600.835601] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 600.836090] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 600.836593] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 600.837074] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 600.837562] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 600.838060] [ 600.847748] syz-executor.4: attempt to access beyond end of device [ 600.847748] loop4: rw=0, sector=0, nr_sectors = 1 limit=0 [ 600.854029] FAT-fs (loop4): unable to read boot sector [ 600.864527] No source specified [ 600.866465] No source specified 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 5) 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 600.911181] loop3: detected capacity change from 0 to 10 [ 600.923253] SELinux: Context ]## is not valid (left unmapped). [ 600.924857] audit: type=1400 audit(1689229758.253:14): avc: denied { associate } for pid=6284 comm="syz-executor.0" name="ptmx" dev="devtmpfs" ino=94 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 srawcon="]##" 06:29:18 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r1 = syz_open_procfs(r0, &(0x7f0000000080)='map_files\x00') getdents(r1, 0x0, 0x0) [ 600.994831] syz-executor.2: attempt to access beyond end of device [ 600.994831] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 600.995701] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 600.997279] No source specified [ 600.998846] No source specified [ 601.062536] FAULT_INJECTION: forcing a failure. [ 601.062536] name failslab, interval 1, probability 0, space 0, times 0 [ 601.063381] CPU: 1 PID: 6304 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 601.063914] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.064462] Call Trace: 06:29:18 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 9) 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 6) 06:29:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) [ 601.064649] [ 601.064990] dump_stack_lvl+0xc1/0xf0 [ 601.065276] should_fail_ex+0x4b4/0x5b0 [ 601.065560] ? security_inode_alloc+0x38/0x160 [ 601.065879] should_failslab+0x9/0x20 [ 601.066141] kmem_cache_alloc+0x61/0x390 [ 601.066426] security_inode_alloc+0x38/0x160 [ 601.066735] inode_init_always+0xbb2/0xea0 [ 601.067038] alloc_inode+0x84/0x240 [ 601.067294] new_inode+0x25/0x1f0 [ 601.067543] shmem_get_inode+0x183/0xe00 [ 601.067834] ? do_raw_spin_unlock+0x53/0x220 [ 601.068153] __shmem_file_setup+0x171/0x300 [ 601.068473] __do_sys_memfd_create+0x385/0xa20 [ 601.068789] ? fput+0x2f/0x1a0 [ 601.069031] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 601.069372] ? ksys_write+0x19e/0x250 [ 601.069633] ? __pfx_ksys_write+0x10/0x10 [ 601.069922] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 601.070281] do_syscall_64+0x3f/0x90 [ 601.070558] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 601.070916] RIP: 0033:0x7f7ed559bb19 [ 601.071167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.072344] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 601.072846] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 601.073316] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 601.073796] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 601.074417] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 601.074988] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 601.075535] 06:29:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ptrace(0x8418, r1) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, r2) r4 = pidfd_getfd(r3, r0, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000240), &(0x7f0000000300)=0x2) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x801, 0x0) r6 = openat(r5, &(0x7f0000000200)='./file1\x00', 0x101042, 0x12d) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000440)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) ptrace$cont(0x9, r8, 0x6, 0x1) r9 = open_tree(r6, &(0x7f00000001c0)='./file1\x00', 0x81900) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x0, 0x6, 0x20, 0x0, 0x6, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb028, 0x4, @perf_config_ext={0x7, 0xaf}, 0x0, 0x7, 0x6, 0x8, 0x8000, 0x68bf, 0xd, 0x0, 0x2, 0x0, 0x200}, r7, 0x9, r9, 0x8) write(r6, &(0x7f0000000080)="01", 0x292e9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIGETBSZ(r10, 0x2, &(0x7f0000000000)) 06:29:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 7) [ 601.131412] No source specified [ 601.133433] No source specified [ 601.146875] syz-executor.6: attempt to access beyond end of device [ 601.146875] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 601.153917] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 601.193131] syz-executor.2: attempt to access beyond end of device [ 601.193131] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 601.197740] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:29:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 10) 06:29:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 8) 06:29:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/image_size', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100), 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = gettid() setpriority(0x0, r1, 0x88) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x8, 0x0, 0x40, 0x3, 0x0, 0x100, 0x10000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1302, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x4000, 0x38, 0x0, 0xe, 0x81, 0x20, 0x0, 0x0, 0x2, 0x0, 0x2}, r1, 0xc, 0xffffffffffffffff, 0x0) 06:29:29 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32=0x0, @ANYBLOB='./fileD\x00']) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r1}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r3}}]}}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r5, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r6 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x0) r7 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r6, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r10, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r8}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r9}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r10}}]}}) setresuid(0x0, r3, r10) r11 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r11, 0x0, 0x0) 06:29:29 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r4, 0x8004f50e, &(0x7f0000000400)) 06:29:29 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x4}, 0x4) setresuid(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+10000}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000080)={r7, 0x1, 0x6, @broadcast}, 0x10) bind$packet(r1, &(0x7f0000000240)={0x11, 0xd, r7, 0x1, 0x1, 0x6, @broadcast}, 0x14) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 612.490650] FAULT_INJECTION: forcing a failure. [ 612.490650] name failslab, interval 1, probability 0, space 0, times 0 [ 612.491412] CPU: 1 PID: 6334 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 612.491905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 612.492398] Call Trace: [ 612.492583] [ 612.492733] dump_stack_lvl+0xc1/0xf0 [ 612.492992] should_fail_ex+0x4b4/0x5b0 [ 612.493251] should_failslab+0x9/0x20 [ 612.493495] kmem_cache_alloc_lru+0x7a/0x680 [ 612.493778] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 612.494112] ? __d_alloc+0x31/0x9c0 [ 612.494346] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 612.494674] ? __d_alloc+0x31/0x9c0 [ 612.494907] __d_alloc+0x31/0x9c0 [ 612.495132] ? get_random_u32+0x3b2/0x670 [ 612.495403] d_alloc_pseudo+0x1d/0x70 [ 612.495651] alloc_file_pseudo+0xd2/0x260 [ 612.495924] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 612.496229] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 612.496595] ? shmem_get_inode+0x6a6/0xe00 [ 612.496872] ? do_raw_spin_unlock+0x53/0x220 [ 612.497171] __shmem_file_setup+0x202/0x300 [ 612.497449] __do_sys_memfd_create+0x385/0xa20 [ 612.497741] ? fput+0x2f/0x1a0 [ 612.497957] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 612.498277] ? ksys_write+0x19e/0x250 [ 612.498519] ? __pfx_ksys_write+0x10/0x10 [ 612.498782] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 612.499115] do_syscall_64+0x3f/0x90 [ 612.499363] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 612.499684] RIP: 0033:0x7f7ed559bb19 [ 612.499918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.500997] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 612.501467] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 612.501902] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 612.502338] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 612.502770] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 612.503200] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 612.503647] [ 612.504424] FAULT_INJECTION: forcing a failure. [ 612.504424] name failslab, interval 1, probability 0, space 0, times 0 [ 612.505186] CPU: 1 PID: 6335 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 612.505681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 612.506178] Call Trace: [ 612.506344] [ 612.506502] dump_stack_lvl+0xc1/0xf0 [ 612.506758] should_fail_ex+0x4b4/0x5b0 [ 612.507018] ? alloc_empty_file+0x76/0x1e0 [ 612.507299] should_failslab+0x9/0x20 [ 612.507545] kmem_cache_alloc+0x61/0x390 06:29:29 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 612.507808] ? __pfx_lock_release+0x10/0x10 [ 612.508231] alloc_empty_file+0x76/0x1e0 [ 612.508568] alloc_file+0x5e/0x800 [ 612.508812] alloc_file_pseudo+0x16e/0x260 [ 612.509082] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 612.509388] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 612.509749] ? do_raw_spin_unlock+0x53/0x220 [ 612.510043] __shmem_file_setup+0x202/0x300 [ 612.510323] __do_sys_memfd_create+0x385/0xa20 [ 612.510615] ? fput+0x2f/0x1a0 [ 612.510649] No source specified [ 612.510826] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 612.510844] ? ksys_write+0x19e/0x250 [ 612.510860] ? __pfx_ksys_write+0x10/0x10 [ 612.510879] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 612.512470] do_syscall_64+0x3f/0x90 [ 612.512722] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 612.513045] RIP: 0033:0x7fa185d39b19 [ 612.513283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.514370] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 612.514900] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 612.515341] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 612.515775] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 612.516215] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 612.516659] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 612.517145] [ 612.525569] No source specified [ 612.531555] syz_tun: entered promiscuous mode 06:29:29 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setreuid(0x0, 0xee01) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioprio_set$uid(0x0, 0xffffffffffffffff, 0x2004) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000c00)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000000)={0x20, 0x15, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000804}, 0x44045) 06:29:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 9) 06:29:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 11) 06:29:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 612.664299] syz-executor.2: attempt to access beyond end of device [ 612.664299] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 612.665118] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 612.673192] loop3: detected capacity change from 0 to 10 06:29:30 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x160, r0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_SOPASS={0xee, 0x3, "037d726242f039842dec758adca5d7a0b69cbdf18743f451b65c353a090128cf3148623dc2c4a630c1eddc4146dbc5ca0de6a8905b81f8138822207a35c771d1953bf27ccbad0737a474e0eeba6a6afe95753e63e046a7eebbb1840c5ece2099cb8ca47bc6d5b4e363a3cccc7508913e0926d2dbafa3b89e75226428589c832ec462fd8255a867b806c854a56e5d291e138815fbd756b21a83c84c03d096e852126427d16c5fa2c084a94aa0ed419280e4f72b0a08bf1ef2cd5e22392ebeab6734e088d371341881465ea2d55fe8795b48d297e11a17275293ea15446594926b8f3486236baa86a9f2d1"}, @ETHTOOL_A_WOL_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x24004804}, 0x40000) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x10) 06:29:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 10) [ 612.731466] No source specified [ 612.739808] No source specified 06:29:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 612.795068] syz-executor.6: attempt to access beyond end of device [ 612.795068] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 612.798719] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 612.820071] FAULT_INJECTION: forcing a failure. [ 612.820071] name failslab, interval 1, probability 0, space 0, times 0 [ 612.821714] CPU: 0 PID: 6366 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 612.822923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 612.824008] Call Trace: [ 612.824366] [ 612.824711] dump_stack_lvl+0xc1/0xf0 [ 612.825267] should_fail_ex+0x4b4/0x5b0 [ 612.825842] ? alloc_empty_file+0x76/0x1e0 [ 612.826440] should_failslab+0x9/0x20 [ 612.826974] kmem_cache_alloc+0x61/0x390 [ 612.827542] ? __pfx_lock_release+0x10/0x10 [ 612.828146] alloc_empty_file+0x76/0x1e0 [ 612.828727] alloc_file+0x5e/0x800 [ 612.829282] alloc_file_pseudo+0x16e/0x260 [ 612.829893] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 612.830548] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 612.831354] ? do_raw_spin_unlock+0x53/0x220 [ 612.832031] __shmem_file_setup+0x202/0x300 [ 612.832708] __do_sys_memfd_create+0x385/0xa20 [ 612.833389] ? fput+0x2f/0x1a0 [ 612.833896] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 612.834642] ? ksys_write+0x19e/0x250 [ 612.835214] ? __pfx_ksys_write+0x10/0x10 [ 612.835834] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 612.836618] do_syscall_64+0x3f/0x90 [ 612.837198] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 612.837958] RIP: 0033:0x7f7ed559bb19 [ 612.838507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.841062] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 612.842153] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 612.843167] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 612.844182] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 612.845230] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 612.846242] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 612.847281] [ 612.876388] No source specified [ 612.883411] No source specified [ 613.515748] syz_tun: left promiscuous mode [ 613.590116] syz_tun: entered promiscuous mode [ 613.956166] syz_tun: left promiscuous mode 06:29:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 12) 06:29:42 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x41, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000000)={0x6a2, 0x0, 0x1, 0x6, 0x3, [{0xc, 0x8, 0x6}, {0x470, 0xffffffff, 0x7, '\x00', 0x2000}, {0x1, 0x3f, 0x8000000000000, '\x00', 0xc01}]}) write$binfmt_script(r0, 0x0, 0xf) 06:29:42 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x4}, 0x4) setresuid(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+10000}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000080)={r7, 0x1, 0x6, @broadcast}, 0x10) bind$packet(r1, &(0x7f0000000240)={0x11, 0xd, r7, 0x1, 0x1, 0x6, @broadcast}, 0x14) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 06:29:42 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) perf_event_open(0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:29:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 11) 06:29:42 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) openat(r1, &(0x7f0000000000)='./file0\x00', 0x10600, 0x1) 06:29:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:29:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x24, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 625.514504] FAULT_INJECTION: forcing a failure. [ 625.514504] name failslab, interval 1, probability 0, space 0, times 0 [ 625.515308] CPU: 1 PID: 6389 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 625.515851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 625.516385] Call Trace: [ 625.516563] [ 625.516738] dump_stack_lvl+0xc1/0xf0 [ 625.517017] should_fail_ex+0x4b4/0x5b0 [ 625.517300] ? security_file_alloc+0x38/0x170 [ 625.517624] should_failslab+0x9/0x20 [ 625.517887] kmem_cache_alloc+0x61/0x390 [ 625.518174] security_file_alloc+0x38/0x170 [ 625.518478] ? kmem_cache_alloc+0x328/0x390 [ 625.518776] init_file+0x99/0x250 [ 625.519028] alloc_empty_file+0x94/0x1e0 [ 625.519311] alloc_file+0x5e/0x800 [ 625.519577] alloc_file_pseudo+0x16e/0x260 [ 625.519869] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 625.520195] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 625.520573] ? do_raw_spin_unlock+0x53/0x220 [ 625.520909] __shmem_file_setup+0x202/0x300 [ 625.521213] __do_sys_memfd_create+0x385/0xa20 [ 625.521516] ? fput+0x2f/0x1a0 [ 625.521744] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 625.522080] ? ksys_write+0x19e/0x250 [ 625.522342] ? __pfx_ksys_write+0x10/0x10 [ 625.522631] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 625.522989] do_syscall_64+0x3f/0x90 [ 625.523254] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 625.523597] RIP: 0033:0x7fa185d39b19 [ 625.523868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 625.525137] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 625.525677] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d39b19 [ 625.526177] RDX: 00007fa1832af000 RSI: 0000000000000000 RDI: 00007fa185d930fb [ 625.526678] RBP: 0000000000000000 R08: 00007fa1832aeff8 R09: ffffffffffffffff [ 625.527183] R10: 00007fa1832aeffc R11: 0000000000000246 R12: 0000000020000280 [ 625.527690] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 625.528211] [ 625.529600] syz-executor.2: attempt to access beyond end of device [ 625.529600] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 625.531219] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:29:42 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x4}, 0x4) setresuid(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+10000}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000080)={r7, 0x1, 0x6, @broadcast}, 0x10) bind$packet(r1, &(0x7f0000000240)={0x11, 0xd, r7, 0x1, 0x1, 0x6, @broadcast}, 0x14) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 06:29:42 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = fsopen(&(0x7f0000000000)='hugetlbfs\x00', 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="564125cc79ea31467f71700b74eda4351aa96458", 0x14}], 0x1, 0x6, 0x9) getdents(r0, 0x0, 0x0) [ 625.541558] No source specified [ 625.547224] No source specified [ 625.573875] syz_tun: entered promiscuous mode 06:29:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 12) 06:29:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3e, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 625.652599] syz_tun: entered promiscuous mode [ 625.696593] FAULT_INJECTION: forcing a failure. [ 625.696593] name failslab, interval 1, probability 0, space 0, times 0 [ 625.697478] CPU: 1 PID: 6414 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 625.698067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 625.698645] Call Trace: [ 625.698833] [ 625.699002] dump_stack_lvl+0xc1/0xf0 [ 625.699303] should_fail_ex+0x4b4/0x5b0 [ 625.699609] ? alloc_empty_file+0x76/0x1e0 [ 625.699926] should_failslab+0x9/0x20 [ 625.700215] kmem_cache_alloc+0x61/0x390 [ 625.700524] ? __pfx_lock_release+0x10/0x10 [ 625.700846] alloc_empty_file+0x76/0x1e0 [ 625.701158] alloc_file+0x5e/0x800 [ 625.701438] alloc_file_pseudo+0x16e/0x260 [ 625.701757] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 625.702113] ? lockdep_annotate_inode_mutex_key+0x4b/0x200 [ 625.702522] ? do_raw_spin_unlock+0x53/0x220 [ 625.702865] __shmem_file_setup+0x202/0x300 [ 625.703193] __do_sys_memfd_create+0x385/0xa20 [ 625.703524] ? fput+0x2f/0x1a0 [ 625.703774] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 625.704140] ? ksys_write+0x19e/0x250 [ 625.704432] ? __pfx_ksys_write+0x10/0x10 [ 625.704771] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 625.705158] do_syscall_64+0x3f/0x90 [ 625.705445] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 625.705818] RIP: 0033:0x7f7ed559bb19 [ 625.706093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 625.707391] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 625.707948] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007f7ed559bb19 [ 625.708455] RDX: 00007f7ed2b11000 RSI: 0000000000000000 RDI: 00007f7ed55f50fb [ 625.708967] RBP: 0000000000000000 R08: 00007f7ed2b10ff8 R09: ffffffffffffffff [ 625.709472] R10: 00007f7ed2b10ffc R11: 0000000000000246 R12: 0000000020000280 [ 625.709982] R13: 00000000200004c0 R14: 0000000000000000 R15: 0000000020000000 [ 625.710508] [ 625.732179] No source specified 06:29:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 13) 06:29:43 executing program 7: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) sendmsg$802154_dgram(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0002}}}, 0x14, &(0x7f0000000080)={&(0x7f0000000100)="6e82288e87e1513a6fa63bfe2238ff35f1f63d9238dc6419741c86c702ad14bd1e948dc52b642ef836f1b3f249db85d1da3dd92bac16cc673169177089be7c6f2a948df9b438ebaf81c319e9b61aaccc4e341f5d1add53d8b21f852a22c05cc201ef349fd987dc053a5d0a00754ab7981e3da0a8f69e145eb0d0dfa0733bae20f7fbb96d3bf5adaaf94a99eab94055e11e2d7fa9bc1403", 0x97}}, 0x8000) recvmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000000200), 0x6e, &(0x7f0000001400)=[{&(0x7f0000000280)=""/38, 0x26}, {&(0x7f00000002c0)=""/47, 0x2f}, {&(0x7f0000000300)=""/86, 0x56}, {&(0x7f0000000380)=""/92, 0x5c}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x5, &(0x7f0000001480)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2000) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='map_files\x00') getdents(r2, 0x0, 0x0) [ 625.760122] No source specified [ 625.881298] syz-executor.6: attempt to access beyond end of device [ 625.881298] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 625.887030] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 625.924269] syz_tun: left promiscuous mode [ 625.969205] loop3: detected capacity change from 0 to 10 [ 626.191745] syz_tun: left promiscuous mode 06:29:54 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x4}, 0x4) setresuid(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+10000}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000080)={r7, 0x1, 0x6, @broadcast}, 0x10) bind$packet(r1, &(0x7f0000000240)={0x11, 0xd, r7, 0x1, 0x1, 0x6, @broadcast}, 0x14) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 06:29:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x43, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:54 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:29:54 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, r2}, 0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6}, 0x10) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x4}, 0x4) setresuid(0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r4, r5/1000+10000}}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000080)={r7, 0x1, 0x6, @broadcast}, 0x10) bind$packet(r1, &(0x7f0000000240)={0x11, 0xd, r7, 0x1, 0x1, 0x6, @broadcast}, 0x14) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 06:29:54 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) pread64(r1, &(0x7f0000000000)=""/111, 0x6f, 0x5) getdents(r0, 0x0, 0x0) ioctl$CDROM_GET_MCN(0xffffffffffffffff, 0x5311, &(0x7f0000000200)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) sendmsg$AUDIT_USER_TTY(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x464, 0x307, 0x70bd29, 0x25dfdbfd, "6edf1a9c528f10545604658b3f574ec1eb8bc2a508a32eda14d4182401c635fce319a3d58a9f35991d016bf3e8381d337b4811042810e491f320bfd568923eaee93457e42885e458c747ab54f465a72ad648ee56", ["", "", "", ""]}, 0x64}}, 0x20040801) 06:29:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 14) 06:29:54 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) perf_event_open(0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:29:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 13) [ 637.507915] No source specified [ 637.508719] No source specified [ 637.515528] FAULT_INJECTION: forcing a failure. [ 637.515528] name failslab, interval 1, probability 0, space 0, times 0 [ 637.516296] CPU: 1 PID: 6437 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 637.516846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 637.517393] Call Trace: [ 637.517574] [ 637.517747] dump_stack_lvl+0xc1/0xf0 [ 637.518037] should_fail_ex+0x4b4/0x5b0 [ 637.518352] ? getname_flags.part.0+0x50/0x4f0 [ 637.518703] should_failslab+0x9/0x20 [ 637.518988] kmem_cache_alloc+0x61/0x390 [ 637.519310] getname_flags.part.0+0x50/0x4f0 [ 637.519648] getname+0x92/0xe0 [ 637.519900] do_sys_openat2+0xec/0x1d0 [ 637.520172] ? __pfx_do_sys_openat2+0x10/0x10 [ 637.520489] ? find_held_lock+0x2c/0x110 [ 637.520791] ? do_syscall_64+0x3f/0x90 [ 637.521070] ? lock_release+0x1e3/0x680 [ 637.521354] __x64_sys_openat+0x143/0x200 [ 637.521646] ? __pfx___x64_sys_openat+0x10/0x10 [ 637.521979] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 637.522344] do_syscall_64+0x3f/0x90 [ 637.522608] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 637.522952] RIP: 0033:0x7fa185ceca04 [ 637.523210] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 637.524370] RSP: 002b:00007fa1832aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 637.524892] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185ceca04 [ 637.525405] RDX: 0000000000000002 RSI: 00007fa1832af000 RDI: 00000000ffffff9c [ 637.525926] RBP: 00007fa1832af000 R08: 0000000000000000 R09: ffffffffffffffff [ 637.526453] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 637.526970] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 637.527473] [ 637.531276] syz-executor.2: attempt to access beyond end of device [ 637.531276] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 637.533421] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:29:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:29:54 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000140), 0x20, 0x28000) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) renameat2(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x2) r2 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000001, 0x8010, r2, 0x0) [ 637.605403] loop3: detected capacity change from 0 to 10 [ 637.608492] syz_tun: entered promiscuous mode 06:29:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 14) [ 637.628627] No source specified [ 637.631138] No source specified 06:29:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 15) [ 637.663595] FAULT_INJECTION: forcing a failure. [ 637.663595] name failslab, interval 1, probability 0, space 0, times 0 [ 637.664620] CPU: 0 PID: 6452 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 637.665282] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 637.665926] Call Trace: [ 637.666138] [ 637.666322] dump_stack_lvl+0xc1/0xf0 [ 637.666652] should_fail_ex+0x4b4/0x5b0 [ 637.666986] ? getname_flags.part.0+0x50/0x4f0 [ 637.667358] should_failslab+0x9/0x20 [ 637.667664] kmem_cache_alloc+0x61/0x390 [ 637.668008] getname_flags.part.0+0x50/0x4f0 [ 637.668374] getname+0x92/0xe0 [ 637.668645] do_sys_openat2+0xec/0x1d0 [ 637.668972] ? __pfx_do_sys_openat2+0x10/0x10 [ 637.669338] ? find_held_lock+0x2c/0x110 [ 637.669682] ? do_syscall_64+0x3f/0x90 [ 637.670009] ? lock_release+0x1e3/0x680 [ 637.670341] __x64_sys_openat+0x143/0x200 [ 637.670673] ? __pfx___x64_sys_openat+0x10/0x10 [ 637.671063] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 637.671484] do_syscall_64+0x3f/0x90 [ 637.671807] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 637.672225] RIP: 0033:0x7f7ed554ea04 [ 637.672524] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 637.673900] RSP: 002b:00007f7ed2b10ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 637.674489] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed554ea04 [ 637.675048] RDX: 0000000000000002 RSI: 00007f7ed2b11000 RDI: 00000000ffffff9c [ 637.675593] RBP: 00007f7ed2b11000 R08: 0000000000000000 R09: ffffffffffffffff [ 637.676128] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 637.676667] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 637.677226] 06:29:55 executing program 7: statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x1, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) r3 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r4}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r6}}]}}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0xc000000000000000, 0x5, &(0x7f0000002480)=[{&(0x7f0000000200)="86744ca4cf3ea9198522b6c0489223ecb1661a0a61436c6994d6834a7f6d83e878a1022ee19965c9f75262ed5d7a07af3abb781502b84011d48a0dc0b2a00951d7f1e2f209d3454b4dc7634d89dd9b0ee12f33f783dd65ca0b43c3e03a6f95db6a29a0b6ae330273bf8421412f8d69316f98f02c93568229c5a5856e4a9604db2daabd924885d6ce3c7e1c8963e3aeaa93a4ba3d7b31a15dd58b8abc33ffc532bad9532723974278dad3dc", 0xab, 0x40d8}, {&(0x7f00000002c0)="3f6ca570a72d71ba41aae900c656a9e121aa950753cc0b2ca717f814cb40ba0fe9124b11dad14838615e5a5817dafa3dd7dafa2c1cbd224efe958bbbbdf15f6f68a7c56761ca5a7a7168ddca187646479c53b0b25e5b18b46330f0ba2101fb893bc9e5894fc634870feba395a1ed0b9c2b4e37de96d72b819903dcce7d74c3e248b8a88c2a2a8e4f619dcae4c18eac2919f899e50da1b868f0a93a79f3b5f30aae7315c288d3769a6009e854d9a5e46e6ea4ac34752e18fe20de2b40104ccf372e0f41719f442560f6e3929198a7a1e6f3dc1c745bc24d72a58cf244f04448a848c3fc33d40934650d6b", 0xea, 0x7}, {&(0x7f00000003c0)="311df2f200b4843e2cbda9547802a93e8bd4a1c4682cadb6f88b8b5075b6ea11a24664c98f7dd4ca23ccf02631d52e237c137ecf9740d9f6a83769eb279027c05a1a63ea758c206d954757749908bcd98980fef592cb7c251bdba186d266ff350bc4b3b313bf857e68d61d1e477a72bb6c8011f08cbf0130ff2309dffad6118e8cff47f141663b0dce4e078cb2543807b881afcde92da8d825557f73bf3cb1cb9873503b28d18418e024cc7e4d138251406c58f94a5e4a13771d871dc2f39c243495cc82d0669986116f035e3be951d8027a2f7ff59b9ce7987f2e6ef2e534002662a35ffcbf2d0f319f0aa69b5fe2f8c86629340d6257c37d7dd436f9178df4958b60805de6d073ef9b06256718d4c29374e1d32d704a5fa8555e6002ac051dfe10f5e3f4f696df26917cb8e4cb3913d648ccd3142682aff8cd89826fb7acfc5ffa2f07327bee83894cf1a76758328496e5a41f1d755153286f9a7e98314b34b35c5d29f5095cb30bbf97a038bca66bda7b6ce125ce013067689c73c7299b1c5073d4ddfcb966182813ef4a9a09bf24d99dd9193a7ac89a672766e286f02c1302e49d6df0382c3e63e11271d22ea45990ffd41b95a342ecf6ab3d42c495b0d502f3cbb312ffc27a04313f88184c2f660abde592b757768529a711f069d7159f10e11007ab76349fc367fca231d52eeca8b28cceee4c20cbd915609952c578da91ad73caed755301fef771892a04c60009581434f6f847d95b4374ac0ad687786ec8ea0fec2c90288ae866aa2f39da145e70af3a0854ed7a71b72a235acabf152f4aa38e2086cc0ea13cbdcdcb18ff70f893cf393c97895a56b6302b165fe063a288d8a5d4a2b37d11d2c31381426fd6095521c556a2c0553e97100d5723ce49b23f45fb5ef99824fc588fcd49f54c172fcf436b1dd6af0f5092ff16dac1c9193e3c884fa55be85ee1be9b00eb43c9b69400da30386c5d47190568e5d7d164b01e43b3e8da1b21abc213ca84bd36501d5613e35872132fc29e0e11395f2adabc6551af27f9f26545d43133c445a2decd21bfaffa34534f5af542dabbdee3a0c65ff9edb5a0726501efa693aeadd517b847eaa7be293789ca1e8515347dc628fa96d5dae49a907e58495ea2b0955bae89f29d48dfaa881329a7b8575990633a007702cfacf936641f197c5dc5823cc2877c597fb1f178494a8b7673b7e5580c94fb59132d200d0b78f55ddb9844ea2174d7835b05151e015cd36f32c6c0865f6de7fe3916bcec82e6e6bb4ff4d89036a5917f125922e0a890f186daff84f5f2ac125fd775e70b59395c413a676f0d4660ffe35ca6c4f6ae10cd7c3d333136787d12f129cf39941f6907b1a5a1a27e3d3f2c8a25d8b6db4b89135e8791ad5853a1912af0e011d92c58d68d59ab421f4fb45a3f6be9a1c28dcc6c3b13bab471b5e0b2bf2c9f326192b33b08b4adea833d30c634148258e25f5bad2ce958435daa19ac129db9beecb28efc5e0e2d80ad2d33b87c68923c1115a8ff5b4f0c87aafbbe6b03a4f356df28d791a35b892ebf50e2b203d1bdf81a013d347a15b08afb165434f0246c2744794741fcff9dbbab5915ec0f8d092567e667bb6a09e56ecb628f3dc2924732a6468b453a1a62ff9a9bbedd9639426aa966f49e10dea9bf98a666ef350d33dfeeef4accae53a6178466eb3fe199130d7066b0ef8d6d50c65070e8e8d78830487874bfe29090bf75a10d81d334b78072f9e95e0018befcc470c7ef7e718683d24fff47e1a32cd187fa708370d4960db6c1e97cebd6a4346d0c398df1e38e104589206f8b083bfefe7e2849e18cef650c90a9abb8a3ed8b7f4e335b747a1def9d798e216f77b1a68f947a002d8f6a10ccedae509d0e976d585b69928567a36285a156ead9332095ae66781d7d1afed947a5391d1a6b5f3a6dce86afdba0b871305d1bf0e4c828c285a2b45d3edbae4da4b10f98cd56307d63e4a6f0eac7f42799a3c030c65d1a9e411c55552d85a13dd046cfed449c93abc63a9b12c0ad423278cec87f70fbd661e6821f22bf6fe7ffab29387bc03f6539ff23196244530eb92019e85b0dcb25b13ae7c4486c44dd9d4e49d4472f15565045d50ff4800c4a736cf4e0d01a500c978dfa15596e91caa8647adff1cebca2b1c67aa782e3474a7d1910fa45bd253d1441b46c38704d895207f39aedebc93c6d3576fc3b3b0b5b29f92bfab05d5d44900abc8d5fe69952d4cae903a280f6095fffe2350b2b1d707beaf84685def6b9d98ca70fc4d1f0514524126ec225eceed50764472adcaaba313bd9597426ce194abdaaff4ce4f02211548fb9c81dcd216b2030bb606fdc946c3a563f0cf6db84b12a90185f6c535a3039af4bc08c1669a1493ddac058d278f81cf91d6091a025c26a161c4e16926b3a4c790cfdf986ac605cfcd65413e4db0e4425717a78bfdd21e558390672d15c33210780a4c516b1947c9c77010afe8c104395d51a82497756ebe093ed8ab94eb51dd3e97ee1f9f9cc2f3361058f7cc4aa9654c5aca02162ba352d65e7647c5b57ee7fc0ead22b760464b19d5510f87dd2cb7cb37c7e7c88b10e42f7cf6ff28bce23e38afac81b5a0801d1ac0cd16c1d2523ca31e445adc791596f65a6e0c12b273dd375315b832a27e6c53501a75f0197cf4481f9cb60ebec532fae28b6cc10c6c1e4851118135a9999f10674c701dfc08be2b1283fcf73b0009b31e9f0daed615ae9a7dc1a8d49dd0c94239dc60fb5dfd28f9924f3acab1807c25a58db57acbf9e561737ccf1da9291f0c6f8eecf039b97686af0c622493203105a152fc13180c054bd3ed1a83d40068c4924ce66f9f6d7e2384602dfb5f3b0d2f2a587ab3c5d5613831ab615f53e9086f3549acdecc683e6535a7ab75adf4e4e562175767c70d4cfcf85eb065b61dd4f8faa3a72367c71d7dbceb6f8dcb0ec29f90999ee96cc1b9fc4e391d5cccd871e3777dcba66f8c303b4a44ad5b2e803172a1b9d9c1482a002bcffa0e85f8e0b01f249ee2a3f44383719325799976bdb52fea54e30b2098a69326dc207cd2162506ae93312f509f2bb94e26f5ca364562751ec0d1ad5a9a98e84321f492e729235a75c066056d85aa06e85d3d467d6851c58f58d1855d9f24052be11e181b27c4fec37039588e798f7ca3d05e63b983d903daae810e0572a513088bde78e6962bf70caf2c42e6bd6ff60b41a565a67d11eebb577289732a522a2c45c6c81ff308b924b77ffa45856747414bbdcd85f54add409e60507384090e34de02718b7dc25a369055185c09545494745c82740ba1755017b97a65883f17ba0e5678c594d632a030726feda61f1ba462d092cb7ae1b0bc1312a6f83cbac82959e44a1e11b641db9976247abd665ae5c2102a295bb71e856c549822ec4f922ec5dcd9dfc1d79a70e9ecc027d853ee5b0e94bb9dc63591fdadbbfe118ed7db65dfdca65a535023322582b3ff874da72cadfe6da88e2f8dc871e328893abcfd1ca09fdfb4d9bba1dff548faf241e733a1d1ffdcdd5e22b77a303135c4acb1d09e2505f80d48a430404acc7d16b39db79705731988e0594a860a4e02689547ddc7b42643367fcf5bbb2c52c076ac23f479571088489c18be46da223bf43af6dab4106956f694f1aa5c2d8eaa19fa0aa81aa6f2a591bc8363ad32b36d1451553841bf082092ecd033b2368758d7d3abc387d809b5a3d2b3f08b2af448455eee40c715c2247bd3ea170a68e1df1f36a1f06fd4cf924ef307285922f14d31b7aa5ea9a627c6380e44b1b22c9fcc5f3059fc7d8e43a7e8925178241fc34991e1d49217786b61840fa9ad1fc9442b7a41ca1210132b0b268bc5f1ed1bf6daddffb30d912b33e75e689d441cab15d77c0cbc5012963a169d7a09a606c3007983a8d50e1fc25ec1e30254c14abb6f81d4e066000783ff4c4d6fbdc30121e82717afabe0d98b985a42ac4acf0afc1fab88029c303af4fa93ab88354ea49ca1a05f9aa15fd5977f2ba01d8adc3e7032a0b583a79aab128412eadf98dc58dd3b841cbf0d1323e92fd93bcda39002d975aa2a74575079f714aeadb4cb8b9b24bffa733a0dd8094ea019a8bc9be8a80b1549cdac962f9c74d34819c6a12aa57ac965531834d6ce72464b00015d3dc8ae3b5d46861c4ed2f638abd1e98394c97b96f5449e58140ad3f7194cbed501b8a68fa0ffa10d78f4e80b26ec75b065c022603c682519e37c045d491cdccd919b63406188444aa8dfa1456d43157722a0714348b3bb9edb15ff6019d865047a8fe3833841d797301cb47dec9828a4527f06a97110bcbbcbdfd42a499f9d92ffe883d5d7be5556c89ed7f930e8623a0330ee14a8e644ffb8d0cad4bf7d673a1543fd87a3e236de4331c5645c79d2c5051c6fb5f74d776435cfb10a816b9f0fe917155a4247ba76a418a6f2a8c9951829aa50dbde3f72521f04903a5b1e6d1086a7fde53696a72e872f29c6f8a5b16ad2c2da371974c4874a4ff5dbd9dd1b60fd582414d36f6dc04f8db117e7f793750a607c1b4faeabce6dfddb16db98a21d35db40c47ed8f051dffc0489aafbf0bf502caceec4ffddf1c48ec70c86fac68ccaceb1f18f730a1589b83b969c4c240516b49ca072193292e44f07778d7b87d7395f303d92791db81c6969a748ac29ed389a433d152a1679aea8782601ec41d5b41bb32213b2dadedbdf0adf40c5659f701bdf5eb3d76162f7f3c2cf579985a656be56c580b59295124f1ad16239770d30d844671b5cc744fe158097576ecea41fb07bf18ae7b3776bc9cf0d57f12952111b0f4c61f1e3ab502fb0f1455504541315c9fc63d0dbb28d140f33d5d353bbb513599e44d147f7041eae457706209da952f57afc9d2c5f325cd418b6b975e7c9da83b831826c80f438ad9a53b5ab2387d3e62645b3f5fc38550289c480542db86a8b4b47a8e6c86b1e9c1e225787e9675b41f6bc71960d8e49620f264d9bf13235981754a7b7e0e3fc0e86a6ad9961cdc4efe9f708357175ea77a34966ff2c90a4e6358230c121b2e06082e407713b95df29f42cc6279f7e96b39f0277aca7a5d68bff8a48ccbe4ad03c53fc2d92f72ad35c30e6f8120a42994920026d10a856c7f19f893c547dbb01af24b9d74df18d245b7cb8f2e3f751a2936d2f800321131669ed0247a37f574fe408ace584294a94f0e6fac748bc3a2828e1e9a78f1795012a62e2a8d0949357e8cea13d1d68ffb2ab0d808bbf9b28c9830acf59db35ba0908fcc86401622ee367557455b96f0eef24d5ffec0900a99b3b4663e8cdc4cdd8bfc465c8161500d89f5da83190ead5a65fc1e1eed76df784e584c3e3c25aac31925b6b70f8d04d84154bec41be9949664a6b76c268076ea513e68e3a2293d249d02f9892c6937f40f1433beb8434f7e179651e7282911dc76a0b7ee4b6d15842bdeef3fab7fc1e35a34a89d904677657d80b62846e46768676d8902022a9abb783de5a199b06494a10c69b8a3449f79705941896e460e714a8f7d0e3b4768bd0517096df6c92afc9c895596155b73cd6488d9fed167f5e621f34de0275043519f3a4be5c3a40affce7708b6f5dd5d5ebc6ab18853de2d3ae395af8184a4e314419b65a47c0ada0a960da699dfdfaf6260a93e47beb6d2bfde0bf569da7ca7a0e2b86c7e38759305a9c709b784ce0ea87d513a5317a9329101c7530fbed560e3f34949329e5db8c95da6c9af4816bada1bc8ef897d02b3d219cdbf552397863cd1e7bfde3435c300c4f679c295daa77b86", 0x1000, 0x1}, {&(0x7f00000013c0)="1cac5d390193c9f833cb10df53afdbfa9e59c62f6ce1e3caa396a5089f846358044d98825ca469d0e7f2ca32a654242750d1d763981f07e9b917ad68f9b00e0c0ed5a3d9ab6d4feeddc87c4d9c8a74147979cff421f5a45a5d48e36ce6edb296358db1cf6190b9db8c5c2c66cab615f8ab61b5260f99fd7915aeaacd0667ce9e92cf9edac07a4add", 0x88, 0x8}, {&(0x7f0000001480)="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", 0x1000, 0x8000000000000000}], 0x4000, &(0x7f0000002640)=ANY=[@ANYBLOB='uni_xlate=0,uni_xlate=1,nnonumtail=1,shortname=lower,iocharset=cp1251,euid>', @ANYRESDEC=r6, @ANYBLOB="2c2de9ac4bcb736d61636b66737472616e736d7574653d5c2c736d61636b6673666c6f6f723d7d405b2d285c2c646f6e745f61707072616973652c0033a0ce12e52bbab35e9ca2186c663f1b4dee26e33f33cc4d1e9203980a441967c1b2accfa3a37fe64666da1f5b5f04a3f702d2edcd8d835573844f6766bf0a16bfc170a79006c724eaf370adfb793ba2f79348bd76f8df75a0af8468816e6d9806ce1983ff9b2d0c4351a631f66f75465239"]) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r7, 0x0, 0x0) 06:29:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 637.750152] syz-executor.6: attempt to access beyond end of device [ 637.750152] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 637.756995] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 637.758435] No source specified [ 637.761291] No source specified [ 637.780968] syz_tun: entered promiscuous mode 06:29:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 15) [ 637.814383] syz_tun: left promiscuous mode [ 637.819316] loop7: detected capacity change from 0 to 264192 [ 637.821104] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value 06:29:55 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 16) [ 637.873026] syz-executor.2: attempt to access beyond end of device [ 637.873026] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 637.888707] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 637.945920] FAULT_INJECTION: forcing a failure. [ 637.945920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 637.946953] CPU: 1 PID: 6468 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 637.947640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 637.948301] Call Trace: [ 637.948481] [ 637.948670] dump_stack_lvl+0xc1/0xf0 [ 637.949017] should_fail_ex+0x4b4/0x5b0 [ 637.949411] strncpy_from_user+0x38/0x340 [ 637.949794] getname_flags.part.0+0x95/0x4f0 [ 637.950118] getname+0x92/0xe0 [ 637.950444] do_sys_openat2+0xec/0x1d0 [ 637.950773] ? __pfx_do_sys_openat2+0x10/0x10 [ 637.951148] ? find_held_lock+0x2c/0x110 [ 637.951562] ? do_syscall_64+0x3f/0x90 [ 637.951924] ? lock_release+0x1e3/0x680 [ 637.952211] __x64_sys_openat+0x143/0x200 [ 637.952582] ? __pfx___x64_sys_openat+0x10/0x10 [ 637.952939] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 637.953416] do_syscall_64+0x3f/0x90 [ 637.953782] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 637.954243] RIP: 0033:0x7fa185ceca04 [ 637.954496] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 637.955908] RSP: 002b:00007fa1832aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 637.956586] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185ceca04 [ 637.957136] RDX: 0000000000000002 RSI: 00007fa1832af000 RDI: 00000000ffffff9c [ 637.957722] RBP: 00007fa1832af000 R08: 0000000000000000 R09: ffffffffffffffff [ 637.958311] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 637.958953] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 637.959531] [ 638.021307] syz_tun: left promiscuous mode [ 638.071480] loop7: detected capacity change from 0 to 264192 [ 638.072483] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value 06:30:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 17) 06:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:06 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:30:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) recvmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000001280)=@phonet, 0x80, &(0x7f0000001300)}, 0xffffffff}, {{&(0x7f0000001340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000013c0)=""/92, 0x5c}, {&(0x7f0000001440)=""/132, 0x84}, {&(0x7f0000001500)=""/135, 0x87}], 0x3, &(0x7f0000001600)=""/164, 0xa4}, 0x678}, {{&(0x7f00000016c0)=@pppol2tp, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001740)=""/128, 0x80}, {&(0x7f00000017c0)=""/234, 0xea}], 0x2, &(0x7f0000001900)=""/85, 0x55}, 0x1f}, {{&(0x7f0000001980)=@tipc, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a00)=""/95, 0x5f}, {&(0x7f0000001a80)=""/135, 0x87}, {&(0x7f0000001b40)=""/5, 0x5}], 0x3}, 0xe3}, {{&(0x7f0000001bc0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @empty}}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001c40)=""/76, 0x4c}, {&(0x7f0000001cc0)=""/208, 0xd0}], 0x2, &(0x7f0000001e00)=""/116, 0x74}, 0x4}], 0x5, 0x40000101, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000001200)={{0x1, 0x1, 0xfffffffffffffe71, r2, {0x5}}, './file0\x00'}) write$cgroup_pid(r3, &(0x7f0000001240), 0x12) getdents(r0, &(0x7f0000000100)=""/4096, 0x1000) getdents64(r0, &(0x7f0000001100)=""/255, 0xff) tee(r1, r1, 0x77, 0x0) getdents64(r0, &(0x7f0000000040)=""/100, 0x64) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) 06:30:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 16) 06:30:06 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) perf_event_open(0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:06 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000001900), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x40, 0x5, 0x7, 0x4, 0x0, 0x100000001, 0x55801, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0xbcd, 0x101, 0x8, 0xfffffffffffffffb, 0xfffffffb, 0x5, 0x0, 0x400, 0x0, 0x7f}, r0, 0x7, r1, 0x9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:30:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) lseek(r2, 0x0, 0x1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xf8, 0x9, 0x79, 0x5, 0x0, 0x9, 0x1040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff9, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x80, 0x9, 0x7, 0xd, 0x2, 0x7c, 0xf0f0, 0x0, 0xe7, 0x0, 0x3}, 0x0, 0x6, r2, 0x8) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001280)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001280)={r4, 0x0, "45200a3016ffc548a3fab97a1c9d46863a0ddea860e18af030ee70665daeb486a2a02ac5c3c6bb0f991e6b1627a30c80184d28060f63fc57875baf87556a7fae518dfa96782d24a9ecbc7ff3398710efb3372f5de7c44ef4f55c2ec5ed4ce53d3b19ec000e5817551d92e1d91ca33024ba414a535a58caefaa06f7251506c8411cd430d52506d1c486daeab8793170679025ff8cf7f2a492d0cd3523567fc94690ffdb56377535d41e400000000000000039040349ee43660f8c6a90ba31274ff82cb04f2344d0b78cffffff7f000000576c5413c1bbd6fbf71b7a0e49bf92476e0000000000000000000000000000000000000000000000000000008000", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000900)={0x0, 0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 648.995092] No source specified [ 648.995917] No source specified [ 649.153345] FAULT_INJECTION: forcing a failure. [ 649.153345] name failslab, interval 1, probability 0, space 0, times 0 [ 649.154888] CPU: 0 PID: 6494 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 649.156006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.157097] Call Trace: [ 649.157468] [ 649.157791] dump_stack_lvl+0xc1/0xf0 [ 649.158364] should_fail_ex+0x4b4/0x5b0 [ 649.158945] ? alloc_empty_file+0x76/0x1e0 [ 649.159541] should_failslab+0x9/0x20 [ 649.160081] kmem_cache_alloc+0x61/0x390 [ 649.160647] ? __lock_acquire+0x19b1/0x6340 [ 649.160659] FAULT_INJECTION: forcing a failure. [ 649.160659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 649.161272] alloc_empty_file+0x76/0x1e0 [ 649.163286] path_openat+0xd8/0x2710 [ 649.163857] ? __pfx_path_openat+0x10/0x10 [ 649.164482] do_filp_open+0x1ba/0x410 [ 649.165018] ? __pfx_do_filp_open+0x10/0x10 [ 649.165602] ? expand_files+0x446/0x8e0 [ 649.166168] ? find_held_lock+0x2c/0x110 [ 649.166746] ? alloc_fd+0x2eb/0x760 [ 649.167278] ? lock_release+0x1e3/0x680 [ 649.167857] ? do_raw_spin_lock+0x125/0x270 [ 649.168469] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 649.169150] ? _raw_spin_unlock+0x1e/0x40 [ 649.169720] ? alloc_fd+0x2eb/0x760 [ 649.170266] do_sys_openat2+0x164/0x1d0 [ 649.170856] ? __pfx_do_sys_openat2+0x10/0x10 [ 649.171512] ? find_held_lock+0x2c/0x110 [ 649.172107] ? do_syscall_64+0x3f/0x90 [ 649.172673] ? lock_release+0x1e3/0x680 [ 649.173271] __x64_sys_openat+0x143/0x200 [ 649.173874] ? __pfx___x64_sys_openat+0x10/0x10 [ 649.174546] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 649.175279] do_syscall_64+0x3f/0x90 [ 649.175825] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 649.176532] RIP: 0033:0x7fa185ceca04 [ 649.177063] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 649.179547] RSP: 002b:00007fa1832aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 649.180621] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185ceca04 [ 649.181692] RDX: 0000000000000002 RSI: 00007fa1832af000 RDI: 00000000ffffff9c [ 649.182738] RBP: 00007fa1832af000 R08: 0000000000000000 R09: ffffffffffffffff [ 649.183790] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 649.184840] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 649.185890] [ 649.186236] CPU: 1 PID: 6492 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 649.187455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.188591] Call Trace: [ 649.188978] [ 649.189309] dump_stack_lvl+0xc1/0xf0 [ 649.189885] should_fail_ex+0x4b4/0x5b0 [ 649.190477] strncpy_from_user+0x38/0x340 [ 649.191101] getname_flags.part.0+0x95/0x4f0 [ 649.191757] getname+0x92/0xe0 [ 649.192260] do_sys_openat2+0xec/0x1d0 [ 649.192832] ? __pfx_do_sys_openat2+0x10/0x10 [ 649.193498] ? find_held_lock+0x2c/0x110 [ 649.194094] ? do_syscall_64+0x3f/0x90 [ 649.194673] ? lock_release+0x1e3/0x680 [ 649.195269] __x64_sys_openat+0x143/0x200 [ 649.195880] ? __pfx___x64_sys_openat+0x10/0x10 [ 649.196573] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 649.197334] do_syscall_64+0x3f/0x90 [ 649.197883] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 649.198609] RIP: 0033:0x7f7ed554ea04 [ 649.199132] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 649.201632] RSP: 002b:00007f7ed2b10ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 649.202679] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed554ea04 [ 649.203671] RDX: 0000000000000002 RSI: 00007f7ed2b11000 RDI: 00000000ffffff9c [ 649.204655] RBP: 00007f7ed2b11000 R08: 0000000000000000 R09: ffffffffffffffff [ 649.205663] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 649.206623] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 649.207634] 06:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 18) 06:30:06 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r1, 0x0) lstat(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000010007000000000002000000", @ANYRES32=0xee00, @ANYBLOB="02000400", @ANYRES32=r1, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="040001000000000008000200", @ANYRES32=0xee01, @ANYRESDEC=r0], 0x54, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {0x0, 0x0, 0xa00}], 0x0, &(0x7f0000000080)) 06:30:06 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) close_range(r1, r0, 0x0) [ 649.429644] No source specified [ 649.468354] No source specified [ 649.470612] syz-executor.6: attempt to access beyond end of device [ 649.470612] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 649.492358] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:30:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 17) 06:30:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 19) [ 649.672344] FAULT_INJECTION: forcing a failure. [ 649.672344] name failslab, interval 1, probability 0, space 0, times 0 [ 649.673988] CPU: 0 PID: 6511 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 649.675056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.676045] Call Trace: [ 649.676371] [ 649.676672] dump_stack_lvl+0xc1/0xf0 [ 649.677188] should_fail_ex+0x4b4/0x5b0 [ 649.677718] ? alloc_empty_file+0x76/0x1e0 [ 649.678262] should_failslab+0x9/0x20 [ 649.678752] kmem_cache_alloc+0x61/0x390 [ 649.679276] ? __lock_acquire+0x19b1/0x6340 [ 649.679830] alloc_empty_file+0x76/0x1e0 [ 649.680363] path_openat+0xd8/0x2710 [ 649.680878] ? __pfx_path_openat+0x10/0x10 [ 649.681455] do_filp_open+0x1ba/0x410 [ 649.681939] ? __pfx_do_filp_open+0x10/0x10 [ 649.682482] ? expand_files+0x446/0x8e0 [ 649.683003] ? find_held_lock+0x2c/0x110 [ 649.683530] ? alloc_fd+0x2eb/0x760 [ 649.684008] ? lock_release+0x1e3/0x680 [ 649.684524] ? do_raw_spin_lock+0x125/0x270 [ 649.685096] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 649.685703] ? _raw_spin_unlock+0x1e/0x40 [ 649.686248] ? alloc_fd+0x2eb/0x760 [ 649.686752] do_sys_openat2+0x164/0x1d0 [ 649.687286] ? __pfx_do_sys_openat2+0x10/0x10 [ 649.687878] ? find_held_lock+0x2c/0x110 [ 649.688422] ? do_syscall_64+0x3f/0x90 [ 649.688954] ? lock_release+0x1e3/0x680 [ 649.689487] __x64_sys_openat+0x143/0x200 [ 649.690041] ? __pfx___x64_sys_openat+0x10/0x10 [ 649.690666] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 649.691349] do_syscall_64+0x3f/0x90 [ 649.691858] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 649.692517] RIP: 0033:0x7f7ed554ea04 [ 649.693021] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 649.695251] RSP: 002b:00007f7ed2b10ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 649.696201] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed554ea04 [ 649.697103] RDX: 0000000000000002 RSI: 00007f7ed2b11000 RDI: 00000000ffffff9c [ 649.697990] RBP: 00007f7ed2b11000 R08: 0000000000000000 R09: ffffffffffffffff [ 649.698882] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 649.699779] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 649.700695] [ 649.726399] No source specified [ 649.750589] No source specified 06:30:07 executing program 7: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @private=0xa010102}}, 0x0, 0x0, 0x16, 0x0, "77d9bd08c09a365b83e738dbc230e1366b19955138e1f5e63a78f15e4f09444f30efc01d55d0b7559f230eab3a3070c1b235f0abcfaa331c27178703bce0f8b7f5069a2e87599bdda09a60deafd3810d"}, 0xd8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x88, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xe020, 0x26}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x88}, 0x1, 0x0, 0x0, 0x891}, 0x4000) getdents(r0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) socketpair(0x10, 0x5, 0xffffffff, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000f00)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x28, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x59}}}}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000841}, 0x20000001) write$binfmt_aout(r2, &(0x7f0000000400)={{0x107, 0x80, 0x1f, 0x2de, 0x150, 0x4, 0x2b6, 0x5}, "22a62e00f567530daacff02189e17b2878bd6c35a4b5e241fbc712", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa3b) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0xfefd, @ipv4={'\x00', '\xff\xff', @remote}, 0x6b3}}, 0x0, 0x0, 0x40, 0x0, "fb66c32307f91615223195af79b5ffbdc411de3d24d6235e10987a77a2ad7a340b5849425cd958a757d504edbf6eaac7a518c3cb92df191fb8813864a094775048071a7c607d56728a7f17c64d75885a"}, 0xd8) [ 649.811920] FAULT_INJECTION: forcing a failure. [ 649.811920] name failslab, interval 1, probability 0, space 0, times 0 [ 649.813539] CPU: 0 PID: 6515 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 649.814574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.815564] Call Trace: [ 649.815891] [ 649.816186] dump_stack_lvl+0xc1/0xf0 [ 649.816693] should_fail_ex+0x4b4/0x5b0 [ 649.817226] ? security_file_alloc+0x38/0x170 [ 649.817807] should_failslab+0x9/0x20 [ 649.818288] kmem_cache_alloc+0x61/0x390 [ 649.818817] security_file_alloc+0x38/0x170 [ 649.819378] init_file+0x99/0x250 [ 649.819837] alloc_empty_file+0x94/0x1e0 [ 649.820364] path_openat+0xd8/0x2710 [ 649.820871] ? __pfx_path_openat+0x10/0x10 [ 649.821457] do_filp_open+0x1ba/0x410 [ 649.821940] ? __pfx_do_filp_open+0x10/0x10 [ 649.822469] ? expand_files+0x446/0x8e0 [ 649.822983] ? find_held_lock+0x2c/0x110 [ 649.823518] ? alloc_fd+0x2eb/0x760 [ 649.823994] ? lock_release+0x1e3/0x680 [ 649.824510] ? do_raw_spin_lock+0x125/0x270 [ 649.825067] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 649.825670] ? _raw_spin_unlock+0x1e/0x40 [ 649.826199] ? alloc_fd+0x2eb/0x760 [ 649.826687] do_sys_openat2+0x164/0x1d0 [ 649.827202] ? __pfx_do_sys_openat2+0x10/0x10 [ 649.827778] ? find_held_lock+0x2c/0x110 [ 649.828308] ? do_syscall_64+0x3f/0x90 [ 649.828814] ? lock_release+0x1e3/0x680 [ 649.829363] __x64_sys_openat+0x143/0x200 [ 649.829898] ? __pfx___x64_sys_openat+0x10/0x10 [ 649.830508] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 649.831171] do_syscall_64+0x3f/0x90 [ 649.831661] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 649.832299] RIP: 0033:0x7fa185ceca04 [ 649.832766] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 649.834938] RSP: 002b:00007fa1832aeed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 649.835862] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185ceca04 [ 649.836717] RDX: 0000000000000002 RSI: 00007fa1832af000 RDI: 00000000ffffff9c [ 649.837584] RBP: 00007fa1832af000 R08: 0000000000000000 R09: ffffffffffffffff [ 649.838440] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 649.839291] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 649.840162] 06:30:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 649.926140] loop3: detected capacity change from 0 to 10 06:30:07 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 650.026563] No source specified [ 650.032319] No source specified 06:30:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 18) 06:30:20 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:30:20 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, 0x0, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:20 executing program 1: mkdir(&(0x7f00000003c0)='./file1\x00', 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)={{}, {}, [], {}, [{0x8, 0x1, r1}, {0x8, 0x6, r2}, {0x8, 0x7, r0}]}, 0x3c, 0x0) mount$bind(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140), 0x1000042, 0x0) 06:30:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xa80, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:20 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 20) 06:30:20 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) perf_event_open(0xffffffffffffffff, r4, 0x1, 0xffffffffffffffff, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:20 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0xffffffffffffff64) [ 662.848734] syz-executor.2: attempt to access beyond end of device [ 662.848734] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 662.851941] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:30:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 19) 06:30:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) lstat(0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000100)={{0x108, 0x20, 0x0, 0x168, 0x12, 0x400, 0x19a, 0x4}, "67ca2289f75d4869eba52ead7257ce5e27d46d11764b07535067e8b4d3dd2ace0353bb6e118de2bd285d5b9201377218a00afd6379dd3a55091ddc14a3", ['\x00', '\x00', '\x00', '\x00']}, 0x45d) socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) stat(0x0, 0x0) setresuid(0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$nl80211(0xfffffffffffffffe, 0xffffffffffffffff) [ 662.896974] No source specified [ 662.900741] syz-executor.6: attempt to access beyond end of device [ 662.900741] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 662.901887] No source specified [ 662.920534] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 662.932584] loop3: detected capacity change from 0 to 10 06:30:20 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000002c0)={0x1, 0x3, 0x1000, 0xa8, &(0x7f0000000200)="001f5778fc0e1d104e9246ff6fd6bb818b62c546955b6edbaa959e44200ef9d1567156488423fa9f927b5c7ed118bf60934523e8e033780e3a8eff6bd6b56d985ef7b787262b1d44854b274ee48526dd0a89ea3e01d761d8b52b28f465ac95a38ee402b5c4f3062adbc7aac6f7704434d9f06f4966b48788b425588028b56edad97ecea9e1a4cd53cb74eca5d92f33bd36046c3fb39ac7c6ab78d7cd18aad623c4821b923ccb39ac", 0x24, 0x0, &(0x7f0000000040)="e335a92f92416f7aa7b59f752b72ae05dcd31fc83d834483f98048f52980ca9b4f0291ee"}) pread64(r0, &(0x7f0000000100)=""/235, 0xeb, 0x1ff) getdents(r0, 0x0, 0x0) 06:30:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:20 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 21) [ 663.080770] FAULT_INJECTION: forcing a failure. [ 663.080770] name failslab, interval 1, probability 0, space 0, times 0 [ 663.081568] CPU: 1 PID: 6556 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 663.082147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 663.082729] Call Trace: [ 663.082924] [ 663.083095] dump_stack_lvl+0xc1/0xf0 [ 663.083389] should_fail_ex+0x4b4/0x5b0 [ 663.083685] ? security_file_alloc+0x38/0x170 [ 663.084013] should_failslab+0x9/0x20 [ 663.084280] kmem_cache_alloc+0x61/0x390 [ 663.084592] security_file_alloc+0x38/0x170 [ 663.084895] init_file+0x99/0x250 [ 663.085187] alloc_empty_file+0x94/0x1e0 [ 663.085490] path_openat+0xd8/0x2710 [ 663.085768] ? __pfx_path_openat+0x10/0x10 [ 663.086090] do_filp_open+0x1ba/0x410 [ 663.086355] ? __pfx_do_filp_open+0x10/0x10 [ 663.086672] ? expand_files+0x446/0x8e0 [ 663.086949] ? find_held_lock+0x2c/0x110 [ 663.087258] ? alloc_fd+0x2eb/0x760 [ 663.087518] ? lock_release+0x1e3/0x680 [ 663.087795] ? do_raw_spin_lock+0x125/0x270 [ 663.088096] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 663.088422] ? _raw_spin_unlock+0x1e/0x40 [ 663.088710] ? alloc_fd+0x2eb/0x760 [ 663.088977] do_sys_openat2+0x164/0x1d0 [ 663.089262] ? __pfx_do_sys_openat2+0x10/0x10 [ 663.089578] ? find_held_lock+0x2c/0x110 [ 663.089865] ? do_syscall_64+0x3f/0x90 [ 663.090156] ? lock_release+0x1e3/0x680 [ 663.090430] __x64_sys_openat+0x143/0x200 [ 663.090720] ? __pfx___x64_sys_openat+0x10/0x10 [ 663.091048] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 663.091407] do_syscall_64+0x3f/0x90 [ 663.091672] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 663.092020] RIP: 0033:0x7f7ed554ea04 [ 663.092275] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 663.093494] RSP: 002b:00007f7ed2b10ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 663.094014] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed554ea04 [ 663.094507] RDX: 0000000000000002 RSI: 00007f7ed2b11000 RDI: 00000000ffffff9c [ 663.094992] RBP: 00007f7ed2b11000 R08: 0000000000000000 R09: ffffffffffffffff [ 663.095484] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 663.095972] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 663.096470] [ 663.158017] No source specified 06:30:20 executing program 7: getdents(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/4096, 0x1000) getdents(0xffffffffffffffff, &(0x7f0000001000)=""/168, 0xa8) [ 663.176389] No source specified 06:30:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 20) [ 663.285845] FAULT_INJECTION: forcing a failure. [ 663.285845] name failslab, interval 1, probability 0, space 0, times 0 [ 663.287584] CPU: 1 PID: 6572 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 663.288636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 663.289696] Call Trace: [ 663.290048] [ 663.290362] dump_stack_lvl+0xc1/0xf0 [ 663.290904] should_fail_ex+0x4b4/0x5b0 [ 663.291448] ? __kernfs_new_node+0xd4/0x890 [ 663.292051] should_failslab+0x9/0x20 [ 663.292577] kmem_cache_alloc+0x61/0x390 [ 663.293161] ? __pfx_avc_has_perm+0x10/0x10 [ 663.293763] __kernfs_new_node+0xd4/0x890 [ 663.294348] ? __pfx___kernfs_new_node+0x10/0x10 [ 663.294994] ? selinux_sb_statfs+0x1b5/0x240 [ 663.295601] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 663.296264] ? __pfx_perf_trace_lock+0x10/0x10 [ 663.296890] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 663.297589] ? shmem_statfs+0x1b7/0x3e0 [ 663.298140] kernfs_create_dir_ns+0xa0/0x230 [ 663.298789] internal_create_group+0x713/0xb00 [ 663.299465] ? __pfx_internal_create_group+0x10/0x10 [ 663.300202] loop_configure+0xce5/0x1910 [ 663.300816] lo_ioctl+0x934/0x19a0 [ 663.301372] ? kmem_cache_free+0x10d/0x4d0 [ 663.301982] ? __x64_sys_openat+0x143/0x200 [ 663.302596] ? do_syscall_64+0x3f/0x90 [ 663.303174] ? __pfx_lo_ioctl+0x10/0x10 [ 663.303758] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 663.304499] ? perf_trace_lock+0xc1/0x480 [ 663.305107] ? __pfx_perf_trace_lock+0x10/0x10 [ 663.305768] ? __lock_acquire+0xc3f/0x6340 [ 663.306384] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 663.307268] ? __pfx_do_sys_openat2+0x10/0x10 [ 663.307914] ? find_held_lock+0x2c/0x110 [ 663.308502] ? do_syscall_64+0x3f/0x90 [ 663.309081] ? lock_release+0x1e3/0x680 [ 663.309675] ? __pfx_lo_ioctl+0x10/0x10 [ 663.310252] blkdev_ioctl+0x2e4/0x750 [ 663.310807] ? __pfx_blkdev_ioctl+0x10/0x10 [ 663.311419] ? selinux_file_ioctl+0xba/0x270 [ 663.312066] ? __pfx_blkdev_ioctl+0x10/0x10 [ 663.312684] __x64_sys_ioctl+0x1a4/0x210 [ 663.313288] do_syscall_64+0x3f/0x90 [ 663.313835] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 663.314547] RIP: 0033:0x7fa185d398d7 [ 663.315067] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 663.317459] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.318484] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 663.319441] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 663.320416] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 663.321402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 663.322364] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 663.323360] 06:30:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) lstat(0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000080)) write$binfmt_aout(r0, &(0x7f0000000100)={{0x108, 0x20, 0x0, 0x168, 0x12, 0x400, 0x19a, 0x4}, "67ca2289f75d4869eba52ead7257ce5e27d46d11764b07535067e8b4d3dd2ace0353bb6e118de2bd285d5b9201377218a00afd6379dd3a55091ddc14a3", ['\x00', '\x00', '\x00', '\x00']}, 0x45d) socket$netlink(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) stat(0x0, 0x0) setresuid(0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x10) syz_genetlink_get_family_id$nl80211(0xfffffffffffffffe, 0xffffffffffffffff) [ 663.352100] syz-executor.2: attempt to access beyond end of device [ 663.352100] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 663.358666] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 663.634009] syz-executor.6: attempt to access beyond end of device [ 663.634009] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 663.640261] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:30:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:32 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:30:32 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, 0x0, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpriority(0x0, r1, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x8, 0x1ff, 0x3}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x5, 0x4, 0x1, 0x0, 0x4ce3, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x101, 0x80000000}, 0x40020, 0x6, 0x7fff, 0x9, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, r1, 0xa, r2, 0x9) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_timeout(0xf, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000300)={0x2, 'dummy0\x00', {0x7}, 0x6}) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r5) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9faa", 0x2, r6) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r6) [ 675.033943] syz-executor.6: attempt to access beyond end of device [ 675.033943] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 675.036383] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 675.046861] No source specified [ 675.049320] No source specified 06:30:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x80}}, './file0\x00'}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r1, 0x4008941a, &(0x7f0000000040)) 06:30:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 21) 06:30:32 executing program 1: fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xd29, &(0x7f0000000780)=0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0xfe, 0x0, 0x6, 0x4, 0x0, 0x100000001, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0x9afda8f7ffd138ac}, 0x2, 0xffffffff, 0x1000, 0x2, 0x0, 0x7, 0x1, 0x0, 0x3dc0, 0x0, 0x65}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000000)='\x00', 0xf}]) 06:30:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 22) [ 675.079050] loop3: detected capacity change from 0 to 10 06:30:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 23) [ 675.125188] FAULT_INJECTION: forcing a failure. [ 675.125188] name failslab, interval 1, probability 0, space 0, times 0 [ 675.126851] CPU: 0 PID: 6594 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 675.127951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 675.128986] Call Trace: [ 675.129356] [ 675.129664] dump_stack_lvl+0xc1/0xf0 [ 675.130195] should_fail_ex+0x4b4/0x5b0 [ 675.130741] ? __kernfs_new_node+0xd4/0x890 [ 675.131335] should_failslab+0x9/0x20 [ 675.131852] kmem_cache_alloc+0x61/0x390 [ 675.132406] ? __pfx_avc_has_perm+0x10/0x10 [ 675.133015] __kernfs_new_node+0xd4/0x890 [ 675.133612] ? __pfx___kernfs_new_node+0x10/0x10 [ 675.134263] ? selinux_sb_statfs+0x1b5/0x240 [ 675.134863] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 675.135525] ? __pfx_perf_trace_lock+0x10/0x10 [ 675.136169] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 675.136845] ? shmem_statfs+0x1b7/0x3e0 [ 675.137422] kernfs_create_dir_ns+0xa0/0x230 [ 675.138072] internal_create_group+0x713/0xb00 [ 675.138732] ? __pfx_internal_create_group+0x10/0x10 [ 675.139464] loop_configure+0xce5/0x1910 [ 675.140074] lo_ioctl+0x934/0x19a0 [ 675.140593] ? kmem_cache_free+0x10d/0x4d0 [ 675.141177] ? __x64_sys_openat+0x143/0x200 [ 675.141797] ? do_syscall_64+0x3f/0x90 [ 675.142352] ? __pfx_lo_ioctl+0x10/0x10 [ 675.142898] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 675.143624] ? perf_trace_lock+0xc1/0x480 [ 675.144211] ? __pfx_perf_trace_lock+0x10/0x10 [ 675.144859] ? __lock_acquire+0xc3f/0x6340 [ 675.145469] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 675.146324] ? __pfx_do_sys_openat2+0x10/0x10 [ 675.146954] ? find_held_lock+0x2c/0x110 [ 675.147527] ? do_syscall_64+0x3f/0x90 [ 675.148088] ? lock_release+0x1e3/0x680 [ 675.148646] ? __pfx_lo_ioctl+0x10/0x10 [ 675.149212] blkdev_ioctl+0x2e4/0x750 [ 675.149778] ? __pfx_blkdev_ioctl+0x10/0x10 [ 675.150377] ? selinux_file_ioctl+0xba/0x270 [ 675.151007] ? __pfx_blkdev_ioctl+0x10/0x10 [ 675.151605] __x64_sys_ioctl+0x1a4/0x210 [ 675.152181] do_syscall_64+0x3f/0x90 [ 675.152721] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 675.153431] RIP: 0033:0x7f7ed559b8d7 [ 675.153940] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 675.156277] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 675.157398] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed559b8d7 [ 675.158461] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 675.159495] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 675.160540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 675.161609] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 675.162588] [ 675.181597] No source specified [ 675.185867] No source specified 06:30:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 675.263262] syz-executor.6: attempt to access beyond end of device [ 675.263262] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 675.276817] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:30:32 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000040)={0x2, 0x1, 0x11, 0x1b, 0x7b, &(0x7f0000000100)="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"}) getdents(r0, 0x0, 0x0) 06:30:32 executing program 1: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, 0x0, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpriority(0x0, r1, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x8, 0x1ff, 0x3}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x5, 0x4, 0x1, 0x0, 0x4ce3, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x101, 0x80000000}, 0x40020, 0x6, 0x7fff, 0x9, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, r1, 0xa, r2, 0x9) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_timeout(0xf, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000300)={0x2, 'dummy0\x00', {0x7}, 0x6}) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r5) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9faa", 0x2, r6) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r6) [ 675.409177] No source specified [ 675.448033] No source specified [ 675.458601] syz-executor.2: attempt to access beyond end of device [ 675.458601] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 675.460142] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:30:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2400, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 24) 06:30:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 22) [ 675.568611] No source specified [ 675.573368] No source specified [ 675.587308] syz-executor.6: attempt to access beyond end of device [ 675.587308] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 675.588266] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 675.618862] syz-executor.2: attempt to access beyond end of device [ 675.618862] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 675.619863] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 686.511551] No source specified 06:30:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 25) 06:30:43 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x50400, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5415, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f0000001240)={0x1, 0x80, 0x6d, 0xfd, 0x6, 0x1, 0x0, 0x0, 0x18000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001200), 0x1}, 0x51800, 0x3, 0x6, 0x4, 0x54c, 0x0, 0xd7, 0x0, 0xfffffa5f, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, r0, 0x2) getdents64(r3, &(0x7f0000000200)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000100)=""/243, 0xf3) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000000)) 06:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3e00, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:43 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, 0x0, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:43 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:30:43 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpriority(0x0, r1, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r0, 0x8, 0x1ff, 0x3}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x5, 0x4, 0x1, 0x0, 0x4ce3, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x101, 0x80000000}, 0x40020, 0x6, 0x7fff, 0x9, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8f}, r1, 0xa, r2, 0x9) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$set_timeout(0xf, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000300)={0x2, 'dummy0\x00', {0x7}, 0x6}) r6 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r5) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9faa", 0x2, r6) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r6) 06:30:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 23) [ 686.523325] No source specified [ 686.525011] syz-executor.2: attempt to access beyond end of device [ 686.525011] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 686.526817] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:30:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @broadcast}}}], 0x20}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000100)={'tunl0\x00', r2, 0x8000, 0x91, 0x4, 0x7, {{0x61, 0x4, 0x1, 0x1f, 0x184, 0x66, 0x0, 0x0, 0x4, 0x0, @multicast2, @remote, {[@generic={0x0, 0xe, "2368232dccd3513937588e87"}, @cipso={0x86, 0xc, 0x1, [{0x2, 0x6, "e946cc52"}]}, @timestamp_prespec={0x44, 0x14, 0x56, 0x3, 0x3, [{@broadcast, 0x1000}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}]}, @cipso={0x86, 0x29, 0x3, [{0x0, 0xb, "0606f9fc17374d9dad"}, {0x5, 0x6, "4250999d"}, {0x2, 0x2}, {0x6, 0x10, "5f8ef54c486a790300111701f4d3"}]}, @ssrr={0x89, 0x1f, 0x64, [@rand_addr=0x64010102, @multicast1, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast1, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x43}]}, @timestamp_addr={0x44, 0x44, 0x14, 0x1, 0x4, [{@loopback, 0x7fff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80000001}, {@multicast2, 0x7fffffff}, {@local, 0x88}, {@remote}, {@private=0xa010101, 0x80000000}, {@empty, 0x3}, {@empty, 0x5}]}, @timestamp_addr={0x44, 0x14, 0x16, 0x1, 0x0, [{@local, 0xffffffff}, {@multicast2, 0x81}]}, @cipso={0x86, 0x5e, 0x0, [{0x0, 0xc, "318c2cc503ca36be20b7"}, {0x6, 0xd, "3d629296779a8e16aa8b02"}, {0x2, 0x12, "9ef40c598e1c1fbf0a054594f4035e3a"}, {0x6, 0xd, "3d8ce6d3e759cde3b61e1a"}, {0x1, 0xf, "d3f1fb3ed13591d4d67ad24c21"}, {0x7, 0x9, "dcf57081129bc3"}, {0x6, 0x3, "aa"}, {0x5, 0x3, "f7"}, {0x7, 0x2}]}, @timestamp_prespec={0x44, 0x34, 0xf2, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0xd}, 0xfff}, {@multicast1, 0x9}, {@multicast2}, {@rand_addr=0x64010102, 0x10000}, {@loopback, 0x2}, {@loopback, 0x65b}]}, @lsrr={0x83, 0xf, 0x8e, [@loopback, @multicast2, @empty]}]}}}}}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000340)={@private1, @local, @private1, 0x81, 0x7fff, 0x4, 0x500, 0xc41, 0x200, r4}) [ 686.542459] FAULT_INJECTION: forcing a failure. [ 686.542459] name failslab, interval 1, probability 0, space 0, times 0 [ 686.544023] CPU: 1 PID: 6639 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 686.544998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.545989] Call Trace: [ 686.546322] [ 686.546615] dump_stack_lvl+0xc1/0xf0 [ 686.547127] should_fail_ex+0x4b4/0x5b0 [ 686.547630] ? __kernfs_new_node+0xd4/0x890 [ 686.548197] should_failslab+0x9/0x20 [ 686.548703] kmem_cache_alloc+0x61/0x390 [ 686.549259] __kernfs_new_node+0xd4/0x890 [ 686.549824] ? __pfx___kernfs_new_node+0x10/0x10 [ 686.550464] ? down_write+0x11a/0x1f0 [ 686.550984] ? up_write+0x196/0x510 [ 686.551487] kernfs_new_node+0x97/0x120 [ 686.552031] __kernfs_create_file+0x55/0x350 [ 686.552619] sysfs_add_file_mode_ns+0x21c/0x440 [ 686.553239] ? __pfx_dev_attr_store+0x10/0x10 [ 686.553859] internal_create_group+0x322/0xb00 [ 686.554477] ? __pfx_internal_create_group+0x10/0x10 [ 686.555166] loop_configure+0xce5/0x1910 [ 686.555723] lo_ioctl+0x934/0x19a0 [ 686.556210] ? kmem_cache_free+0x10d/0x4d0 [ 686.556774] ? __x64_sys_openat+0x143/0x200 [ 686.557341] ? do_syscall_64+0x3f/0x90 [ 686.557883] ? __pfx_lo_ioctl+0x10/0x10 [ 686.558417] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 686.559121] ? __lock_acquire+0xc3f/0x6340 [ 686.559749] ? __pfx_do_sys_openat2+0x10/0x10 [ 686.560345] ? find_held_lock+0x2c/0x110 [ 686.560885] ? do_syscall_64+0x3f/0x90 [ 686.561419] ? lock_release+0x1e3/0x680 [ 686.561937] ? __pfx_lo_ioctl+0x10/0x10 [ 686.562480] blkdev_ioctl+0x2e4/0x750 [ 686.562991] ? __pfx_blkdev_ioctl+0x10/0x10 [ 686.563557] ? selinux_file_ioctl+0xba/0x270 [ 686.564141] ? __pfx_blkdev_ioctl+0x10/0x10 [ 686.564714] __x64_sys_ioctl+0x1a4/0x210 [ 686.565259] do_syscall_64+0x3f/0x90 [ 686.565793] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 686.566466] RIP: 0033:0x7fa185d398d7 [ 686.566952] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 686.569167] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.570118] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 686.571004] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 686.571888] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 686.572769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 686.573654] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 686.574569] [ 686.608981] syz-executor.6: attempt to access beyond end of device [ 686.608981] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 686.612040] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:30:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4300, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 686.675634] loop3: detected capacity change from 0 to 10 06:30:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 24) 06:30:44 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 26) [ 686.842245] syz-executor.6: attempt to access beyond end of device 06:30:44 executing program 7: lchown(&(0x7f00000000c0)='./file0\x00', 0xee00, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) r3 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000980)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0x10f) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c756e616d653d2c95cf9052a23dc7636f73652c64666c747569643d", @ANYRESHEX=0xee01, @ANYBLOB=',access=', @ANYRESDEC=r4, @ANYBLOB=',aname=@,fscontext=sysadm_u,dont_hash,uid=', @ANYRESDEC=r5, @ANYBLOB=',fscontext=root,uid<', @ANYRESDEC=r6, @ANYBLOB=',\x00']) lchown(&(0x7f0000000100)='./file0\x00', r6, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') getdents(r7, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r7, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r7, {0x0, 0xee00}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000080)={0x30000010}) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000000400)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000340)=""/90, 0x5a}, {&(0x7f00000007c0)=""/177, 0xb1}], 0x4, &(0x7f00000003c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}], 0x1, 0x10000, &(0x7f00000005c0)={r9, r10+60000000}) getdents64(r11, &(0x7f0000000880)=""/214, 0xd6) [ 686.842245] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:30:44 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@local, @remote, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @private1, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x27, &(0x7f0000000240)={@random="8ee0f060c7cd", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}, @val={@void, {0x8100, 0x7}}, {@generic={0x88a2, "7ef566e9defaf20dc478d24dcb70becd833d8909e9"}}}, &(0x7f0000000000)={0x0, 0x3, [0xffa, 0xda4, 0x99e, 0xfa0]}) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/38, 0x26}, {&(0x7f0000000100)=""/72, 0x48}, {&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000480)=""/144, 0x90}, {&(0x7f0000000540)=""/91, 0x5b}], 0x6, &(0x7f0000000180)=""/25, 0x19}, 0x2060) [ 686.874813] No source specified [ 686.881920] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 686.884428] No source specified [ 686.892172] syz-executor.2: attempt to access beyond end of device [ 686.892172] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 686.906823] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:30:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x800a, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 687.069258] No source specified [ 687.071669] No source specified 06:30:57 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 27) 06:30:57 executing program 7: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000700)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/192, 0xc0}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000300)}], 0x2, &(0x7f0000000380)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x108}}, {{&(0x7f00000004c0), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000540)=""/13, 0xd}], 0x1, &(0x7f00000005c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}], 0x3, 0x42, 0x0) fork() r1 = syz_open_procfs(r0, &(0x7f0000000300)='net/softnet_stat\x00') getdents(r1, 0x0, 0x0) 06:30:57 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, r0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) pread64(r1, &(0x7f00000012c0)=""/4093, 0xffd, 0x0) 06:30:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 25) 06:30:57 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:30:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:57 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:57 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0c0583b, &(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x80000000, 0xfffffffe}) r1 = socket(0xb, 0x800, 0x8) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x7, &(0x7f0000000600)=[{&(0x7f0000000140)="9904fca962785e421cb5ee6bd15950df952e94fd0bb7a7cafd981491cae8b49b4955fb5e9a10176ec266306575d562fd29e2c0a02652ab77f4080a2e39d7951825d87e89962b6dbda4b3c8b1fa353ad3f7deff432f1f416f87ab33c1c099cb984cf46037ca953207e7f62b8d94d8b6b82d9895f0c904c07289ad2618a5cde935c2992429c454600a3a23a28ca138f540bbb5d0e329c69be60a562370f432a9aa4383fcfc4735d4390cb1ec9b35d72185da66fea503521c5b520b8b7015180929f1425e24769bac1d1ec591a8c635a65b4267d2f83ffaf8513b067aa0e30d93827a9c6e", 0xe3, 0xfffffffffffffff9}, {&(0x7f0000000240)="a4b540ba86c44612fa14f12290f79db0d0366e4009caba9b179884fbf1f8912de4d58d27e4e006e80a119636d0247aaaf6e7536ca2193e5bd4efa181ec8261bb689df371ee23b6d91aab4c5418ac0dbf68eede5a6a94f2e2ab0c11b3519df10afe627031394b661e662786cfd6bc69d9f9d8637bd8c07a8d5512442093e94d1f7de8e7e95e23ba1844e750", 0x8b, 0x8}, {&(0x7f0000000300)="4691a0dbea588da5e01abe4c89c55f0988cc9a1f04d97520ba6a96cb78269af372ac645ac8368fb377f2ce3a78a365f5d433b7193a1d8deea25d94f3be6e444e824fb288c69b6b9c0e63d9ec72247ad559b625e749db2d7a44b3d5aa04d7decd64cf0d56681cc956ca045e7ee78a4c0d35b52f7e5807483855c3451542d2cd9b4cf28d3d33313bb3576f04b55a71c02cdf583f8ca69c9162029632b28ab809ed7a65afa0a2476774c363f53416e28d54b9a20f0541e9ba23c15a63f3", 0xbc, 0x9}, {&(0x7f00000003c0)="d598e3c91362649455124667ee9b0f48929806bf7a92b1ec4a0d", 0x1a, 0x2}, {&(0x7f0000000400)="480f81df86c9eb8baad4ab53284310065578990dba0f1d2cfddfea659c8333b41f18b354febe22f9f401c9fa1e44bb829c8a7fe051570fc757b7fe379e", 0x3d, 0x4}, {&(0x7f0000000440)="8e770e49932a20cf2e45a3425a0c65aff5e679796e3964ffc06c80ab7a72e82220a9458a1f4b031c053a7d4a1eb765705d80ed86128aca48bf8e78be0c73a082da4eedf84d917916c3a58ac3264c4590f2b10eb4a2577e7eb6dff8b37b554f7e0c8fcff702dd07a5bdd2ccf43cd8358dd0b2c11040ca87d935084981ebcb132d0f1fb5f744337e3f93d5a817739a86616c159efcafb6c59be73c1cab74b9eb9168", 0xa1}, {&(0x7f0000000500)="52380b60e892f8bb35f25b3206e37dd52fa4da022eb09f447684aa7e78f1f461763a34d2265221171656ed6636a1bcfebfca5c4e612a673a8ea7917fe7657dddd78ba6e98d3ac400a9176b30b85defa75489d8ae6548969093a2f501d2551a6f69d8ec589204b4f671653378238d02844b06061ed0af1ea9cf88cfc799ec224be81e903ac4be593883b36de1de440749aea51667a3ac5d458b1ccd764c729352145aae7c9881945aec7119661ee784ebc327ff53f9b5ffbc82c0ec8757074c53b26ef933d00844f1dca0828d66462c89f56f5a938fa87443f1a99f3335bba0e08f5aef935c184557e0e4cabace2201e30ea02b11343df15165", 0xf9, 0x4}], 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"]) pwrite64(r2, &(0x7f0000000700)="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", 0x1000, 0x7fff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f0000001980)={{0x1, 0x1, 0x18, r5, {0x5a1}}, './file0\x00'}) tee(r3, r3, 0x77, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000001940)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8001100}, 0xc, &(0x7f0000001900)={&(0x7f0000001880)={0x80, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x50}, 0x820) sendfile(r1, r3, &(0x7f0000000080)=0x9, 0xff) [ 700.243299] No source specified [ 700.253512] loop3: detected capacity change from 0 to 10 [ 700.261839] No source specified [ 700.273601] FAULT_INJECTION: forcing a failure. [ 700.273601] name failslab, interval 1, probability 0, space 0, times 0 [ 700.275063] CPU: 0 PID: 6689 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 700.276093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.277128] Call Trace: [ 700.277474] [ 700.277794] dump_stack_lvl+0xc1/0xf0 [ 700.278326] should_fail_ex+0x4b4/0x5b0 [ 700.278867] ? __kernfs_new_node+0xd4/0x890 [ 700.279450] should_failslab+0x9/0x20 [ 700.279968] kmem_cache_alloc+0x61/0x390 [ 700.280527] __kernfs_new_node+0xd4/0x890 [ 700.281097] ? __pfx___kernfs_new_node+0x10/0x10 [ 700.281762] ? down_write+0x11a/0x1f0 [ 700.282297] ? up_write+0x196/0x510 [ 700.282816] kernfs_new_node+0x97/0x120 [ 700.283379] __kernfs_create_file+0x55/0x350 [ 700.283984] sysfs_add_file_mode_ns+0x21c/0x440 [ 700.284619] ? __pfx_dev_attr_store+0x10/0x10 [ 700.285233] internal_create_group+0x322/0xb00 [ 700.285886] ? __pfx_internal_create_group+0x10/0x10 [ 700.286589] loop_configure+0xce5/0x1910 [ 700.287167] lo_ioctl+0x934/0x19a0 [ 700.287662] ? kmem_cache_free+0x10d/0x4d0 [ 700.288231] ? __x64_sys_openat+0x143/0x200 [ 700.288811] ? do_syscall_64+0x3f/0x90 [ 700.289352] ? __pfx_lo_ioctl+0x10/0x10 [ 700.289913] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 700.290606] ? perf_trace_lock+0xc1/0x480 [ 700.291203] ? __pfx_perf_trace_lock+0x10/0x10 [ 700.291901] ? __lock_acquire+0xc3f/0x6340 [ 700.292497] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 700.293341] ? __pfx_do_sys_openat2+0x10/0x10 [ 700.293978] ? find_held_lock+0x2c/0x110 [ 700.294540] ? do_syscall_64+0x3f/0x90 [ 700.295074] ? lock_release+0x1e3/0x680 [ 700.295616] ? __pfx_lo_ioctl+0x10/0x10 [ 700.296166] blkdev_ioctl+0x2e4/0x750 [ 700.296691] ? __pfx_blkdev_ioctl+0x10/0x10 [ 700.297277] ? selinux_file_ioctl+0xba/0x270 [ 700.297895] ? __pfx_blkdev_ioctl+0x10/0x10 [ 700.298484] __x64_sys_ioctl+0x1a4/0x210 [ 700.299038] do_syscall_64+0x3f/0x90 [ 700.299574] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 700.300279] RIP: 0033:0x7f7ed559b8d7 [ 700.300791] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.303069] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 700.304089] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed559b8d7 [ 700.305029] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 700.305990] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 700.306933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 700.307884] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 700.308850] 06:30:57 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') pread64(r0, &(0x7f0000000100)=""/4096, 0x1000, 0x4) getdents(r0, 0x0, 0x0) 06:30:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 700.317471] FAULT_INJECTION: forcing a failure. [ 700.317471] name failslab, interval 1, probability 0, space 0, times 0 [ 700.319065] CPU: 0 PID: 6696 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 700.320104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.321153] Call Trace: [ 700.321501] [ 700.321823] dump_stack_lvl+0xc1/0xf0 [ 700.322353] should_fail_ex+0x4b4/0x5b0 [ 700.322894] ? __kernfs_new_node+0xd4/0x890 [ 700.323486] should_failslab+0x9/0x20 [ 700.324004] kmem_cache_alloc+0x61/0x390 [ 700.324564] __kernfs_new_node+0xd4/0x890 [ 700.325140] ? __pfx___kernfs_new_node+0x10/0x10 [ 700.325823] ? down_write+0x11a/0x1f0 [ 700.326361] ? up_write+0x196/0x510 [ 700.326879] kernfs_new_node+0x97/0x120 [ 700.327433] __kernfs_create_file+0x55/0x350 [ 700.328046] sysfs_add_file_mode_ns+0x21c/0x440 [ 700.328681] ? __pfx_dev_attr_store+0x10/0x10 [ 700.329317] internal_create_group+0x322/0xb00 [ 700.329961] ? __pfx_internal_create_group+0x10/0x10 [ 700.330697] loop_configure+0xce5/0x1910 [ 700.331271] lo_ioctl+0x934/0x19a0 [ 700.331794] ? kmem_cache_free+0x10d/0x4d0 [ 700.332372] ? __x64_sys_openat+0x143/0x200 [ 700.332980] ? do_syscall_64+0x3f/0x90 [ 700.333525] ? __pfx_lo_ioctl+0x10/0x10 [ 700.334114] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 700.334803] ? perf_trace_lock+0xc1/0x480 [ 700.335396] ? __pfx_perf_trace_lock+0x10/0x10 [ 700.336040] ? __lock_acquire+0xc3f/0x6340 [ 700.336653] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 700.337518] ? __pfx_do_sys_openat2+0x10/0x10 [ 700.338158] ? find_held_lock+0x2c/0x110 [ 700.338744] ? do_syscall_64+0x3f/0x90 [ 700.339306] ? lock_release+0x1e3/0x680 [ 700.339868] ? __pfx_lo_ioctl+0x10/0x10 [ 700.340447] blkdev_ioctl+0x2e4/0x750 [ 700.341006] ? __pfx_blkdev_ioctl+0x10/0x10 [ 700.341622] ? selinux_file_ioctl+0xba/0x270 [ 700.342258] ? __pfx_blkdev_ioctl+0x10/0x10 [ 700.342866] __x64_sys_ioctl+0x1a4/0x210 [ 700.343450] do_syscall_64+0x3f/0x90 [ 700.343996] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 700.344890] RIP: 0033:0x7fa185d398d7 [ 700.345401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.347788] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 700.348814] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 700.349769] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 700.350713] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 700.351667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 700.352611] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 700.353604] [ 700.372439] No source specified [ 700.374924] No source specified [ 700.382816] syz-executor.2: attempt to access beyond end of device [ 700.382816] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 700.383600] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 700.418560] syz-executor.6: attempt to access beyond end of device [ 700.418560] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 700.419404] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:30:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:30:57 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = fsmount(r0, 0x1, 0x84) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x540, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0x10000}}, './file1\x00'}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) pread64(r4, &(0x7f0000000000)=""/51, 0x33, 0x1000000ffc) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r5) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x18da021, &(0x7f0000000280)=ANY=[@ANYBLOB="74721f6e733d66642c726e646e6f3d", @ANYRESHEX=r5, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',aname=},cache=mmap,version=9p2000.L,fowner>', @ANYRESDEC=0xee00, @ANYBLOB=',obj_user=,\x00']) r6 = dup3(r5, r1, 0x0) fallocate(r6, 0x10, 0x1ff, 0x800) getdents(r1, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/88, 0x58) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x49, 0x7fffffff}) 06:30:57 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:30:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 26) 06:30:57 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 28) [ 700.555493] No source specified [ 700.568204] No source specified 06:30:57 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) [ 700.598708] syz-executor.2: attempt to access beyond end of device [ 700.598708] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 700.602187] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 700.631643] syz-executor.6: attempt to access beyond end of device [ 700.631643] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 700.633394] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 700.645536] loop3: detected capacity change from 0 to 10 [ 713.655667] FAULT_INJECTION: forcing a failure. [ 713.655667] name failslab, interval 1, probability 0, space 0, times 0 [ 713.657392] CPU: 0 PID: 6729 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 713.658432] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 713.659469] Call Trace: [ 713.659808] [ 713.660125] dump_stack_lvl+0xc1/0xf0 [ 713.660652] should_fail_ex+0x4b4/0x5b0 [ 713.661356] ? __kernfs_new_node+0xd4/0x890 [ 713.662147] should_failslab+0x9/0x20 [ 713.662813] kmem_cache_alloc+0x61/0x390 [ 713.663555] __kernfs_new_node+0xd4/0x890 [ 713.664318] ? __pfx___kernfs_new_node+0x10/0x10 [ 713.665171] ? down_write+0x11a/0x1f0 [ 713.665888] ? up_write+0x196/0x510 [ 713.666580] kernfs_new_node+0x97/0x120 [ 713.667291] __kernfs_create_file+0x55/0x350 [ 713.668070] sysfs_add_file_mode_ns+0x21c/0x440 [ 713.668889] ? __pfx_dev_attr_store+0x10/0x10 [ 713.669669] internal_create_group+0x322/0xb00 [ 713.670508] ? __pfx_internal_create_group+0x10/0x10 [ 713.671418] loop_configure+0xce5/0x1910 [ 713.672172] lo_ioctl+0x934/0x19a0 [ 713.672802] ? kmem_cache_free+0x10d/0x4d0 [ 713.673529] ? __x64_sys_openat+0x143/0x200 [ 713.674294] ? do_syscall_64+0x3f/0x90 [ 713.674970] ? __pfx_lo_ioctl+0x10/0x10 [ 713.675660] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 713.676820] ? __lock_acquire+0xc3f/0x6340 [ 713.677696] ? __pfx_do_sys_openat2+0x10/0x10 [ 713.678495] ? find_held_lock+0x2c/0x110 [ 713.679210] ? do_syscall_64+0x3f/0x90 [ 713.679918] ? lock_release+0x1e3/0x680 [ 713.680622] ? __pfx_lo_ioctl+0x10/0x10 [ 713.681332] blkdev_ioctl+0x2e4/0x750 [ 713.682035] ? __pfx_blkdev_ioctl+0x10/0x10 [ 713.682769] ? selinux_file_ioctl+0xba/0x270 [ 713.683552] ? __pfx_blkdev_ioctl+0x10/0x10 [ 713.684327] __x64_sys_ioctl+0x1a4/0x210 [ 713.685068] do_syscall_64+0x3f/0x90 [ 713.685774] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 713.686659] RIP: 0033:0x7fa185d398d7 [ 713.687295] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.690152] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 713.691090] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 713.691965] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 713.692817] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 713.693676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 713.694541] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 713.695430] 06:31:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:31:10 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:31:10 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:31:10 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000040)=r1, 0x1) getdents(r0, 0x0, 0x0) 06:31:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0xffffffffffffffff, 0x1141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff3a, 0x10000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) gettid() ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x5, 0x15, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:31:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 27) 06:31:10 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:31:10 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 29) [ 713.721253] FAULT_INJECTION: forcing a failure. [ 713.721253] name failslab, interval 1, probability 0, space 0, times 0 [ 713.722279] CPU: 1 PID: 6737 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 713.722968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 713.723660] Call Trace: [ 713.723898] [ 713.724097] dump_stack_lvl+0xc1/0xf0 [ 713.724453] should_fail_ex+0x4b4/0x5b0 [ 713.724811] ? __kernfs_new_node+0xd4/0x890 [ 713.725192] should_failslab+0x9/0x20 [ 713.725529] kmem_cache_alloc+0x61/0x390 [ 713.725918] __kernfs_new_node+0xd4/0x890 [ 713.726299] ? __pfx___kernfs_new_node+0x10/0x10 [ 713.726735] ? down_write+0x11a/0x1f0 [ 713.727080] ? up_write+0x196/0x510 [ 713.727420] kernfs_new_node+0x97/0x120 [ 713.727779] __kernfs_create_file+0x55/0x350 [ 713.728170] sysfs_add_file_mode_ns+0x21c/0x440 [ 713.728575] ? __pfx_dev_attr_store+0x10/0x10 [ 713.728970] internal_create_group+0x322/0xb00 [ 713.729388] ? __pfx_internal_create_group+0x10/0x10 [ 713.729861] loop_configure+0xce5/0x1910 [ 713.730236] lo_ioctl+0x934/0x19a0 [ 713.730555] ? kmem_cache_free+0x10d/0x4d0 [ 713.730938] ? __x64_sys_openat+0x143/0x200 [ 713.731314] ? do_syscall_64+0x3f/0x90 [ 713.731672] ? __pfx_lo_ioctl+0x10/0x10 [ 713.732017] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 713.732493] ? __lock_acquire+0xc3f/0x6340 [ 713.732914] ? __pfx_do_sys_openat2+0x10/0x10 [ 713.733315] ? find_held_lock+0x2c/0x110 [ 713.733672] ? do_syscall_64+0x3f/0x90 [ 713.734040] ? lock_release+0x1e3/0x680 [ 713.734407] ? __pfx_lo_ioctl+0x10/0x10 [ 713.734772] blkdev_ioctl+0x2e4/0x750 [ 713.735119] ? __pfx_blkdev_ioctl+0x10/0x10 [ 713.735503] ? selinux_file_ioctl+0xba/0x270 [ 713.735905] ? __pfx_blkdev_ioctl+0x10/0x10 [ 713.736286] __x64_sys_ioctl+0x1a4/0x210 [ 713.736656] do_syscall_64+0x3f/0x90 [ 713.737001] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 713.737431] RIP: 0033:0x7f7ed559b8d7 [ 713.737760] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.739311] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 713.739963] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed559b8d7 [ 713.740551] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 713.741160] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 713.741758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 713.742360] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 713.742990] [ 713.751621] syz-executor.2: attempt to access beyond end of device [ 713.751621] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 713.752897] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 713.753945] No source specified [ 713.757432] No source specified 06:31:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 28) 06:31:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 713.917594] syz-executor.2: attempt to access beyond end of device [ 713.917594] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 713.925387] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 713.941991] loop3: detected capacity change from 0 to 10 06:31:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) preadv(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/214, 0xd6}, {&(0x7f0000000140)=""/3, 0x3}], 0x2, 0x200, 0xff) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) r2 = socket$inet6(0xa, 0x4, 0xfffffffa) getsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) fcntl$dupfd(r3, 0x406, r4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 713.978916] syz-executor.6: attempt to access beyond end of device [ 713.978916] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 713.998157] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:31:11 executing program 7: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2, 0xee00}], {0x4, 0x2}, [{0x8, 0x2, r0}, {0x8, 0x1, 0xee01}], {0x10, 0x4}, {0x20, 0x2}}, 0x4c, 0x2) chmod(&(0x7f0000000080)='./file1\x00', 0x1b9) setgroups(0x2, &(0x7f0000000040)=[0x0, r0]) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000000)) getdents(r1, 0x0, 0x0) 06:31:11 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) [ 714.054342] No source specified [ 714.063448] No source specified 06:31:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 29) [ 714.096636] FAULT_INJECTION: forcing a failure. [ 714.096636] name failslab, interval 1, probability 0, space 0, times 0 [ 714.097599] CPU: 1 PID: 6760 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 714.098166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.098731] Call Trace: [ 714.098917] [ 714.099087] dump_stack_lvl+0xc1/0xf0 [ 714.099380] should_fail_ex+0x4b4/0x5b0 [ 714.099676] ? __kernfs_new_node+0xd4/0x890 [ 714.099991] should_failslab+0x9/0x20 [ 714.100266] kmem_cache_alloc+0x61/0x390 [ 714.100566] __kernfs_new_node+0xd4/0x890 [ 714.100874] ? __pfx___kernfs_new_node+0x10/0x10 [ 714.101219] ? down_write+0x11a/0x1f0 [ 714.101509] ? up_write+0x196/0x510 [ 714.101790] kernfs_new_node+0x97/0x120 [ 714.102086] __kernfs_create_file+0x55/0x350 [ 714.102407] sysfs_add_file_mode_ns+0x21c/0x440 [ 714.102742] ? __pfx_dev_attr_store+0x10/0x10 [ 714.103076] internal_create_group+0x322/0xb00 [ 714.103397] ? __pfx_internal_create_group+0x10/0x10 [ 714.103783] loop_configure+0xce5/0x1910 [ 714.104077] lo_ioctl+0x934/0x19a0 [ 714.104347] ? kmem_cache_free+0x10d/0x4d0 [ 714.104641] ? __x64_sys_openat+0x143/0x200 [ 714.104957] ? do_syscall_64+0x3f/0x90 [ 714.105240] ? __pfx_lo_ioctl+0x10/0x10 [ 714.105532] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 714.105910] ? perf_trace_lock+0xc1/0x480 [ 714.106217] ? __pfx_perf_trace_lock+0x10/0x10 [ 714.106540] ? __lock_acquire+0xc3f/0x6340 [ 714.106885] ? __pfx_do_sys_openat2+0x10/0x10 [ 714.107196] ? find_held_lock+0x2c/0x110 [ 714.107499] ? do_syscall_64+0x3f/0x90 [ 714.107783] ? lock_release+0x1e3/0x680 [ 714.108071] ? __pfx_lo_ioctl+0x10/0x10 [ 714.108350] blkdev_ioctl+0x2e4/0x750 [ 714.108633] ? __pfx_blkdev_ioctl+0x10/0x10 [ 714.108940] ? selinux_file_ioctl+0xba/0x270 [ 714.109261] ? __pfx_blkdev_ioctl+0x10/0x10 [ 714.109562] __x64_sys_ioctl+0x1a4/0x210 [ 714.109879] do_syscall_64+0x3f/0x90 [ 714.110146] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 714.110505] RIP: 0033:0x7f7ed559b8d7 [ 714.110762] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.111996] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 714.112492] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed559b8d7 [ 714.112990] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 714.113479] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 714.113990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 714.114479] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 714.114983] [ 714.135275] syz-executor.2: attempt to access beyond end of device [ 714.135275] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 714.138160] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:31:11 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) ioctl$VT_RESIZE(0xffffffffffffffff, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:31:11 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 30) 06:31:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 714.298328] syz-executor.2: attempt to access beyond end of device [ 714.298328] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 714.301445] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:31:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 30) [ 714.365497] No source specified [ 714.366356] No source specified [ 714.402702] syz-executor.6: attempt to access beyond end of device [ 714.402702] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 714.404893] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 715.051385] loop3: detected capacity change from 0 to 10 [ 727.464599] FAULT_INJECTION: forcing a failure. [ 727.464599] name failslab, interval 1, probability 0, space 0, times 0 [ 727.465615] CPU: 0 PID: 6783 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 727.466289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.466969] Call Trace: [ 727.467196] [ 727.467397] dump_stack_lvl+0xc1/0xf0 [ 727.467739] should_fail_ex+0x4b4/0x5b0 [ 727.468086] ? __kernfs_new_node+0xd4/0x890 [ 727.468464] should_failslab+0x9/0x20 [ 727.468794] kmem_cache_alloc+0x61/0x390 [ 727.469162] __kernfs_new_node+0xd4/0x890 [ 727.469532] ? __pfx___kernfs_new_node+0x10/0x10 [ 727.469966] ? down_write+0x11a/0x1f0 [ 727.470312] ? up_write+0x196/0x510 [ 727.470654] kernfs_new_node+0x97/0x120 [ 727.471007] __kernfs_create_file+0x55/0x350 [ 727.471397] sysfs_add_file_mode_ns+0x21c/0x440 [ 727.471811] ? __pfx_dev_attr_store+0x10/0x10 [ 727.472213] internal_create_group+0x322/0xb00 [ 727.472623] ? __pfx_internal_create_group+0x10/0x10 [ 727.473076] loop_configure+0xce5/0x1910 [ 727.473452] lo_ioctl+0x934/0x19a0 [ 727.473780] ? kmem_cache_free+0x10d/0x4d0 [ 727.474153] ? __x64_sys_openat+0x143/0x200 [ 727.474532] ? do_syscall_64+0x3f/0x90 [ 727.474877] ? __pfx_lo_ioctl+0x10/0x10 [ 727.475233] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 727.475695] ? __lock_acquire+0xc3f/0x6340 [ 727.476098] ? __pfx_do_sys_openat2+0x10/0x10 [ 727.476492] ? find_held_lock+0x2c/0x110 [ 727.476848] ? do_syscall_64+0x3f/0x90 [ 727.477196] ? lock_release+0x1e3/0x680 [ 727.477537] ? __pfx_lo_ioctl+0x10/0x10 [ 727.477903] blkdev_ioctl+0x2e4/0x750 [ 727.478452] ? __pfx_blkdev_ioctl+0x10/0x10 [ 727.478823] ? selinux_file_ioctl+0xba/0x270 [ 727.479211] ? __pfx_blkdev_ioctl+0x10/0x10 [ 727.479592] __x64_sys_ioctl+0x1a4/0x210 [ 727.479953] do_syscall_64+0x3f/0x90 [ 727.480288] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.480729] RIP: 0033:0x7fa185d398d7 [ 727.481043] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.482528] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 727.483146] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 727.483730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 727.484317] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 727.484902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 727.485487] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 727.486096] 06:31:24 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x5, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) 06:31:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) write(r1, &(0x7f0000000040)="4676e2b7f1dd1563ef22e549585e7029136644f4a18425c93af6dc1b093af14067fa43d7", 0x24) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r3 = dup3(r0, 0xffffffffffffffff, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x3ffffffffffff13, 0x0) shutdown(r4, 0x1) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000140)=[r4], 0x1) getpgid(0xffffffffffffffff) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8982, &(0x7f0000000000)={0x6, 'veth1_to_team\x00', {}, 0xfff}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x450800, 0x48) setsockopt$inet_udp_int(r3, 0x11, 0xa, &(0x7f0000000100)=0x6, 0x4) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x2, 0x3, 0x82, 0x0, 0x0, 0x0, 0x10a0, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xf8, 0x1, @perf_config_ext={0x80000000000000}, 0x4000, 0x7, 0x4, 0x9, 0x2, 0x1, 0x3, 0x0, 0x2, 0x0, 0x8001}, 0x0, 0x8, 0xffffffffffffffff, 0x8) 06:31:24 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) ioctl$VT_RESIZE(0xffffffffffffffff, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:31:24 executing program 1: r0 = add_key(&(0x7f0000000000)='id_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0xee00) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 06:31:24 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:31:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 31) 06:31:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 31) 06:31:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 727.491185] FAULT_INJECTION: forcing a failure. [ 727.491185] name failslab, interval 1, probability 0, space 0, times 0 [ 727.492183] CPU: 0 PID: 6784 Comm: syz-executor.2 Not tainted 6.5.0-rc1-next-20230712 #1 [ 727.492856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.493527] Call Trace: [ 727.493754] [ 727.493961] dump_stack_lvl+0xc1/0xf0 [ 727.494300] should_fail_ex+0x4b4/0x5b0 [ 727.494651] ? __kernfs_new_node+0xd4/0x890 [ 727.495028] should_failslab+0x9/0x20 [ 727.495364] kmem_cache_alloc+0x61/0x390 [ 727.495726] __kernfs_new_node+0xd4/0x890 [ 727.496101] ? __pfx___kernfs_new_node+0x10/0x10 [ 727.496525] ? down_write+0x11a/0x1f0 [ 727.496868] ? up_write+0x196/0x510 [ 727.497202] kernfs_new_node+0x97/0x120 [ 727.497557] __kernfs_create_file+0x55/0x350 [ 727.497951] sysfs_add_file_mode_ns+0x21c/0x440 [ 727.498358] ? __pfx_dev_attr_store+0x10/0x10 [ 727.498760] internal_create_group+0x322/0xb00 [ 727.499172] ? __pfx_internal_create_group+0x10/0x10 [ 727.499628] loop_configure+0xce5/0x1910 [ 727.500004] lo_ioctl+0x934/0x19a0 [ 727.500329] ? kmem_cache_free+0x10d/0x4d0 [ 727.500692] ? __x64_sys_openat+0x143/0x200 [ 727.501069] ? do_syscall_64+0x3f/0x90 [ 727.501411] ? __pfx_lo_ioctl+0x10/0x10 [ 727.501758] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 727.502228] ? __lock_acquire+0xc3f/0x6340 [ 727.502630] ? __pfx_do_sys_openat2+0x10/0x10 [ 727.503017] ? find_held_lock+0x2c/0x110 [ 727.503376] ? do_syscall_64+0x3f/0x90 [ 727.503725] ? lock_release+0x1e3/0x680 [ 727.504072] ? __pfx_lo_ioctl+0x10/0x10 [ 727.504424] blkdev_ioctl+0x2e4/0x750 [ 727.504765] ? __pfx_blkdev_ioctl+0x10/0x10 [ 727.505145] ? selinux_file_ioctl+0xba/0x270 [ 727.505540] ? __pfx_blkdev_ioctl+0x10/0x10 [ 727.505927] __x64_sys_ioctl+0x1a4/0x210 [ 727.506284] do_syscall_64+0x3f/0x90 [ 727.506615] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 727.507054] RIP: 0033:0x7f7ed559b8d7 [ 727.507371] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 727.508835] RSP: 002b:00007f7ed2b10f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 727.509461] RAX: ffffffffffffffda RBX: 00007f7ed55e5970 RCX: 00007f7ed559b8d7 [ 727.510052] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 727.510638] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 727.511230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 727.511815] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 727.512418] [ 727.517486] process 'syz-executor.1' launched './file0' with NULL argv: empty string added [ 727.524240] No source specified [ 727.529212] No source specified 06:31:24 executing program 1: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) fsmount(0xffffffffffffffff, 0x0, 0xf0) move_mount(r0, &(0x7f00000007c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x0) [ 727.629030] syz-executor.6: attempt to access beyond end of device [ 727.629030] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 727.635333] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 727.658320] syz-executor.2: attempt to access beyond end of device [ 727.658320] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 727.665788] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:31:24 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x208000, 0x0) tee(r2, r2, 0x77, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) pread64(r3, &(0x7f0000000080)=""/23, 0xfffffffffffffe73, 0x3) 06:31:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:31:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x200, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="6630a98093c0a1591f84f98e684e242d14d81134fabe464e4f0d74232009416dbd86954f8914e5c8053b5845aa8d703f138c4f4af050390800430b47294b3da4aeb9e99757ce197e16401ec35d2c0dc87ca115888665e157f9", 0x59, 0x102f8733}, {&(0x7f0000000240)="c8227704", 0x4, 0x1}, {&(0x7f0000000280)="ac9e82ec731b58b8536feecd58580752ba2e005030bdb862b5ec0b7796deee71d5f471057263f99019268a72196dee58728ca6d2169539e5ab78a65cfc71ed3d215d06a8e75a4d4022891ba7b90f92cc704aaf3d837e47e6543bca53dd8536308ff8492c5314a1a02127a1442b15397d7b01c8a3dee17feea85a0873732506c086385883a311e4bc73a4c94280d642172db1c8aed8c9129e", 0x98, 0x10001}, {&(0x7f0000000380)="62c4230103509fbcb7fa21d36668fcb703b279bd5eb28ac55023b2f94d892d81ce7294446e187bd7638641c3d2f7b6631b41e1f559151e8aceee2aed7fc592cdb2c919d940f11e239f1688330a4e79f44058febd", 0x54, 0x7f}], 0x20008, &(0x7f0000000480)={[{}, {}, {'9p\x00'}, {'!*'}, {'wfdno'}, {'9p\x00'}, {'noextend'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@dont_appraise}, {@subj_type}, {@obj_role={'obj_role', 0x3d, '%'}}, {@smackfsdef={'smackfsdef', 0x3d, '!'}}, {@euid_lt={'euid<', 0xee01}}]}) openat$incfs(r0, &(0x7f0000000500)='.pending_reads\x00', 0x80, 0x100) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trrns=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',noextend,access=', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) 06:31:25 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') getdents(r1, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000000080)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) 06:31:25 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x8400, 0x0) getdents64(r1, &(0x7f0000000100)=""/254, 0xfe) [ 727.952347] No source specified [ 727.954539] No source specified 06:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:31:38 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x217b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) open_tree(r1, &(0x7f0000000100)='./file0\x00', 0x1100) ioctl$sock_bt_hci(r0, 0x400448cb, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x1, 0x3}, 0x6) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) 06:31:38 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000080)={0x5, 0x1}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom1\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 06:31:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 32) 06:31:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 32) 06:31:38 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:31:38 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) ioctl$VT_RESIZE(0xffffffffffffffff, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:31:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r1, r2]}}], 0x18}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r4}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r5}}]}}) r6 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000009f40)=0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {}, [{0x2, 0x4}, {0x2, 0x4}, {0x2, 0x2, 0xee00}], {0x4, 0x2}, [{0x8, 0x2, r8}, {0x8, 0x1, 0xee01}], {0x10, 0x4}, {0x20, 0x2}}, 0x4c, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000009f80)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="00000000000000012e41666981b13000"]) r10 = socket$nl_audit(0x10, 0x3, 0x9) r11 = perf_event_open(&(0x7f0000009fc0)={0x5, 0x80, 0x3a, 0x80, 0x54, 0x7, 0x0, 0xe69, 0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3c, 0x2, @perf_config_ext={0x2, 0x5f6e}, 0x1000, 0x0, 0x1, 0x6, 0x80000000, 0x4, 0x5, 0x0, 0x3, 0x0, 0x400}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xb) r12 = syz_io_uring_setup(0x10fb, &(0x7f000000a040)={0x0, 0xe061, 0x1, 0x0, 0x1f6}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f000000a0c0), &(0x7f000000a100)) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r13, r13, 0x77, 0x0) r14 = syz_open_dev$char_usb(0xc, 0xb4, 0xffff) sendmmsg$unix(r0, &(0x7f000000a240)=[{{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000180)="b5484e80c1e698546081ad9ad16dbd2500bbf9a385835e45ec2242f756fdb24db3c9661a471dbc845132e6fd79296800fd5220533fd6895678ef9559f8061af3eee690e98d33262454404113e7e68b16248fed13218ea00a8e344d9f2533ee91aa004b6ae6d10fb68d5e1dbcc5e168c15a256f5176d2ae833b1fcb9cdf7c3095f74d8016bef56a5ecb015ecb5bdacd", 0x8f}, {&(0x7f0000000240)="ee6daf875777f62061349856877ea1427b8b9f7357af3faca9a8000805ead13b59c095a1a179599683668f7f7fda0f81c8b833c998bcb39684b774ba25e483abd4912150de275d88d1d7958b21182c7cb7217322d00b0e6be53c901feee2de375d557ccf6b86a7ab0aae5c9400b91708522fd17c4329b77fe67ef938aa99e9cc80874b573e3fa0bdba77", 0x8a}, {&(0x7f0000000400)="36e461d3452a19e7c30eb353e43fff75a47ad2011a20e9917ae14af0b201255315cb2e02c780c8053233515741c1798ac5592e6cc5cf6d7950800431bd20f2a89d9b57c19482b846958872ecf67ec595bd8f9d2886e789f47d78e64bd324fc67b4f5653bd5cb4c144edb53636adf307c6bd67f6a35c223ad20056da4c9e2a8ab304f77dd4d4d10f0a61fae06d048af87d9bdd8fe3c43e298e3fb0b487bc033c7401a32cd285768aeab3f97ab7e8bb2abfaae1f315197f47ad601f735c8d34d0d071b5b99364f45adb2c647ed1173981e096988a5fc1e4b0a3d93e17de107719fa017ada90022dace35b293b7", 0xec}, {&(0x7f0000000500)="c113d483b54324ebe5006d258fe0ec74c5384c3ab4fe9976a75a092001d6f407122ff38c2a87700295f523c110934c7d87644989576a562327ba0b626f844aa7580e5cbca39b25160de5daa21a7664e608400da8ae2dab68c2d9d22e9e022ade18a85995fb4618e0fe32b7ca6a42f430124886f6b770a4a30e46af5ee4c4fd8dfd650715b87bac54a28d3d70ac5c70f9246b516669f868e947026146808caf6ebfd0c03d8afedcee1a7fdb6c4d2b04374032da0843e40e5399254218c80d5d29f522668a8344fa05ece9cb0a338bfbbc47a2472e36ef46025245d85fc290a3a00017920ac849bda6bca3d3277b8567fa16bf4be513446f", 0xf7}, {&(0x7f0000000300)="e93d897de90c5c70dc716d3fa1c45327cb35fa473378d2d0959d3ce80dbda79996f2dd039a125949e321ccd64f789d04e2daf8976115203facabae9eaa400ea36009fea0b23b5f669ba6", 0x4a}, {&(0x7f0000000600)="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", 0x1000}], 0x6, &(0x7f0000008c40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r3, 0xffffffffffffffff, r2, r3, r3, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0, 0x24000000}}, {{&(0x7f0000008d00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000008e00)=[{&(0x7f0000008d80)="10ae02aa10e116277c8f2fa1f1ac1751fe9362c5feefb4ce3b446df0c15ea08ead3599cf1b18c3b35fd97162b0c2ccebdf68a80ff83c77f2fb29cfaaed114722dd88a3dfa4d12ea505610b6a75a2ebc0684c112674a8c695d22d18ba28a0240cb066ed7245b3b0", 0x67}], 0x1, 0x0, 0x0, 0x50}}, {{&(0x7f0000008e40)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000009f00)=[{&(0x7f0000008ec0)="7a7b85e6293486d82a402f1bdffc94e90a2202ca536d2ce2d6394eda6358210722d49069cae02e99aba6baab", 0x2c}, {&(0x7f0000008f00)="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", 0x1000}], 0x2, &(0x7f0000001740)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee01, @ANYRES32=r8, @ANYBLOB="00000000240000000000000001000000010000008b3f6af749727c0b20310ed7865178062adfa68f11c5aa", @ANYRES32, @ANYRES32=r0, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r13, @ANYRES32=r14], 0xd8, 0x400000c}}], 0x3, 0x0) recvmsg$unix(r2, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@cred={{0x1c}}], 0x20}, 0x0) [ 740.922331] No source specified [ 740.923519] No source specified [ 740.953035] syz-executor.6: attempt to access beyond end of device [ 740.953035] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 740.956535] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:31:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 33) [ 741.007632] syz-executor.2: attempt to access beyond end of device [ 741.007632] loop2: rw=0, sector=64, nr_sectors = 2 limit=0 [ 741.017057] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 06:31:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1dc64285}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x80, 0x0, 0x4, 0x40, 0x0, 0x6, 0x400, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x5}, 0x2, 0xfffffffffffffffb, 0x0, 0x6, 0x7ff, 0x628e, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x3, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1c1a42, 0x0) pread64(r1, &(0x7f0000000280)=""/13, 0xd, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) pread64(r2, &(0x7f00000002c0)=""/210, 0xd2, 0x3) stat(&(0x7f0000000140)='./file1\x00', &(0x7f00000003c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472826e733d66642c7266646e7d1d726f3d", @ANYRESHEX, @ANYBLOB='\x00'/14, @ANYRESHEX, @ANYBLOB=',\x00']) [ 741.085547] FAULT_INJECTION: forcing a failure. [ 741.085547] name failslab, interval 1, probability 0, space 0, times 0 [ 741.087177] CPU: 0 PID: 6848 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 741.088220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.089202] Call Trace: [ 741.089524] [ 741.089816] dump_stack_lvl+0xc1/0xf0 [ 741.090348] should_fail_ex+0x4b4/0x5b0 [ 741.090869] ? __kernfs_new_node+0xd4/0x890 [ 741.091416] should_failslab+0x9/0x20 [ 741.091909] kmem_cache_alloc+0x61/0x390 [ 741.092464] __kernfs_new_node+0xd4/0x890 [ 741.093016] ? __pfx___kernfs_new_node+0x10/0x10 [ 741.093644] ? down_write+0x11a/0x1f0 [ 741.094190] ? up_write+0x196/0x510 [ 741.094690] kernfs_new_node+0x97/0x120 [ 741.095236] __kernfs_create_file+0x55/0x350 [ 741.095836] sysfs_add_file_mode_ns+0x21c/0x440 [ 741.096442] ? __pfx_dev_attr_store+0x10/0x10 [ 741.097045] internal_create_group+0x322/0xb00 [ 741.097655] ? __pfx_internal_create_group+0x10/0x10 [ 741.098344] loop_configure+0xce5/0x1910 [ 741.098367] loop3: detected capacity change from 0 to 10 [ 741.098897] lo_ioctl+0x934/0x19a0 [ 741.098946] ? kmem_cache_free+0x10d/0x4d0 [ 741.100332] ? __x64_sys_openat+0x143/0x200 [ 741.100902] ? do_syscall_64+0x3f/0x90 [ 741.101427] ? __pfx_lo_ioctl+0x10/0x10 [ 741.101976] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 741.102669] ? perf_trace_lock+0xc1/0x480 [ 741.103213] ? __pfx_perf_trace_lock+0x10/0x10 [ 741.103819] ? __lock_acquire+0xc3f/0x6340 [ 741.104384] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 741.105202] ? __pfx_do_sys_openat2+0x10/0x10 [ 741.105798] ? find_held_lock+0x2c/0x110 [ 741.106354] ? do_syscall_64+0x3f/0x90 [ 741.106877] ? lock_release+0x1e3/0x680 [ 741.107397] ? __pfx_lo_ioctl+0x10/0x10 [ 741.107924] blkdev_ioctl+0x2e4/0x750 [ 741.108432] ? __pfx_blkdev_ioctl+0x10/0x10 [ 741.108993] ? selinux_file_ioctl+0xba/0x270 [ 741.109594] ? __pfx_blkdev_ioctl+0x10/0x10 [ 741.110185] __x64_sys_ioctl+0x1a4/0x210 [ 741.110725] do_syscall_64+0x3f/0x90 [ 741.111227] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 741.111883] RIP: 0033:0x7fa185d398d7 [ 741.112357] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.114568] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 741.115508] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 741.116387] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 741.117365] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 741.118334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 741.119218] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 741.120118] [ 741.168717] syz-executor.6: attempt to access beyond end of device [ 741.168717] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 741.169520] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 741.181628] syz_tun: entered promiscuous mode [ 741.202532] No source specified 06:31:38 executing program 7: getdents(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000)={0x7, "a1f050"}, 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000140)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0xb5a, r1, &(0x7f0000000040)="4ed0b95684dc5a775a5f2bca1cbf15e2aadc26247a613d4471f9097673bf9f14cb18497ec887", 0x26, 0x3, 0x0, 0x3, r2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x429, r0, &(0x7f00000000c0)="78206f3e4938040bb6f728abfa2ed231ed2ca2d363", 0x15, 0xffffffff, 0x0, 0x2, r0}]) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @broadcast}, 0x10) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000080)={r6, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000002f00)={@mcast2, 0x0}, &(0x7f0000002f40)=0x14) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000080)={r9, 0x1, 0x6, @broadcast}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003a40)={&(0x7f0000002f80)=ANY=[@ANYBLOB="b80a0000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fbdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0c0102804c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000f00004000800000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140202803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000034000400000808040100000001040608090000001f0058007f0000000500027f08000000090004400800000003001f8100040000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000400000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3802028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff030000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000300000008000600", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3c01028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400a400000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400460000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d000008000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="7c00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0400028008000100", @ANYRES32=0x0, @ANYBLOB="400002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB], 0xab8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 06:31:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 33) 06:31:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:31:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 34) [ 741.344667] No source specified 06:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 741.386234] No source specified [ 741.388260] No source specified 06:31:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 741.626717] No source specified [ 741.629868] No source specified [ 741.638060] syz_tun: left promiscuous mode [ 741.646327] syz_tun: entered promiscuous mode [ 741.661024] syz_tun: left promiscuous mode [ 741.762865] syz-executor.6: attempt to access beyond end of device [ 741.762865] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 741.767746] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:31:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:31:50 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:31:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:31:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:31:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') getdents(r0, 0x0, 0x0) 06:31:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:31:50 executing program 0: syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344, 0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @loopback, {[], {{0x0, 0x0, r0, 0x41424344, 0x0, 0x0, 0x5, 0x8}}}}}}}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) 06:31:50 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 35) 06:31:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:31:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x2, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 753.449385] FAULT_INJECTION: forcing a failure. [ 753.449385] name failslab, interval 1, probability 0, space 0, times 0 [ 753.451043] CPU: 1 PID: 6896 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 753.452211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 753.453293] Call Trace: [ 753.453655] [ 753.453980] dump_stack_lvl+0xc1/0xf0 [ 753.454561] should_fail_ex+0x4b4/0x5b0 [ 753.455129] ? __kernfs_new_node+0xd4/0x890 [ 753.455741] should_failslab+0x9/0x20 [ 753.456279] kmem_cache_alloc+0x61/0x390 [ 753.456863] __kernfs_new_node+0xd4/0x890 [ 753.457458] ? __pfx___kernfs_new_node+0x10/0x10 [ 753.458140] ? down_write+0x11a/0x1f0 [ 753.458709] ? up_write+0x196/0x510 [ 753.459246] kernfs_new_node+0x97/0x120 [ 753.459832] __kernfs_create_file+0x55/0x350 [ 753.460462] sysfs_add_file_mode_ns+0x21c/0x440 [ 753.461117] ? __pfx_dev_attr_store+0x10/0x10 [ 753.461746] internal_create_group+0x322/0xb00 [ 753.462412] ? __pfx_internal_create_group+0x10/0x10 [ 753.463147] loop_configure+0xce5/0x1910 [ 753.463757] lo_ioctl+0x934/0x19a0 [ 753.464292] ? __pfx_lo_ioctl+0x10/0x10 [ 753.464858] ? __pfx_avc_has_extended_perms+0x10/0x10 06:31:50 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x77}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x99e}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x38}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='smaps_rollup\x00') getdents(r1, 0x0, 0x0) [ 753.465587] ? __pfx___lock_acquire+0x10/0x10 [ 753.466389] ? __lock_acquire+0xc3f/0x6340 [ 753.466977] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 753.467759] ? __pfx_lock_release+0x10/0x10 [ 753.468381] ? do_syscall_64+0x3f/0x90 [ 753.468925] ? xfd_validate_state+0x51/0x170 [ 753.469517] ? __pfx_lo_ioctl+0x10/0x10 [ 753.470064] blkdev_ioctl+0x2e4/0x750 [ 753.470599] ? __pfx_blkdev_ioctl+0x10/0x10 [ 753.471182] ? selinux_file_ioctl+0xba/0x270 [ 753.471788] ? __pfx_blkdev_ioctl+0x10/0x10 [ 753.472365] __x64_sys_ioctl+0x1a4/0x210 [ 753.472917] do_syscall_64+0x3f/0x90 [ 753.473432] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 753.474101] RIP: 0033:0x7fa185d398d7 [ 753.474608] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 753.476937] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 753.477930] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 753.478855] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 753.479790] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 753.480712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 753.481638] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 753.482613] [ 753.493277] No source specified [ 753.498793] syz-executor.6: attempt to access beyond end of device [ 753.498793] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 753.499573] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 753.519812] No source specified [ 753.528456] loop3: detected capacity change from 0 to 10 06:31:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x3, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:31:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:31:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:31:50 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 36) 06:31:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 753.639656] No source specified [ 753.658110] No source specified [ 753.672034] FAULT_INJECTION: forcing a failure. [ 753.672034] name failslab, interval 1, probability 0, space 0, times 0 [ 753.673605] CPU: 1 PID: 6912 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 753.674728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 753.675843] Call Trace: [ 753.676209] [ 753.676538] dump_stack_lvl+0xc1/0xf0 [ 753.677108] should_fail_ex+0x4b4/0x5b0 [ 753.677685] ? getname_flags.part.0+0x50/0x4f0 [ 753.678348] should_failslab+0x9/0x20 [ 753.678892] kmem_cache_alloc+0x61/0x390 [ 753.679477] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 753.680360] ? __pfx_blkdev_ioctl+0x10/0x10 [ 753.681013] ? selinux_file_ioctl+0xba/0x270 [ 753.681652] getname_flags.part.0+0x50/0x4f0 [ 753.682346] __x64_sys_mkdir+0xde/0x150 [ 753.682913] do_syscall_64+0x3f/0x90 [ 753.683464] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 753.684185] RIP: 0033:0x7fa185d38c27 [ 753.684712] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 753.687251] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 753.688242] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 753.688865] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 06:31:51 executing program 7: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x2000, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="60c13f9f3717414e4c000300", @ANYRES16=0x0, @ANYBLOB="080029bd7000ffdbdf25020000000c00030003000000000000000c000300030000000000000008000400ac1414bb0600060002000000080002000000000008000400ac141438"], 0x4c}, 0x1, 0x0, 0x0, 0x400408c4}, 0x40080) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r2, r2, 0x77, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xfffffffffffffffa}}, './file0\x00'}) [ 753.689486] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 753.690242] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 753.690998] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 753.691752] 06:32:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x3) r1 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = epoll_create(0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x8}) r4 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f00000000c0)={0x60000017}) epoll_pwait(r2, &(0x7f0000000280)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x30000000}) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) 06:32:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:32:08 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 37) 06:32:08 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getdents64(r1, &(0x7f0000001d40)=""/209, 0xd1) getdents64(r0, &(0x7f0000001e40)=""/221, 0xdd) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000000800)=""/165, 0xa5}, {&(0x7f00000008c0)=""/246, 0xf6}, {&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f00000009c0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000001a00)=""/147, 0x93}, {&(0x7f0000001ac0)=""/207, 0xcf}], 0x8) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000080)={0x3ffffff, 0x10001}) clone3(&(0x7f00000001c0)={0x173b63500, &(0x7f0000000040), 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000180)={0x3ffffff, 0x10001}) getdents(0xffffffffffffff9c, &(0x7f0000001c80)=""/177, 0xb1) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) r6 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xbf) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) 06:32:08 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') getdents(r0, 0x0, 0x0) 06:32:08 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 771.477718] No source specified [ 771.478439] No source specified [ 771.483180] FAULT_INJECTION: forcing a failure. [ 771.483180] name failslab, interval 1, probability 0, space 0, times 0 [ 771.484011] CPU: 1 PID: 6932 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 771.484550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 771.485097] Call Trace: [ 771.485282] [ 771.485441] dump_stack_lvl+0xc1/0xf0 [ 771.485724] should_fail_ex+0x4b4/0x5b0 [ 771.486007] ? __kernfs_new_node+0xd4/0x890 [ 771.486312] should_failslab+0x9/0x20 [ 771.486587] kmem_cache_alloc+0x61/0x390 [ 771.486877] __kernfs_new_node+0xd4/0x890 [ 771.487193] ? __pfx___kernfs_new_node+0x10/0x10 [ 771.487521] ? down_write+0x11a/0x1f0 [ 771.487808] ? up_write+0x196/0x510 [ 771.488073] kernfs_new_node+0x97/0x120 [ 771.488366] __kernfs_create_file+0x55/0x350 [ 771.488675] sysfs_add_file_mode_ns+0x21c/0x440 [ 771.489006] ? __pfx_dev_attr_store+0x10/0x10 [ 771.489337] internal_create_group+0x322/0xb00 [ 771.489669] ? __pfx_internal_create_group+0x10/0x10 [ 771.490033] loop_configure+0xce5/0x1910 [ 771.490330] lo_ioctl+0x934/0x19a0 [ 771.490599] ? kmem_cache_free+0x10d/0x4d0 [ 771.490894] ? __x64_sys_openat+0x143/0x200 [ 771.491198] ? do_syscall_64+0x3f/0x90 [ 771.491479] ? __pfx_lo_ioctl+0x10/0x10 [ 771.491759] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 771.492138] ? __lock_acquire+0xc3f/0x6340 [ 771.492448] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 771.492877] ? __pfx_do_sys_openat2+0x10/0x10 [ 771.493198] ? find_held_lock+0x2c/0x110 [ 771.493484] ? do_syscall_64+0x3f/0x90 [ 771.493758] ? lock_release+0x1e3/0x680 [ 771.494034] ? __pfx_lo_ioctl+0x10/0x10 [ 771.494317] blkdev_ioctl+0x2e4/0x750 [ 771.494610] ? __pfx_blkdev_ioctl+0x10/0x10 [ 771.494906] ? selinux_file_ioctl+0xba/0x270 [ 771.495223] ? __pfx_blkdev_ioctl+0x10/0x10 [ 771.495549] __x64_sys_ioctl+0x1a4/0x210 [ 771.495844] do_syscall_64+0x3f/0x90 [ 771.496129] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 771.496479] RIP: 0033:0x7fa185d398d7 [ 771.496749] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 771.497931] RSP: 002b:00007fa1832aef48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 771.498477] RAX: ffffffffffffffda RBX: 00007fa185d83970 RCX: 00007fa185d398d7 [ 771.498978] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 771.499476] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 771.499976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 771.500475] R13: 0000000000000004 R14: 00000000200001c0 R15: 0000000000000000 [ 771.500994] 06:32:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 771.551741] syz-executor.6: attempt to access beyond end of device [ 771.551741] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 771.552575] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 771.554457] No source specified [ 771.557222] No source specified [ 771.636752] audit: type=1400 audit(1689229928.965:15): avc: denied { setattr } for pid=6941 comm="syz-executor.7" name="map_files" dev="proc" ino=23918 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 771.639668] No source specified [ 771.642832] No source specified [ 771.643447] FAULT_INJECTION: forcing a failure. [ 771.643447] name failslab, interval 1, probability 0, space 0, times 0 [ 771.644222] CPU: 1 PID: 6946 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 771.644763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 771.645317] Call Trace: [ 771.645497] [ 771.645660] dump_stack_lvl+0xc1/0xf0 [ 771.645943] should_fail_ex+0x4b4/0x5b0 [ 771.646233] should_failslab+0x9/0x20 [ 771.646524] kmem_cache_alloc_lru+0x7a/0x680 [ 771.646850] ? __d_alloc+0x31/0x9c0 [ 771.647127] ? __d_alloc+0x31/0x9c0 [ 771.647392] __d_alloc+0x31/0x9c0 [ 771.647654] d_alloc+0x4a/0x1d0 [ 771.647902] lookup_one_qstr_excl+0xd0/0x190 [ 771.648234] ? mnt_want_write+0x153/0x410 [ 771.648547] filename_create+0x1da/0x4a0 [ 771.648855] ? __pfx_filename_create+0x10/0x10 [ 771.649193] ? __pfx_lock_release+0x10/0x10 [ 771.649517] ? __virt_addr_valid+0x102/0x340 [ 771.649851] do_mkdirat+0x98/0x2d0 [ 771.650121] ? __pfx_do_mkdirat+0x10/0x10 [ 771.650409] ? getname_flags.part.0+0x1dd/0x4f0 [ 771.650782] __x64_sys_mkdir+0xf6/0x150 [ 771.651058] do_syscall_64+0x3f/0x90 [ 771.651344] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 771.651697] RIP: 0033:0x7fa185d38c27 [ 771.651973] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 771.653162] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 771.653712] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 771.654216] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 771.654726] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 771.655237] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 771.655741] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 771.656264] 06:32:08 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00', &(0x7f0000000100)=']\x00', 0x2, 0x0) r1 = gettid() setpriority(0x0, r1, 0x88) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x9, 0x7, 0x8, 0x9, 0x0, 0x9, 0x1008, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xc6f, 0x2, @perf_config_ext={0x4, 0x3a34}, 0x10884, 0xfff, 0x5, 0x1, 0x1f, 0x1ff, 0x8000, 0x0, 0x5, 0x0, 0x3}, r1, 0x2, r0, 0x2) getdents(r0, 0x0, 0x0) getpid() 06:32:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:08 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 38) 06:32:09 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)={0xffffffffffffffff}) pwritev2(r0, &(0x7f0000001500)=[{&(0x7f0000000100)="2576a8e28585a4521c8d73fdbd4d17a38d34149b9fcaf25c85a24d849244edb03736fee841a771ca164fc732a3ebbf2647824dc64dc3ffff559a40c8fb6952c6e8e349eddfc132564fe890b427e12528c089eae922c235b045357e327318734b4978f38a5120c9fe5aebef6e7e58ec68bfc13ef491d75179c6c516469471bc5e121888e9d7b7f884c839d6080f240c5bc92280d1df4da19b12757a88f2ee6b37d85fd13cd8a9cbef28d2927e83b58d199b2cfef97247e5e0a5d42cf923b6d2fc8a2bff005ba2e302e1e10a8373be881375949f6a77a10e35113873ae00bcc3c2c12a381d31bc3f", 0xe7}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="6b6359239e241ad4e8d73944b05b9099ce48f5c5785abb6a0979b0a86c24534a58197a7ffcb013a3c81354fdc38e78eedd0fcc68b0134829cf97e63e67709fe924a9ecc6268126e779de504686cea2f935a697d03ae790d5fade7ce1ecb5ceaaa88f358afe697b86db71e0797a75e253dfb15e632e87f4b2c9cc7b58a4463d50ae134eafcbd7544c15b32255a5071e1cfef10a74b85dcf03338bca5b4a9ed8a50da8ac74bdcf5206f390a0b85cefb6bd2009acd365e532abd7afe13dfc8316ffbb2e07c49c10f45f4083e97c81f2d63cd8235c57ff875823ddf9e70cdbffa87d18d0015530d4be9600029f15", 0xec}, {&(0x7f0000001300)="672b4817db4941fb9ceb2a099ee6ae0386dcb385b755bf2751955f25771d49f5dd03c7df3cdf4881da893314a1f49dccd494062f2b28e7c5c8372514094f7642ecf4246e63198d0321ccc5919061faedc7aa07ed42c40b1f51de6eeb8dfa0d1f9c2a8a1d4bc701a7b8090c04f3e87fa626b1436c88387f378d6778a794cae00753dcddc3515347bd11c21a7572fb516356459a93685ae21198218c794a19891c50a7e441d314c85a16325b1d016cc0e11c8bb854818c8a570de3a800273dd8ae83b0834b7a80dd66dd51ed6bd4403ed2f80757c1ac64322723de1562af0d7955df", 0xe1}, {&(0x7f0000000040)="939e", 0x2}, {&(0x7f0000001400)="5e15cfb75a43891fea93574cd7eff8019502ee58172581da9929dcdc9d19271349fb7bb348cc6c36b8e727f277289c85ed8b26491562ee3362271137a03a21a996f8a82bc441947964ae4ae3ccdc0ec1a549be14199f3291df50fbf36c59fb22a186af9bd8ebef69bf4a7bb9d4016f0d5f0dd7042d8c", 0x76}, {&(0x7f0000000080)="df", 0x1}, {&(0x7f0000001480)="2585595afcfcc7ff97f98bff83adbc70e1d6908f4251b44e7918746ea708e4e3f4ea4006182014b91e2a606d57", 0x2d}, {&(0x7f00000014c0)='g', 0x1}], 0x9, 0x5, 0x2, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) [ 771.850641] loop3: detected capacity change from 0 to 10 06:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x24000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:23 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:23 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440", 0x12}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:32:23 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:23 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') pipe2(&(0x7f0000000000), 0x4000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) getdents(r1, 0x0, 0x0) 06:32:23 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 39) 06:32:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0xfd, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x2, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(0x0) io_getevents(0x0, 0x9, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x14f883, 0x0) close(r0) 06:32:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x5, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 786.611188] No source specified [ 786.624630] FAULT_INJECTION: forcing a failure. [ 786.624630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.626328] CPU: 0 PID: 6975 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 786.627481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.628619] Call Trace: [ 786.628996] [ 786.629336] dump_stack_lvl+0xc1/0xf0 [ 786.629921] should_fail_ex+0x4b4/0x5b0 [ 786.630514] strncpy_from_user+0x38/0x340 [ 786.631160] getname_flags.part.0+0x95/0x4f0 [ 786.631823] __x64_sys_mkdir+0xde/0x150 [ 786.632405] do_syscall_64+0x3f/0x90 [ 786.632973] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 786.633712] RIP: 0033:0x7fa185d38c27 [ 786.634249] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.636728] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 786.637780] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 786.638770] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 786.639747] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 786.640726] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 786.641705] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 786.642731] 06:32:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 786.686331] No source specified 06:32:24 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000200)={"61e1a62cc72aeffb24409c772bb9521b", 0x0, 0x0, {0x7162, 0x7}, {0x2, 0xfffffc01}, 0x365, [0x3b, 0x5, 0x0, 0x45, 0x2, 0x0, 0x8001, 0xffffffffffffc627, 0x334, 0x1, 0x800, 0x0, 0x23f, 0x193c343d, 0xec3, 0x4]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000300)={"6aecae48949a622c8075291d9a7d6d9d", 0x0, r2, {0x7, 0x800}, {0xc5f, 0x390}, 0x10001, [0x6c48, 0x9, 0x800, 0x48d, 0x2, 0x3, 0xfc7, 0x9, 0x80000001, 0x6, 0x4, 0x3, 0x6, 0xfffffffffffeffff, 0x7f, 0xd6f6]}) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/56) getdents(r0, 0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/234, 0xea, 0x9356) 06:32:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3e000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 786.742207] loop3: detected capacity change from 0 to 10 06:32:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x7, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:24 executing program 1: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x18, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 786.950719] No source specified [ 786.953002] No source specified 06:32:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 40) [ 787.029331] FAULT_INJECTION: forcing a failure. [ 787.029331] name failslab, interval 1, probability 0, space 0, times 0 [ 787.030179] CPU: 1 PID: 6999 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 787.030775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 787.031360] Call Trace: [ 787.031554] [ 787.031724] dump_stack_lvl+0xc1/0xf0 [ 787.032025] should_fail_ex+0x4b4/0x5b0 [ 787.032363] should_failslab+0x9/0x20 [ 787.032650] kmem_cache_alloc_lru+0x7a/0x680 [ 787.032980] ? ext4_alloc_inode+0x28/0x640 [ 787.033299] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 787.033641] ? ext4_alloc_inode+0x28/0x640 [ 787.033955] ext4_alloc_inode+0x28/0x640 [ 787.034258] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 787.034600] alloc_inode+0x63/0x240 [ 787.034896] new_inode+0x25/0x1f0 [ 787.035163] __ext4_new_inode+0x323/0x53d0 [ 787.035475] ? lock_acquire+0x19a/0x4c0 [ 787.035780] ? avc_has_perm_noaudit+0x148/0x3a0 [ 787.036146] ? __pfx___ext4_new_inode+0x10/0x10 [ 787.036490] ? avc_has_perm+0xfe/0x1a0 [ 787.036800] ? selinux_determine_inode_label+0x1b6/0x340 [ 787.037207] ext4_mkdir+0x33e/0xb20 [ 787.037495] ? __pfx_ext4_mkdir+0x10/0x10 [ 787.037804] ? inode_permission.part.0+0xb5/0x520 [ 787.038172] vfs_mkdir+0x24b/0x470 [ 787.038450] do_mkdirat+0x163/0x2d0 [ 787.038726] ? __pfx_do_mkdirat+0x10/0x10 [ 787.039044] ? getname_flags.part.0+0x1dd/0x4f0 [ 787.039397] __x64_sys_mkdir+0xf6/0x150 [ 787.039697] do_syscall_64+0x3f/0x90 [ 787.039990] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 787.040368] RIP: 0033:0x7fa185d38c27 [ 787.040642] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 787.041927] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 787.042470] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 787.043014] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 787.043521] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 787.044030] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 787.044543] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 787.045070] 06:32:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x65, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:36 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000140)="7fbd100000000000e9008d7a5cc5c7c0026c4b349b91f66139f893b66868aa6090546f88f61fb9aaabcabd4c038710c09f98ae45ad7f0ff9493baeb96d0b3742b1c8c38dd746284afaa1c8c95183485a94125cbd60682305cbf54e14262d9b", 0x5f, 0x4000000, &(0x7f0000000000)={0x11, 0x0, r0, 0x1, 0xfd, 0x6, @multicast}, 0x14) 06:32:36 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) ioctl$FIOCLEX(r3, 0x5451) tee(r2, r2, 0x77, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) write(r4, &(0x7f0000000940)="5df85bb472fdb7ddc730673e493805d7e428317313b3132ec2b219c482d9a3407fecfd595b12f7b6e93f393a59452b10a1dd448459354a966a8d4f2e7db0fc4cace9d7da954b7f20b1b2f74385f43b20671bb4958e5fcde6952a9fb40636e9cb8682c3e9cca5", 0x66) tee(r2, r1, 0x77, 0x4) pread64(r1, &(0x7f0000000100)=""/254, 0xfe, 0x9) r5 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1000, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000200)="c2e1f54ab3de7babb0e693d3a03c382a6f0eef8131885939e8b61b6a5d420b93740c03f2a1cc0f5b6877091458fd502a6e8ed70ed38f5edda4e1ab637ce8", 0x3e, 0x3}, {&(0x7f0000000240)="66117be1fd46742f5e9c2183fd0d85432b8fedecccda2f38314a5c8be0213e450e067965ce1226cf36109f52f764769e3141963855c3561b8fe482018c5ac39da7ae09fd359b4a146bd79d5e75384cc728bb54aaac492fcd5a32466b1ff8a1f64cb104f52ecf95b8b8356fbd26634e69afeabcbf48854454658b5be88c30216a61f290903d0d0893aaa7122f5fecfcbb1f6d4b072e2e7e82fcb4ec0ee6bca2aa45b0ef011dacbd2427a8bdd29a78b8bf40d20c8363c16f2744dfed8c535cabb140a5906f596521ab139e54d68d586a3f32409de598c13f403d895b12db47c4f82d7db67aa972b39490097425f57eec927aabe08e31dc2e6c23", 0xf9, 0x6c57a9e5}, {&(0x7f0000000340)="b2d0805bc9ddc86b021575d749ec6139d2a6605c482343464fdf5ebe4e84ddcf27d128796a4508b731baf89af7048062dcf23c7557f198e1492c70bb6cea8fbbe7101dbe8d4befd3260b4cd8a294037e15eb370fbaf441d8eff47965ca33bab5aac210be9f90010bbf", 0x69, 0x9}, {&(0x7f00000003c0)="d727c6a3647d7084311da7d2fbb21960b327a156f1d511c44491040f10f7a937d108df2b5ad32372215862d71043ffe92a8bce7ac80ffe5b9a321fffd3a8279aa2d89c8dc229668d9194bb6522a12ac637eeade7807077a1923441d7a080be77570a0e353abd9bae7ae6affd01413b81bddf0079bc4f7eb54e360e70fc4cf917161331b003b1fa103fe917431b1dd008dc6523e2f49a012af317d95ea42913524c79ff970408a0a9604dc85452f49d48cda5469d9572925236d111e717886d94eb922e6a85feba15", 0xc8, 0xfffffffffffffff3}, {&(0x7f00000004c0)="4b3ac5825f26b857000019498e70674b8c05039d227c3f8605b2e91d7601c48a1b96acdb783ee67438a5f4b820868fd9fa4109fc1ce12dfdf36a0866bb45dafdf7fdb304d068e9a8bcd81391eb6e230a42313a74d79e1f082eacbd1af5ded21b1c4b03f73198ab6d208a9265edab33595829ac0f7b1e543b296bb0d89e5669379054c331e78cf1dffe6b4fde61724b7c421273db5903d1b49fa3c93011fc84609db8dc4decfa9b76a1cf6b4d496aaf3b62fd2da95e6572f0e15320ec4e17c3d4375859c0849588f7a8581528a034c94b8d68c2e12655879fc8190434996cb76e24133658de2d01cb8cfa94f0da36090de5", 0xf1, 0x6}, {&(0x7f00000005c0)="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", 0xfa, 0x8}, {&(0x7f00000006c0)="8e3bd07198150a86a2d3a5a6d3a4a86ac68b5fe5182a384f2a706e096398abead1f34192bd03f87d5208acbdd51b8c5c46826ac0ffb93f7fab5f83766a725a09b0433c9325eeeec37bd64c4259992f2c4b0e976774da8622d86442286f71f9eb423edb81348a835038d14e729d71955a7c725013b31e0c46cc6e9fa78684af1fcaeeb7c35d95e5a1d8b3b783b696c5cac7a3ddd3aa71698521f4d5904839bf1b467b7d6d7b73742d8ff9a29b9fc06671c58a08d7631fdc1e0da8c023c0a6c28381ca90513bfe21af8f", 0xc9, 0x7}], 0x40410, &(0x7f0000000880)={[{'/dev/ptmx\x00'}, {'/dev/ptmx\x00'}], [{@smackfsroot={'smackfsroot', 0x3d, '*%'}}]}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r5, 0x80489439, &(0x7f00000008c0)) 06:32:36 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:32:36 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x43000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:36 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 41) 06:32:36 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 799.443114] FAULT_INJECTION: forcing a failure. [ 799.443114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 799.444747] CPU: 0 PID: 7012 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 799.445810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.446796] Call Trace: [ 799.447125] [ 799.447419] dump_stack_lvl+0xc1/0xf0 [ 799.447931] should_fail_ex+0x4b4/0x5b0 [ 799.448436] strncpy_from_user+0x38/0x340 [ 799.448976] getname_flags.part.0+0x95/0x4f0 [ 799.449567] __x64_sys_mkdir+0xde/0x150 [ 799.450075] do_syscall_64+0x3f/0x90 [ 799.450574] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 799.451223] RIP: 0033:0x7fa185d38c27 [ 799.451689] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.453826] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 799.454743] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 799.455626] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 799.456483] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 799.457340] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 799.458199] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 799.459082] 06:32:36 executing program 1: r0 = perf_event_open(&(0x7f0000000280)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000050}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 799.476379] No source specified [ 799.487242] No source specified [ 799.518208] loop7: detected capacity change from 0 to 231337 06:32:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xbe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x800a0000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 799.666946] loop7: detected capacity change from 0 to 231337 06:32:37 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 42) 06:32:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xe3, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:37 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r1, @ANYBLOB="00012dbd7000fddbdf25170000003400e041140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f687372000000003800018008000300010000000800030000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB="140002006d6163766c616e3100000000000000001c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000300010000000800030000000000"], 0x9c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) [ 799.936569] FAULT_INJECTION: forcing a failure. [ 799.936569] name failslab, interval 1, probability 0, space 0, times 0 [ 799.938119] CPU: 1 PID: 7032 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 799.939160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.940253] Call Trace: [ 799.940594] [ 799.940909] dump_stack_lvl+0xc1/0xf0 [ 799.941432] should_fail_ex+0x4b4/0x5b0 [ 799.941981] should_failslab+0x9/0x20 [ 799.942509] kmem_cache_alloc_lru+0x7a/0x680 [ 799.943110] ? ext4_alloc_inode+0x28/0x640 [ 799.943670] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 799.944290] ? ext4_alloc_inode+0x28/0x640 [ 799.944838] ext4_alloc_inode+0x28/0x640 [ 799.945388] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 799.946016] alloc_inode+0x63/0x240 [ 799.946522] new_inode+0x25/0x1f0 [ 799.947042] __ext4_new_inode+0x323/0x53d0 [ 799.947629] ? lock_acquire+0x19a/0x4c0 [ 799.948193] ? avc_has_perm_noaudit+0x148/0x3a0 [ 799.948819] ? __pfx___ext4_new_inode+0x10/0x10 [ 799.949444] ? avc_has_perm+0xfe/0x1a0 [ 799.950026] ? selinux_determine_inode_label+0x1b6/0x340 [ 799.950760] ext4_mkdir+0x33e/0xb20 [ 799.951260] ? __pfx_ext4_mkdir+0x10/0x10 [ 799.951788] ? inode_permission.part.0+0xb5/0x520 [ 799.952522] vfs_mkdir+0x24b/0x470 [ 799.952999] do_mkdirat+0x163/0x2d0 [ 799.953476] ? __pfx_do_mkdirat+0x10/0x10 [ 799.954003] ? getname_flags.part.0+0x1dd/0x4f0 [ 799.954604] __x64_sys_mkdir+0xf6/0x150 [ 799.955146] do_syscall_64+0x3f/0x90 [ 799.955638] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 799.956282] RIP: 0033:0x7fa185d38c27 [ 799.956742] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.958902] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 799.959821] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 799.960690] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 799.961554] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 799.962416] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 799.963305] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 799.964201] [ 799.987341] No source specified [ 800.007532] No source specified 06:32:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440408000f801", 0x17}, {0x0, 0x0, 0xa00}], 0x0, &(0x7f0000000080)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b47, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) fsmount(r1, 0x0, 0x1) [ 800.075894] syz_tun: entered promiscuous mode [ 800.077858] syz_tun: left promiscuous mode 06:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:37 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 43) 06:32:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 800.174147] syz_tun: entered promiscuous mode [ 800.175186] syz_tun: left promiscuous mode [ 800.300581] No source specified [ 800.302014] No source specified [ 800.304344] syz-executor.6: attempt to access beyond end of device [ 800.304344] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 800.305829] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:32:49 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) 06:32:49 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:32:49 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) 06:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:49 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:32:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:49 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 44) 06:32:49 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) [ 812.659589] No source specified [ 812.660508] No source specified [ 812.668056] FAULT_INJECTION: forcing a failure. [ 812.668056] name failslab, interval 1, probability 0, space 0, times 0 [ 812.669060] CPU: 1 PID: 7058 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 812.669746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 812.670434] Call Trace: [ 812.670659] [ 812.670859] dump_stack_lvl+0xc1/0xf0 [ 812.671211] should_fail_ex+0x4b4/0x5b0 [ 812.671573] ? security_inode_alloc+0x38/0x160 [ 812.671977] should_failslab+0x9/0x20 [ 812.672312] kmem_cache_alloc+0x61/0x390 [ 812.672681] security_inode_alloc+0x38/0x160 [ 812.673068] inode_init_always+0xbb2/0xea0 [ 812.673455] alloc_inode+0x84/0x240 [ 812.673777] new_inode+0x25/0x1f0 [ 812.674077] __ext4_new_inode+0x323/0x53d0 [ 812.674438] ? lock_acquire+0x19a/0x4c0 [ 812.674806] ? avc_has_perm_noaudit+0x148/0x3a0 [ 812.675240] ? __pfx___ext4_new_inode+0x10/0x10 [ 812.675648] ? avc_has_perm+0xfe/0x1a0 [ 812.676007] ? selinux_determine_inode_label+0x1b6/0x340 [ 812.676489] ext4_mkdir+0x33e/0xb20 [ 812.676826] ? __pfx_ext4_mkdir+0x10/0x10 [ 812.677177] ? inode_permission.part.0+0xb5/0x520 [ 812.677601] vfs_mkdir+0x24b/0x470 [ 812.677920] do_mkdirat+0x163/0x2d0 [ 812.678211] ? __pfx_do_mkdirat+0x10/0x10 [ 812.678568] ? getname_flags.part.0+0x1dd/0x4f0 [ 812.678943] __x64_sys_mkdir+0xf6/0x150 [ 812.679288] do_syscall_64+0x3f/0x90 [ 812.679627] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 812.680061] RIP: 0033:0x7fa185d38c27 [ 812.680378] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.681868] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 812.682429] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 812.683033] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 812.683637] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 812.684215] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 812.684806] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 812.685407] 06:32:50 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace(0x4208, r1) r2 = syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') getdents(r2, 0x0, 0x0) 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:32:50 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0xa, 0x0, &(0x7f0000000140)) [ 812.852357] No source specified [ 812.856883] No source specified 06:32:50 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 45) 06:32:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x300, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:32:50 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = io_uring_setup(0x680e, &(0x7f0000000000)={0x0, 0xe051, 0x10, 0x2, 0x15e, 0x0, r0}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 812.909282] loop3: detected capacity change from 0 to 10 [ 812.916654] syz-executor.6: attempt to access beyond end of device [ 812.916654] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:32:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000", 0x15}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 812.934361] No source specified [ 812.937556] No source specified [ 812.942384] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 812.995947] No source specified [ 812.998916] No source specified 06:33:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 46) 06:33:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x480, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd89}, 0xc0, 0x0, 0xfffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ptrace$getsig(0x4202, 0x0, 0x4, &(0x7f0000000000)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x5, 0x6, 0x3, 0x0, 0x1000, 0x20a, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x49006, 0x4, 0xba24, 0xc, 0x7, 0x8001, 0x2, 0x0, 0xe788}, 0x0, 0x9, r0, 0x2) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000040), 0x400a0, &(0x7f0000000c40)=ANY=[@ANYBLOB="2c76661c6e5de94515646e6f933d", @ANYRESHEX=r1, @ANYBLOB="b7b935aed4201d", @ANYRESHEX=r2, @ANYBLOB=',noextend,\x00']) 06:33:03 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt_acct\x00') getdents(r1, 0x0, 0x0) 06:33:03 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:33:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x541b, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)="db4bed8c30c3d0fe7d41797e351b6df412aac6685ad9478dc3a721de69f4e4bda1991cacc6d08a90c94111d7edf7156c519a1290a735e6263f1c66810ad7d36622f4c41776dc92ab399d07b7d4f92d6184d7c233257c786a9a4902", 0x5b, 0x1) tee(r1, r1, 0x77, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) openat(r2, &(0x7f0000000040)='./file1\x00', 0x2100, 0x0) 06:33:03 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 826.061053] No source specified [ 826.064783] No source specified [ 826.077867] FAULT_INJECTION: forcing a failure. [ 826.077867] name failslab, interval 1, probability 0, space 0, times 0 [ 826.078641] CPU: 1 PID: 7103 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 826.079189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 826.079747] Call Trace: [ 826.079932] [ 826.080094] dump_stack_lvl+0xc1/0xf0 [ 826.080379] should_fail_ex+0x4b4/0x5b0 [ 826.080664] ? jbd2__journal_start+0x194/0x810 [ 826.080992] should_failslab+0x9/0x20 [ 826.081264] kmem_cache_alloc+0x61/0x390 [ 826.081548] ? lock_is_held_type+0x9f/0x120 [ 826.081873] jbd2__journal_start+0x194/0x810 [ 826.082188] __ext4_journal_start_sb+0x3d7/0x560 [ 826.082525] __ext4_new_inode+0x2df9/0x53d0 [ 826.082844] ? __pfx___ext4_new_inode+0x10/0x10 [ 826.083227] ? avc_has_perm+0xfe/0x1a0 [ 826.083526] ? selinux_determine_inode_label+0x1b6/0x340 [ 826.083915] ext4_mkdir+0x33e/0xb20 [ 826.084189] ? __pfx_ext4_mkdir+0x10/0x10 [ 826.084480] ? inode_permission.part.0+0xb5/0x520 [ 826.084832] vfs_mkdir+0x24b/0x470 [ 826.085095] do_mkdirat+0x163/0x2d0 [ 826.085356] ? __pfx_do_mkdirat+0x10/0x10 [ 826.085643] ? getname_flags.part.0+0x1dd/0x4f0 [ 826.085978] __x64_sys_mkdir+0xf6/0x150 [ 826.086253] do_syscall_64+0x3f/0x90 [ 826.086527] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 826.086882] RIP: 0033:0x7fa185d38c27 [ 826.087150] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.088348] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 826.088866] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 826.089341] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 826.089812] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 826.090293] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 826.090772] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 826.091274] [ 826.091501] EXT4-fs error (device sda) in __ext4_new_inode:1083: Out of memory 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 826.145709] loop3: detected capacity change from 0 to 10 [ 826.176949] No source specified [ 826.179420] No source specified 06:33:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x500, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 47) 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 826.254003] No source specified [ 826.254837] No source specified 06:33:03 executing program 1: unshare(0x28000200) unshare(0x20020000) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc, 0x0) unshare(0x2020800) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) r3 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r4}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r6}}]}}) r7 = getgid() r8 = getgid() setresgid(r7, r8, 0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', r4, r8, 0x1000) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x8ac833, 0x0) unshare(0x20000) 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:03 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000540), r2) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x1c}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x37}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r4, 0x0, 0x0) [ 826.300903] No source specified [ 826.303260] No source specified 06:33:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r2, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r1, &(0x7f0000000140)="01", 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = epoll_create1(0x80000) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r4, 0xf505, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r3, 0x0) syz_io_uring_complete(r5) write$binfmt_script(r0, 0x0, 0xffff8000) [ 826.334191] syz-executor.6: attempt to access beyond end of device [ 826.334191] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 826.352053] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:33:03 executing program 7: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) [ 826.399515] No source specified [ 826.401590] No source specified 06:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:03 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) r2 = eventfd(0x38000) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000100)={0x0, "b074bfb73f02e6a8f97e0e1e0750ff9c"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f0000001100)={{r2}, 0x0, 0x8, @inherit={0x50, &(0x7f0000000000)={0x1, 0x1, 0x100, 0x10001, {0x18, 0x3, 0x186, 0x7, 0x4}, [0x8]}}, @devid=r4}) getdents64(r0, &(0x7f0000002200)=""/113, 0x71) getdents64(0xffffffffffffffff, &(0x7f0000002100)=""/234, 0xea) fcntl$setpipe(r0, 0x407, 0x3) [ 826.477286] No source specified [ 826.486207] No source specified 06:33:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 48) 06:33:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:15 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:33:15 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:33:15 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x3fa, 0x100, 0x70bd2a, 0x25dfdbfd, {0x1, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x10) 06:33:15 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:33:15 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x600, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 838.173723] FAULT_INJECTION: forcing a failure. [ 838.173723] name failslab, interval 1, probability 0, space 0, times 0 [ 838.174514] CPU: 1 PID: 7167 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 838.175121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 838.175742] Call Trace: [ 838.175938] [ 838.176104] dump_stack_lvl+0xc1/0xf0 [ 838.176397] should_fail_ex+0x4b4/0x5b0 [ 838.176683] ? security_inode_init_security+0x13c/0x380 [ 838.177058] should_failslab+0x9/0x20 [ 838.177349] __kmem_cache_alloc_node+0x66/0x310 [ 838.177694] ? security_inode_init_security+0x13c/0x380 [ 838.178081] ? current_umask+0x13/0x80 [ 838.178374] ? posix_acl_create.part.0+0x2b3/0x4e0 [ 838.178733] ? security_inode_init_security+0x13c/0x380 [ 838.179116] __kmalloc+0x4a/0x160 [ 838.179388] security_inode_init_security+0x13c/0x380 [ 838.179770] ? __pfx_ext4_initxattrs+0x10/0x10 [ 838.180108] ? __pfx_security_inode_init_security+0x10/0x10 [ 838.180514] ? chksum_update+0x50/0xb0 [ 838.180817] __ext4_new_inode+0x38b0/0x53d0 [ 838.181147] ? __pfx___ext4_new_inode+0x10/0x10 [ 838.181497] ? avc_has_perm+0xfe/0x1a0 [ 838.181816] ext4_mkdir+0x33e/0xb20 [ 838.182104] ? __pfx_ext4_mkdir+0x10/0x10 [ 838.182413] ? inode_permission.part.0+0xb5/0x520 [ 838.182781] vfs_mkdir+0x24b/0x470 [ 838.183053] do_mkdirat+0x163/0x2d0 [ 838.183344] ? __pfx_do_mkdirat+0x10/0x10 [ 838.183648] ? getname_flags.part.0+0x1dd/0x4f0 [ 838.184012] __x64_sys_mkdir+0xf6/0x150 [ 838.184317] do_syscall_64+0x3f/0x90 [ 838.184610] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 838.185000] RIP: 0033:0x7fa185d38c27 [ 838.185275] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 838.186584] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 838.187113] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 838.187655] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 838.188179] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 838.188701] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 838.189234] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 838.189770] [ 838.197229] No source specified [ 838.199834] No source specified 06:33:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) 06:33:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x700, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 49) 06:33:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 838.337017] No source specified [ 838.338146] No source specified 06:33:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x1800, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:15 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:33:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:15 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/dev_mcast\x00') getdents(r1, 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000005500)={0x2, 0x80, 0x5, 0x7f, 0x6, 0x7, 0x0, 0x80, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000054c0), 0xe}, 0x110, 0x8, 0x2, 0x1, 0x2, 0xd897, 0x7f, 0x0, 0x3, 0x0, 0x1}, r2, 0x9, r1, 0x2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001040), 0x82500, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f00000032c0)={0x0, 0x0, "65a337df7247e686d5e342ac20a1f992e465e496c1525716f23f731967963daeda281d28120c6c2ee50b1c8f764f169f06e18bd5820544b58d528b0ab152865371722ee8e0818aad49c0412e631d0771314f42e9277e5de2ebce2bd9d5faa57613ee62fcdb3b3e5dc09af16cc537d5971c22d91591497749184cbee727e91fde7537594130cc5898fd79a3625a65217f463184414ba4d6907fad22aaa6d2327d7cbcae0d6f38730611e0bc538deb53d016a7fe29a7964c2b0765382f95459e03a172453ab842dd4193d2daff59d6b59f040acfa0c6cfa863ac9896ef63a62cdbdb3d86592dfa062fc88066459bf6c4ef83465a96e23686e30034d3fedf48054a", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001080)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0}], 0x81, "6d4a3f74a97ae7"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000000040)={0x0, r7, "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", "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"}) recvmsg$unix(r1, &(0x7f0000003280)={&(0x7f0000002080)=@abs, 0x6e, &(0x7f0000003180)=[{&(0x7f00000042c0)=""/45, 0x2d}, {&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003140)=""/49, 0x31}], 0x3, &(0x7f00000031c0)=[@rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x10002) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000002100), 0x103082, 0x0) preadv(r10, &(0x7f0000005400)=[{&(0x7f0000004300)=""/241, 0xf1}, {&(0x7f0000004400)=""/4096, 0x1000}], 0x2, 0x9, 0x35978dd9) setpriority(0x0, r9, 0x4) getsockopt$IPT_SO_GET_REVISION_MATCH(r8, 0x0, 0x42, &(0x7f0000005440)={'IDLETIMER\x00'}, &(0x7f0000005480)=0x1e) [ 838.407512] syz-executor.6: attempt to access beyond end of device [ 838.407512] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 838.425777] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 838.454419] No source specified [ 838.459087] No source specified [ 838.503035] loop3: detected capacity change from 0 to 10 06:33:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 50) 06:33:29 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:29 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f8", 0x16}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:33:29 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:33:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x2000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:29 executing program 7: ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x5, 0x2}, 0x100, './file0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000000), &(0x7f0000000040)=0x10) getdents(r0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 06:33:29 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r1, 0x0, 0x0) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) [ 852.045661] FAULT_INJECTION: forcing a failure. [ 852.045661] name failslab, interval 1, probability 0, space 0, times 0 [ 852.046486] CPU: 1 PID: 7218 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 852.047015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.047565] Call Trace: [ 852.047745] [ 852.047903] dump_stack_lvl+0xc1/0xf0 [ 852.048182] should_fail_ex+0x4b4/0x5b0 [ 852.048457] ? sidtab_sid2str_get+0x69/0x700 [ 852.048762] ? sidtab_sid2str_get+0x180/0x700 [ 852.049072] should_failslab+0x9/0x20 [ 852.049337] __kmem_cache_alloc_node+0x66/0x310 [ 852.049658] ? sidtab_sid2str_get+0x180/0x700 [ 852.049968] ? lock_acquire+0x19a/0x4c0 [ 852.050248] ? sidtab_sid2str_get+0x180/0x700 [ 852.050559] __kmalloc_node_track_caller+0x4b/0x160 [ 852.050898] kmemdup+0x2c/0x60 [ 852.051137] sidtab_sid2str_get+0x180/0x700 [ 852.051453] sidtab_entry_to_string+0x33/0x110 [ 852.051768] security_sid_to_context_core+0x32e/0x600 [ 852.052127] selinux_inode_init_security+0x4e7/0x720 [ 852.052482] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 852.052858] ? kasan_set_track+0x25/0x30 [ 852.053140] ? __kasan_kmalloc+0x7f/0x90 [ 852.053428] security_inode_init_security+0x1a6/0x380 [ 852.053781] ? __pfx_ext4_initxattrs+0x10/0x10 [ 852.054098] ? __pfx_security_inode_init_security+0x10/0x10 [ 852.054478] ? chksum_update+0x50/0xb0 [ 852.054771] __ext4_new_inode+0x38b0/0x53d0 [ 852.055080] ? __pfx___ext4_new_inode+0x10/0x10 [ 852.055396] ? avc_has_perm+0xfe/0x1a0 [ 852.055702] ext4_mkdir+0x33e/0xb20 [ 852.055972] ? __pfx_ext4_mkdir+0x10/0x10 [ 852.056257] ? inode_permission.part.0+0xb5/0x520 [ 852.056592] vfs_mkdir+0x24b/0x470 [ 852.056853] do_mkdirat+0x163/0x2d0 [ 852.057105] ? __pfx_do_mkdirat+0x10/0x10 [ 852.057391] ? getname_flags.part.0+0x1dd/0x4f0 [ 852.057719] __x64_sys_mkdir+0xf6/0x150 [ 852.057997] do_syscall_64+0x3f/0x90 [ 852.058263] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 852.058610] RIP: 0033:0x7fa185d38c27 [ 852.058862] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.060037] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 852.060534] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 852.061000] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 852.061464] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 852.061933] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 852.062397] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 852.062883] [ 852.066208] No source specified [ 852.067108] No source specified [ 852.132326] loop3: detected capacity change from 0 to 10 06:33:41 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:41 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x6}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x9}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x3f}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x101}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2010}, 0x4000000) getdents(r0, 0x0, 0x0) 06:33:41 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:33:41 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:33:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 51) 06:33:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:33:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6500, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 864.519485] No source specified [ 864.520280] No source specified [ 864.543138] loop3: detected capacity change from 0 to 10 06:33:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 864.560372] syz-executor.6: attempt to access beyond end of device [ 864.560372] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 864.562198] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:33:41 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) [ 864.611487] No source specified [ 864.613934] No source specified 06:33:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 52) 06:33:42 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) 06:33:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 864.885500] No source specified [ 864.890615] No source specified 06:33:42 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:33:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8004, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 865.045429] FAULT_INJECTION: forcing a failure. [ 865.045429] name failslab, interval 1, probability 0, space 0, times 0 [ 865.047042] CPU: 1 PID: 7265 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 865.048125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.049206] Call Trace: [ 865.049563] [ 865.049891] dump_stack_lvl+0xc1/0xf0 [ 865.050448] should_fail_ex+0x4b4/0x5b0 [ 865.051014] ? ext4_find_extent+0xa41/0xd30 [ 865.051642] should_failslab+0x9/0x20 [ 865.052179] __kmem_cache_alloc_node+0x66/0x310 [ 865.052829] ? ext4_find_extent+0xa41/0xd30 [ 865.053441] ? ext4_find_extent+0xa41/0xd30 [ 865.054044] __kmalloc+0x4a/0x160 [ 865.054539] ext4_find_extent+0xa41/0xd30 [ 865.055123] ? __lock_acquire+0x19b1/0x6340 [ 865.055763] ext4_ext_map_blocks+0x1c7/0x5940 [ 865.056424] ? __pfx___lock_acquire+0x10/0x10 [ 865.057055] ? __pfx_mark_lock.part.0+0x10/0x10 [ 865.057716] ? perf_trace_lock+0xc1/0x480 [ 865.058322] ? jbd2_journal_dirty_metadata+0x1bf/0xdb0 [ 865.059070] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 865.059774] ? lock_acquire+0x19a/0x4c0 [ 865.060333] ? ext4_map_blocks+0x270/0x1970 [ 865.060968] ? __pfx_lock_acquire+0x10/0x10 [ 865.061576] ? ext4_es_lookup_extent+0x48c/0xad0 [ 865.062254] ? lock_release+0x1e3/0x680 [ 865.062824] ? lock_is_held_type+0x9f/0x120 [ 865.063464] ? down_read+0x1b4/0x470 [ 865.064045] ? __pfx_down_read+0x10/0x10 [ 865.064637] ? ext4_es_lookup_extent+0xc8/0xad0 [ 865.065315] ext4_map_blocks+0xaed/0x1970 [ 865.065922] ? __pfx_security_inode_init_security+0x10/0x10 [ 865.066698] ? __pfx_ext4_map_blocks+0x10/0x10 [ 865.067364] ? __brelse+0x88/0xa0 [ 865.067880] ? __ext4_new_inode+0x150/0x53d0 [ 865.068519] ext4_append+0x1b7/0x540 [ 865.069052] ? __pfx_ext4_append+0x10/0x10 [ 865.069649] ? avc_has_perm+0xfe/0x1a0 [ 865.070230] ext4_init_new_dir+0x262/0x4c0 [ 865.070832] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 865.071514] ext4_mkdir+0x3d3/0xb20 [ 865.072064] ? __pfx_ext4_mkdir+0x10/0x10 [ 865.072654] ? inode_permission.part.0+0xb5/0x520 [ 865.073349] vfs_mkdir+0x24b/0x470 [ 865.073875] do_mkdirat+0x163/0x2d0 [ 865.074400] ? __pfx_do_mkdirat+0x10/0x10 [ 865.074993] ? getname_flags.part.0+0x1dd/0x4f0 [ 865.075689] __x64_sys_mkdir+0xf6/0x150 [ 865.076262] do_syscall_64+0x3f/0x90 [ 865.076815] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 865.077526] RIP: 0033:0x7fa185d38c27 [ 865.078047] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.080438] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 865.081477] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 865.082443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 865.083400] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 865.084369] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 865.085333] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 865.086329] 06:33:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:54 executing program 1: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:33:54 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:54 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:33:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r3, 0x301, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f0000000480)={&(0x7f00000003c0)=""/160, 0xa0}) fsync(r1) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x8, 0x1f, 0x3, 0x8, 0x0, 0xf6, 0x20, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x6, 0xfffffffffffffff7}, 0x4031, 0x805, 0x7, 0x4, 0x200, 0xb5b, 0x8000, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x2, 0x7, 0x5, 0xfb, 0x0, 0xd62, 0x40000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x3f, 0x8000}, 0x200, 0x2, 0x14d8, 0x2, 0x20, 0x7fff, 0x1, 0x0, 0x1, 0x0, 0x8}, 0xffffffffffffffff, 0x2, r1, 0x9) dup(r4) 06:33:54 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000020) tee(r1, r1, 0x77, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x400000, 0x20) pread64(r1, &(0x7f0000000000)=""/112, 0x70, 0x200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r2, r2, 0x77, 0x0) sendfile(r2, r1, &(0x7f0000000100)=0xf51e, 0x5) 06:33:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 53) 06:33:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xbe00, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 877.684430] syz-executor.6: attempt to access beyond end of device [ 877.684430] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 877.686553] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 877.693721] No source specified [ 877.694532] No source specified 06:33:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xe300, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:55 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 54) 06:33:55 executing program 1: pkey_alloc(0x0, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:33:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:33:55 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') [ 877.847657] No source specified [ 877.860492] No source specified [ 877.872272] syz-executor.6: attempt to access beyond end of device [ 877.872272] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 877.881374] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:33:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:33:55 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:33:55 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 55) [ 877.981507] No source specified 06:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:33:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfeff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 878.008398] No source specified [ 878.098883] syz-executor.6: attempt to access beyond end of device [ 878.098883] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 878.108205] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:34:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:08 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:34:08 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:34:08 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f0000000080)='attr/fscreate\x00') getdents(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x800, 0x7f) pread64(r2, &(0x7f0000000040)=""/6, 0x6, 0x5f) 06:34:08 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:34:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:08 executing program 0: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, r0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:34:08 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 56) [ 891.708458] No source specified [ 891.715712] FAULT_INJECTION: forcing a failure. [ 891.715712] name failslab, interval 1, probability 0, space 0, times 0 [ 891.717306] CPU: 0 PID: 7336 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 891.718434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.719566] Call Trace: [ 891.719967] [ 891.720299] dump_stack_lvl+0xc1/0xf0 [ 891.720874] should_fail_ex+0x4b4/0x5b0 [ 891.721435] ? ext4_find_extent+0xa41/0xd30 [ 891.722040] should_failslab+0x9/0x20 [ 891.722574] __kmem_cache_alloc_node+0x66/0x310 [ 891.723221] ? ext4_find_extent+0xa41/0xd30 [ 891.723971] No source specified 06:34:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:09 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:34:09 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:34:09 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 57) 06:34:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x10040, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:09 executing program 1: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:34:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 891.724031] ? ext4_find_extent+0xa41/0xd30 [ 891.724074] __kmalloc+0x4a/0x160 [ 891.724110] ext4_find_extent+0xa41/0xd30 [ 891.724169] ext4_ext_map_blocks+0x1c7/0x5940 [ 891.724227] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 891.724268] ? kasan_quarantine_put+0x81/0x1d0 [ 891.724313] ? __pfx___lock_acquire+0x10/0x10 [ 891.724349] ? __pfx___lock_acquire+0x10/0x10 [ 891.724389] ? ext4_ext_map_blocks+0x9b6/0x5940 [ 891.724432] ? __kmem_cache_free+0xe1/0x330 [ 891.724483] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 891.724533] ? ext4_map_blocks+0x6f1/0x1970 [ 891.724592] ? __pfx_lock_acquire+0x10/0x10 [ 891.724632] ? lock_release+0x1e3/0x680 [ 891.724673] ? __pfx_lock_release+0x10/0x10 [ 891.724711] ? lock_is_held_type+0x9f/0x120 [ 891.724774] ? down_write+0x11a/0x1f0 [ 891.724824] ? __pfx_down_write+0x10/0x10 [ 891.724872] ? ext4_es_lookup_extent+0xc8/0xad0 [ 891.724922] ? ext4_es_lookup_extent+0x48c/0xad0 [ 891.724984] ext4_map_blocks+0x763/0x1970 [ 891.725045] ? __up_read+0x199/0x750 [ 891.725089] ? __pfx_ext4_map_blocks+0x10/0x10 [ 891.725141] ? __pfx___up_read+0x10/0x10 [ 891.725186] ? ext4_es_lookup_extent+0xc8/0xad0 [ 891.725258] ext4_getblk+0x62d/0x860 [ 891.725314] ? __pfx_ext4_getblk+0x10/0x10 [ 891.725374] ? __brelse+0x88/0xa0 [ 891.725419] ? __ext4_new_inode+0x150/0x53d0 [ 891.725462] ext4_bread+0x2e/0x1a0 [ 891.725518] ext4_append+0x225/0x540 [ 891.725556] ? __pfx_ext4_append+0x10/0x10 [ 891.725593] ? avc_has_perm+0xfe/0x1a0 [ 891.725659] ext4_init_new_dir+0x262/0x4c0 [ 891.725707] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 891.725767] ext4_mkdir+0x3d3/0xb20 [ 891.725818] ? __pfx_ext4_mkdir+0x10/0x10 [ 891.725855] ? inode_permission.part.0+0xb5/0x520 [ 891.725917] vfs_mkdir+0x24b/0x470 [ 891.725970] do_mkdirat+0x163/0x2d0 [ 891.726007] ? __pfx_do_mkdirat+0x10/0x10 [ 891.726045] ? getname_flags.part.0+0x1dd/0x4f0 [ 891.726097] __x64_sys_mkdir+0xf6/0x150 [ 891.726133] do_syscall_64+0x3f/0x90 [ 891.726184] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 891.726218] RIP: 0033:0x7fa185d38c27 [ 891.726241] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.726273] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 891.726306] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 891.726328] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 891.726350] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 891.726371] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 891.726392] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 891.726443] [ 891.770575] No source specified [ 891.771360] No source specified [ 891.868646] No source specified [ 891.875602] No source specified [ 891.964960] FAULT_INJECTION: forcing a failure. [ 891.964960] name failslab, interval 1, probability 0, space 0, times 0 [ 891.965054] CPU: 0 PID: 7359 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 891.965090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.965111] Call Trace: [ 891.965120] [ 891.965131] dump_stack_lvl+0xc1/0xf0 [ 891.965190] should_fail_ex+0x4b4/0x5b0 [ 891.965232] ? ext4_find_extent+0xa41/0xd30 [ 891.965275] should_failslab+0x9/0x20 [ 891.985615] No source specified [ 891.985806] __kmem_cache_alloc_node+0x66/0x310 [ 891.989577] No source specified [ 891.991817] ? ext4_find_extent+0xa41/0xd30 [ 892.007622] ? __pfx_perf_trace_lock+0x10/0x10 [ 892.007686] ? ext4_find_extent+0xa41/0xd30 [ 892.007735] __kmalloc+0x4a/0x160 [ 892.007773] ext4_find_extent+0xa41/0xd30 [ 892.009695] ext4_ext_map_blocks+0x1c7/0x5940 [ 892.010360] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 892.010402] ? kasan_quarantine_put+0x81/0x1d0 [ 892.011386] ? __pfx___lock_acquire+0x10/0x10 [ 892.012051] ? perf_trace_lock+0xc1/0x480 [ 892.012635] ? __kmem_cache_free+0xe1/0x330 [ 892.013261] ? __pfx_perf_trace_lock+0x10/0x10 [ 892.013913] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 892.014606] ? ext4_map_blocks+0x6f1/0x1970 [ 892.015239] ? __pfx_lock_acquire+0x10/0x10 [ 892.015861] ? lock_release+0x1e3/0x680 [ 892.016416] ? __pfx_lock_release+0x10/0x10 [ 892.017032] ? lock_is_held_type+0x9f/0x120 [ 892.017665] ? down_write+0x11a/0x1f0 [ 892.018234] ? __pfx_down_write+0x10/0x10 [ 892.018836] ? ext4_es_lookup_extent+0xc8/0xad0 [ 892.019496] ? ext4_es_lookup_extent+0x48c/0xad0 [ 892.020225] ext4_map_blocks+0x763/0x1970 [ 892.020845] ? __up_read+0x199/0x750 [ 892.021383] ? __pfx_ext4_map_blocks+0x10/0x10 [ 892.022050] ? __pfx___up_read+0x10/0x10 [ 892.022631] ? ext4_es_lookup_extent+0xc8/0xad0 [ 892.023337] ext4_getblk+0x62d/0x860 [ 892.023917] ? __pfx_ext4_getblk+0x10/0x10 [ 892.024517] ? __brelse+0x88/0xa0 [ 892.025042] ? __ext4_new_inode+0x150/0x53d0 [ 892.025673] ext4_bread+0x2e/0x1a0 [ 892.026223] ext4_append+0x225/0x540 [ 892.026768] ? __pfx_ext4_append+0x10/0x10 [ 892.027360] ? avc_has_perm+0xfe/0x1a0 [ 892.027975] ext4_init_new_dir+0x262/0x4c0 [ 892.028576] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 892.029267] ext4_mkdir+0x3d3/0xb20 [ 892.029820] ? __pfx_ext4_mkdir+0x10/0x10 [ 892.030402] ? inode_permission.part.0+0xb5/0x520 [ 892.031086] vfs_mkdir+0x24b/0x470 [ 892.031620] do_mkdirat+0x163/0x2d0 [ 892.032163] ? __pfx_do_mkdirat+0x10/0x10 [ 892.032741] ? getname_flags.part.0+0x1dd/0x4f0 [ 892.033408] __x64_sys_mkdir+0xf6/0x150 [ 892.033973] do_syscall_64+0x3f/0x90 [ 892.034523] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 892.035212] RIP: 0033:0x7fa185d38c27 [ 892.035751] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.038085] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 892.039112] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 892.040091] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 892.041059] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 892.042033] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 892.042999] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 892.044014] 06:34:09 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:34:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x15f) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff"], 0xa4) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 06:34:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x80000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents(r0, 0x0, 0x0) 06:34:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:34:22 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 58) [ 905.282730] FAULT_INJECTION: forcing a failure. [ 905.282730] name failslab, interval 1, probability 0, space 0, times 0 [ 905.283537] CPU: 1 PID: 7375 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 905.284106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 905.284680] Call Trace: [ 905.284863] [ 905.285034] dump_stack_lvl+0xc1/0xf0 [ 905.285321] should_fail_ex+0x4b4/0x5b0 [ 905.285615] ? ext4_mb_new_blocks+0x64a/0x4630 [ 905.285954] should_failslab+0x9/0x20 [ 905.286231] kmem_cache_alloc+0x61/0x390 [ 905.286531] ext4_mb_new_blocks+0x64a/0x4630 [ 905.286865] ? __kmem_cache_alloc_node+0x1cd/0x310 [ 905.287210] ? ext4_find_extent+0xa41/0xd30 [ 905.287516] ? kasan_set_track+0x25/0x30 [ 905.287814] ? __kasan_kmalloc+0x7f/0x90 [ 905.288128] ? ext4_cache_extents+0x68/0x2d0 [ 905.288440] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 905.288795] ? ext4_ext_search_right+0x2e3/0xbd0 [ 905.289136] ? ext4_inode_to_goal_block+0x324/0x430 [ 905.289507] ext4_ext_map_blocks+0x1e16/0x5940 [ 905.289847] ? kasan_quarantine_put+0x81/0x1d0 [ 905.290174] ? __pfx___lock_acquire+0x10/0x10 [ 905.290496] ? __pfx___lock_acquire+0x10/0x10 [ 905.290815] ? ext4_ext_map_blocks+0x9b6/0x5940 [ 905.291147] ? __kmem_cache_free+0xe1/0x330 [ 905.291461] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 905.291812] ? ext4_map_blocks+0x6f1/0x1970 [ 905.292134] ? __pfx_lock_acquire+0x10/0x10 [ 905.292441] ? lock_release+0x1e3/0x680 [ 905.292744] ? __pfx_lock_release+0x10/0x10 [ 905.293058] ? lock_is_held_type+0x9f/0x120 [ 905.293380] ? __pfx_down_write+0x10/0x10 [ 905.293683] ? ext4_es_lookup_extent+0xc8/0xad0 [ 905.294020] ? ext4_es_lookup_extent+0x48c/0xad0 [ 905.294373] ext4_map_blocks+0x763/0x1970 [ 905.294682] ? __up_read+0x199/0x750 [ 905.294960] ? __pfx_ext4_map_blocks+0x10/0x10 [ 905.295293] ? __pfx___up_read+0x10/0x10 [ 905.295588] ? ext4_es_lookup_extent+0xc8/0xad0 [ 905.295938] ext4_getblk+0x62d/0x860 [ 905.296220] ? __pfx_ext4_getblk+0x10/0x10 [ 905.296535] ? __brelse+0x88/0xa0 [ 905.296795] ? __ext4_new_inode+0x150/0x53d0 [ 905.297108] ext4_bread+0x2e/0x1a0 [ 905.297383] ext4_append+0x225/0x540 [ 905.297654] ? __pfx_ext4_append+0x10/0x10 [ 905.297958] ? avc_has_perm+0xfe/0x1a0 [ 905.298251] ext4_init_new_dir+0x262/0x4c0 [ 905.298556] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 905.298909] ext4_mkdir+0x3d3/0xb20 [ 905.299166] ? __pfx_ext4_mkdir+0x10/0x10 [ 905.299465] ? inode_permission.part.0+0xb5/0x520 [ 905.299819] vfs_mkdir+0x24b/0x470 [ 905.300079] do_mkdirat+0x163/0x2d0 [ 905.300348] ? __pfx_do_mkdirat+0x10/0x10 [ 905.300644] ? getname_flags.part.0+0x1dd/0x4f0 [ 905.300980] __x64_sys_mkdir+0xf6/0x150 [ 905.301266] do_syscall_64+0x3f/0x90 [ 905.301539] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 905.301894] RIP: 0033:0x7fa185d38c27 [ 905.302157] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 905.303314] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 905.303836] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 905.304312] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 905.304808] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 905.305295] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 905.305778] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 905.306279] [ 905.311485] No source specified [ 905.312476] No source specified [ 905.319755] loop3: detected capacity change from 0 to 10 06:34:22 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:34:22 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:34:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3e00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:34:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x200000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:22 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x1, 0x6, @broadcast}, 0x10) socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x4, 0x8, 0xca, 0xffffff01, 0x8, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8000, 0x8000, 0xffffffff, 0x8}}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20d056cff9a75f72}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="cc000000", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf251200000008000600020000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000300060000001c00018008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=r4, @ANYBLOB="08000600fbffffff5800018008000100", @ANYRES32=0x0, @ANYBLOB="00e8f700", @ANYRES32=r5, @ANYBLOB="140002006261746164765f736c6176655f31000014000200687372300000000000000000000000000800030002000000140002007465616d5f736c6176655f3100000000080008008000000008000800ff00000008000600010000000800060001000000"], 0xcc}, 0x1, 0x0, 0x0, 0x8001}, 0x817) getdents(r0, 0x0, 0x0) 06:34:22 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 59) 06:34:22 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) [ 905.471276] No source specified [ 905.472776] syz_tun: entered promiscuous mode [ 905.480847] No source specified 06:34:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='mpol=interlstatic:6-6:73/0']) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) [ 905.492269] syz-executor.6: attempt to access beyond end of device [ 905.492269] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 905.500146] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 905.503448] syz_tun: left promiscuous mode [ 905.505228] loop3: detected capacity change from 0 to 10 [ 905.518802] syz_tun: entered promiscuous mode [ 905.530894] syz_tun: left promiscuous mode [ 905.545759] tmpfs: Bad value for 'mpol' [ 905.555233] tmpfs: Bad value for 'mpol' 06:34:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, 0x0, 0x0) 06:34:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf0ffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:34:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01fc0000000000000000818008000100007a331334203f06808ee25e55cb02d180606f94aaac842354f910b05ac051cd7e5d6ca8a1aadaaec76c8008fc5767e2e508c4ebe99a6393d00bafb7d8", @ANYRES32=r4, @ANYBLOB="1c0002800c00018008000100000000000c0001800800010003000000"], 0x3c}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000080)={r6, 0x1, 0x6, @broadcast}, 0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000180)={@loopback, @loopback, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000700)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000340)={0x368, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_WOL_HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0x72, 0x3, "02640329677d160f8cc95dd6602ee3130d4db8b201e73ad8efcdcd8a12d02673b7d030c807fabb463d10ecea9a9f9e872f664f352487903baae8ef1be1e31233c464b32849969a1fd9920efe0073b5e115e5943d52f2b2b9870b6f54988891a902ad37fbaf47b047a2e3b2fafb1f"}, @ETHTOOL_A_WOL_SOPASS={0x4e, 0x3, "d260efe842bbda7fb895877badf32b8b489b7d0f58b0b8dfca1c3fa9d877b6350d9ba1093690f8814ef6b97946af76839d23f428d2d139031c81b7bff74cffc95af7c33eef3b73c98e5a"}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x184, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x45, 0x5, "c3e9e7cc5e0243b0a7e792edb0bfaf384c6288195d5d7a5612ef75979dbb4d3c0369062ab2c909fa6528416238260f9a54acba409acb0234658d4f3e3bc901d221"}, @ETHTOOL_A_BITSET_VALUE={0x1a, 0x4, "0ded6bb00b1cc14945cfd3898abf715a814d0b29fc9a"}, @ETHTOOL_A_BITSET_BITS={0x7c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '}[\xbd\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\xff\xff\xff\xff\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^#]:*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x97, 0x4, "b9fca2870887eb84c1f727de2a7f8baec227a8e8b85f9c11e21a1d69182e0bc9985438aef5250386e685f49b4705dfd6b022eebbc5218fa29f55e0cf3bee4a4cfbe460688158e34acaa5ef093eb7d0a83e86bd75b5698a0677d472f9287d37388200ec15aa414238d23f7a0cd5710f770db63f335a7458de780a110ffacf8c1d5b0efb57b85ac3f19914d13ea85320d0d6e2db"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x368}, 0x1, 0x0, 0x0, 0x4000804}, 0x20004000) pread64(r0, &(0x7f0000000240)=""/197, 0xc5, 0x4) openat(r3, &(0x7f0000000040)='./file0\x00', 0x244000, 0x110) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101042, 0x0) ftruncate(r8, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:34:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x4300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 60) 06:34:35 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:34:35 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') getdents(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getdents(r1, &(0x7f0000000080)=""/238, 0xee) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) [ 917.719176] No source specified [ 917.721569] No source specified 06:34:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x1000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 917.752577] syz_tun: entered promiscuous mode 06:34:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, 0x0, 0x0) [ 917.758074] FAULT_INJECTION: forcing a failure. [ 917.758074] name failslab, interval 1, probability 0, space 0, times 0 [ 917.759797] CPU: 0 PID: 7424 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 917.760862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.761905] Call Trace: [ 917.762253] [ 917.762563] dump_stack_lvl+0xc1/0xf0 [ 917.763105] should_fail_ex+0x4b4/0x5b0 [ 917.763647] ? ext4_mb_new_blocks+0x256c/0x4630 [ 917.764292] should_failslab+0x9/0x20 [ 917.764803] kmem_cache_alloc+0x61/0x390 [ 917.765372] ext4_mb_new_blocks+0x256c/0x4630 [ 917.766012] ? __kmem_cache_alloc_node+0x1cd/0x310 [ 917.766663] ? ext4_find_extent+0xa41/0xd30 [ 917.767248] ? kasan_set_track+0x25/0x30 [ 917.767800] ? __kasan_kmalloc+0x7f/0x90 [ 917.768374] ? ext4_cache_extents+0x68/0x2d0 [ 917.768975] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 917.769645] ? ext4_ext_search_right+0x2e3/0xbd0 [ 917.770282] ? ext4_inode_to_goal_block+0x324/0x430 [ 917.770976] ext4_ext_map_blocks+0x1e16/0x5940 [ 917.771632] ? kasan_quarantine_put+0x81/0x1d0 [ 917.772298] ? __pfx___lock_acquire+0x10/0x10 [ 917.772930] ? perf_trace_lock+0xc1/0x480 [ 917.773520] ? __kmem_cache_free+0xe1/0x330 [ 917.774125] ? __pfx_perf_trace_lock+0x10/0x10 [ 917.774740] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 917.775430] ? ext4_map_blocks+0x6f1/0x1970 [ 917.776052] ? __pfx_lock_acquire+0x10/0x10 [ 917.776640] ? lock_release+0x1e3/0x680 [ 917.777209] ? __pfx_lock_release+0x10/0x10 [ 917.777805] ? lock_is_held_type+0x9f/0x120 [ 917.778436] ? __pfx_down_write+0x10/0x10 [ 917.779029] ? ext4_es_lookup_extent+0xc8/0xad0 [ 917.779683] ? ext4_es_lookup_extent+0x48c/0xad0 [ 917.780376] ext4_map_blocks+0x763/0x1970 [ 917.780971] ? __up_read+0x199/0x750 [ 917.781500] ? __pfx_ext4_map_blocks+0x10/0x10 [ 917.782146] ? __pfx___up_read+0x10/0x10 [ 917.782715] ? ext4_es_lookup_extent+0xc8/0xad0 [ 917.783388] ext4_getblk+0x62d/0x860 [ 917.783936] ? __pfx_ext4_getblk+0x10/0x10 [ 917.784555] ? __brelse+0x88/0xa0 [ 917.785054] ? __ext4_new_inode+0x150/0x53d0 [ 917.785678] ext4_bread+0x2e/0x1a0 [ 917.786203] ext4_append+0x225/0x540 [ 917.786726] ? __pfx_ext4_append+0x10/0x10 [ 917.787307] ? avc_has_perm+0xfe/0x1a0 [ 917.787884] ext4_init_new_dir+0x262/0x4c0 [ 917.788483] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 917.789165] ext4_mkdir+0x3d3/0xb20 [ 917.789692] ? __pfx_ext4_mkdir+0x10/0x10 [ 917.790276] ? inode_permission.part.0+0xb5/0x520 06:34:35 executing program 7: keyctl$describe(0x6, 0x0, &(0x7f0000000100)=""/4096, 0x1000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r2, 0x0) r3 = syz_open_procfs(r0, &(0x7f0000000040)='net/udp\x00') getdents(r3, 0x0, 0x0) [ 917.790972] vfs_mkdir+0x24b/0x470 [ 917.791602] do_mkdirat+0x163/0x2d0 [ 917.792120] ? __pfx_do_mkdirat+0x10/0x10 [ 917.792701] ? getname_flags.part.0+0x1dd/0x4f0 [ 917.793366] __x64_sys_mkdir+0xf6/0x150 [ 917.793924] do_syscall_64+0x3f/0x90 [ 917.794461] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 917.795166] RIP: 0033:0x7fa185d38c27 [ 917.795673] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.798038] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 917.799042] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 917.799985] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 917.800941] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 917.801880] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 917.802810] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 917.803785] 06:34:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x2000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, 0x0, 0x0) [ 917.807814] loop3: detected capacity change from 0 to 10 06:34:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x800a000000000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 917.832429] syz_tun: left promiscuous mode [ 917.837979] syz_tun: entered promiscuous mode [ 917.846698] syz_tun: left promiscuous mode 06:34:35 executing program 0: r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000003240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x20100000, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chroot(&(0x7f0000000000)='./file0\x00') mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x200, 0x0) setxattr$incfs_metadata(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x2) open(&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1f, 0x0, 0x8, 0x4, 0x0, 0x100000000, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0xe224, 0xa0d}, 0x54600, 0xd3, 0x5, 0x4, 0x1, 0x5b, 0xfff, 0x0, 0x8, 0x0, 0x32}, 0x0, 0x7, r1, 0x0) 06:34:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) (fail_nth: 1) [ 917.943615] FAULT_INJECTION: forcing a failure. [ 917.943615] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 917.944437] CPU: 1 PID: 7446 Comm: syz-executor.1 Not tainted 6.5.0-rc1-next-20230712 #1 [ 917.944965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 917.945499] Call Trace: [ 917.945677] [ 917.945839] dump_stack_lvl+0xc1/0xf0 [ 917.946123] should_fail_ex+0x4b4/0x5b0 [ 917.946406] _copy_to_user+0x30/0xc0 [ 917.946666] simple_read_from_buffer+0xd0/0x170 [ 917.946994] proc_fail_nth_read+0x1a2/0x240 [ 917.947295] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 917.947626] ? security_file_permission+0xb5/0xe0 [ 917.947986] vfs_read+0x1de/0x8f0 [ 917.948247] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 917.948576] ? __pfx_vfs_read+0x10/0x10 [ 917.948858] ? __fget_files+0x267/0x480 [ 917.949162] ksys_read+0x122/0x250 [ 917.949413] ? __pfx_ksys_read+0x10/0x10 [ 917.949689] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 917.950042] do_syscall_64+0x3f/0x90 [ 917.950308] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 917.950652] RIP: 0033:0x7fe89ff2769c [ 917.950903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 917.952067] RSP: 002b:00007fe89d4ea170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 917.952570] RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 00007fe89ff2769c [ 917.953044] RDX: 000000000000000f RSI: 00007fe89d4ea1e0 RDI: 0000000000000004 [ 917.953533] RBP: 00007fe89d4ea1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.954020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.954510] R13: 00007ffee726cd1f R14: 00007fe89d4ea300 R15: 0000000000022000 [ 917.955005] 06:34:35 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2141135a248505a6}, 0x0, 0x0, 0x9, 0x0, 0x6b28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x5, 0x9, 0x1, 0x4, 0x0, 0x40, 0xa0000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffff6d, 0x2, @perf_bp={&(0x7f0000000100)}, 0x2, 0x8000, 0x4, 0x1, 0x1, 0x7d48, 0x6, 0x0, 0x2, 0x0, 0x8}, r2, 0x8, 0xffffffffffffffff, 0x9) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000680), 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000180)={0x6, 'rose0\x00', {}, 0x1002}) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000040)=0x7) 06:34:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 61) [ 918.006726] No source specified [ 918.030356] No source specified [ 918.187476] FAULT_INJECTION: forcing a failure. [ 918.187476] name failslab, interval 1, probability 0, space 0, times 0 [ 918.188386] CPU: 1 PID: 7457 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 918.188952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 918.189525] Call Trace: [ 918.189753] [ 918.189923] dump_stack_lvl+0xc1/0xf0 [ 918.190229] should_fail_ex+0x4b4/0x5b0 [ 918.190538] ? ext4_mb_new_blocks+0x256c/0x4630 [ 918.190889] should_failslab+0x9/0x20 [ 918.191178] kmem_cache_alloc+0x61/0x390 [ 918.191494] ext4_mb_new_blocks+0x256c/0x4630 [ 918.191853] ? __kmem_cache_alloc_node+0x1cd/0x310 [ 918.192234] ? ext4_find_extent+0xa41/0xd30 [ 918.192568] ? kasan_set_track+0x25/0x30 [ 918.192881] ? __kasan_kmalloc+0x7f/0x90 [ 918.193188] ? ext4_cache_extents+0x68/0x2d0 [ 918.193528] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 918.193897] ? ext4_ext_search_right+0x2e3/0xbd0 [ 918.194266] ? ext4_inode_to_goal_block+0x324/0x430 [ 918.194661] ext4_ext_map_blocks+0x1e16/0x5940 [ 918.195017] ? kasan_quarantine_put+0x81/0x1d0 [ 918.195369] ? __pfx___lock_acquire+0x10/0x10 [ 918.195714] ? perf_trace_lock+0xc1/0x480 [ 918.196031] ? __kmem_cache_free+0xe1/0x330 [ 918.196367] ? __pfx_perf_trace_lock+0x10/0x10 [ 918.196706] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 918.197080] ? ext4_map_blocks+0x6f1/0x1970 [ 918.197415] ? __pfx_lock_acquire+0x10/0x10 [ 918.197749] ? lock_release+0x1e3/0x680 [ 918.198047] ? __pfx_lock_release+0x10/0x10 [ 918.198368] ? lock_is_held_type+0x9f/0x120 [ 918.198711] ? __pfx_down_write+0x10/0x10 [ 918.199025] ? ext4_es_lookup_extent+0xc8/0xad0 [ 918.199375] ? ext4_es_lookup_extent+0x48c/0xad0 [ 918.199752] ext4_map_blocks+0x763/0x1970 [ 918.200074] ? __up_read+0x199/0x750 [ 918.200364] ? __pfx_ext4_map_blocks+0x10/0x10 [ 918.200714] ? __pfx___up_read+0x10/0x10 [ 918.201021] ? ext4_es_lookup_extent+0xc8/0xad0 [ 918.201385] ext4_getblk+0x62d/0x860 [ 918.201677] ? __pfx_ext4_getblk+0x10/0x10 [ 918.202010] ? __brelse+0x88/0xa0 [ 918.202275] ? __ext4_new_inode+0x150/0x53d0 [ 918.202608] ext4_bread+0x2e/0x1a0 [ 918.202884] ext4_append+0x225/0x540 [ 918.203167] ? __pfx_ext4_append+0x10/0x10 [ 918.203475] ? avc_has_perm+0xfe/0x1a0 [ 918.203788] ext4_init_new_dir+0x262/0x4c0 [ 918.204100] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 918.204474] ext4_mkdir+0x3d3/0xb20 [ 918.204766] ? __pfx_ext4_mkdir+0x10/0x10 [ 918.205074] ? inode_permission.part.0+0xb5/0x520 [ 918.205450] vfs_mkdir+0x24b/0x470 [ 918.205728] do_mkdirat+0x163/0x2d0 [ 918.206003] ? __pfx_do_mkdirat+0x10/0x10 [ 918.206312] ? getname_flags.part.0+0x1dd/0x4f0 [ 918.206673] __x64_sys_mkdir+0xf6/0x150 [ 918.206972] do_syscall_64+0x3f/0x90 [ 918.207261] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 918.207641] RIP: 0033:0x7fa185d38c27 [ 918.207915] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 918.209196] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 918.209738] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 918.210252] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 918.210769] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 918.211286] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 918.211801] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 918.212334] 06:34:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x3000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:48 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) [ 931.077346] loop3: detected capacity change from 0 to 10 [ 931.086039] No source specified [ 931.091944] No source specified 06:34:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:34:48 executing program 7: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000200)=0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7) tee(r2, r2, 0x77, 0x0) pwrite64(r2, &(0x7f0000000080)="4490a563b28d0d0834e84dae9ba0348009ec494cd9cdecda40da453e4150d08d67b3dd6c5207446e796230b549522d7e956ed7cbf4680a490467d968b635d5625c25a00f90f923f9d0bcf646589359aec01066d5857ef35087d38098e0f07563de4587d3e3116f9b3e33425c9ac878a5fc0de02b03e88c76ea487074d8e3aa24349115a1656a27d7e81eca15164a974db0bedd943f100dab70a0088ff587ae562a86215a619d62e19dbb", 0xaa, 0x5) getdents(r1, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.events\x00', 0x0, 0x0) fallocate(r4, 0x40, 0x0, 0x1ff) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000140)={0x6, 0x2, 0xff}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x62d01, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000180)) 06:34:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 62) 06:34:48 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:34:48 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2141135a248505a6}, 0x0, 0x0, 0x9, 0x0, 0x6b28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x5, 0x9, 0x1, 0x4, 0x0, 0x40, 0xa0000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffff6d, 0x2, @perf_bp={&(0x7f0000000100)}, 0x2, 0x8000, 0x4, 0x1, 0x1, 0x7d48, 0x6, 0x0, 0x2, 0x0, 0x8}, r2, 0x8, 0xffffffffffffffff, 0x9) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000680), 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000180)={0x6, 'rose0\x00', {}, 0x1002}) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000040)=0x7) 06:34:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x18) [ 931.127405] syz-executor.6: attempt to access beyond end of device [ 931.127405] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 931.128285] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:34:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:34:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:34:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 63) 06:34:48 executing program 7: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') pipe2(&(0x7f0000000000), 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1, 0x80000) getdents(r0, 0x0, 0x0) [ 931.235916] No source specified [ 931.241221] No source specified [ 931.317371] FAULT_INJECTION: forcing a failure. [ 931.317371] name failslab, interval 1, probability 0, space 0, times 0 [ 931.318334] CPU: 1 PID: 7490 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 931.318949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 931.319487] Call Trace: [ 931.319666] [ 931.319830] dump_stack_lvl+0xc1/0xf0 [ 931.320110] should_fail_ex+0x4b4/0x5b0 [ 931.320404] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 931.320768] should_failslab+0x9/0x20 [ 931.321035] kmem_cache_alloc+0x61/0x390 [ 931.321423] jbd2_journal_add_journal_head+0x367/0x5d0 [ 931.321896] jbd2_journal_get_create_access+0x44/0x560 [ 931.322323] ? lock_is_held_type+0x9f/0x120 [ 931.322628] __ext4_journal_get_create_access+0x54/0x1f0 [ 931.323002] ext4_getblk+0x374/0x860 [ 931.323275] ? __pfx_ext4_getblk+0x10/0x10 [ 931.323577] ? __brelse+0x88/0xa0 [ 931.323827] ? __ext4_new_inode+0x150/0x53d0 [ 931.324129] ext4_bread+0x2e/0x1a0 [ 931.324407] ext4_append+0x225/0x540 [ 931.324676] ? __pfx_ext4_append+0x10/0x10 [ 931.324969] ? avc_has_perm+0xfe/0x1a0 [ 931.325257] ext4_init_new_dir+0x262/0x4c0 [ 931.325553] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 931.325888] ext4_mkdir+0x3d3/0xb20 [ 931.326150] ? __pfx_ext4_mkdir+0x10/0x10 [ 931.326446] ? inode_permission.part.0+0xb5/0x520 [ 931.326810] vfs_mkdir+0x24b/0x470 [ 931.327080] do_mkdirat+0x163/0x2d0 [ 931.327349] ? __pfx_do_mkdirat+0x10/0x10 [ 931.327646] ? getname_flags.part.0+0x1dd/0x4f0 [ 931.327980] __x64_sys_mkdir+0xf6/0x150 [ 931.328264] do_syscall_64+0x3f/0x90 [ 931.328544] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 931.328914] RIP: 0033:0x7fa185d38c27 [ 931.329176] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 931.330405] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 931.330926] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d38c27 [ 931.331412] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200004c0 [ 931.331904] RBP: 00007fa1832af040 R08: 0000000000000000 R09: ffffffffffffffff [ 931.332386] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000280 [ 931.332881] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 931.333384] [ 931.333634] ENOMEM in journal_alloc_journal_head, retrying. [ 931.356567] syz-executor.6: attempt to access beyond end of device [ 931.356567] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 931.358645] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 932.398506] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 932.399961] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 932.401065] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 932.402096] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 932.403233] blk_print_req_error: 345 callbacks suppressed [ 932.403253] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 31 prio class 2 06:35:01 executing program 0: syz_emit_ethernet(0x10c6, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd65d2495110903a0000000000000000000000000000000000ff0200000000000000000000000000013c00001965000000000802e10000000020010000000000000000000000000000fe8000000000000000000000000000aafc020000000000000000000000000000fe8000000000000000000000000000aa010090780600000062996eb9eb7d2e0000000000000000000000ffffac1414aa00000000000000000000000000000001320000000000000004010605020008005679023472237773e0876bdd95ed8d06bb43cfe8d838faff602b28c93548e13598e681d2ce9d8c7f74e76864b7617d93dc56eda3019b5e3b3d476cd2b1d55a6637f897a634ce7b02e098287812521236180eb4455c559257623528cf83df705e5661f1fd1a403146627ffddf9a1f03faa4c059dd8e5703925cf5036bae03bbf6b9a58e0cabfab2673ae1e10244a98404f76f4731205ef127079a6ef910465d8a342b46fd54134bc38ac87f3baac9ef91def80b6f4b8959a0621b219590c12a48ee591f3a5315c444c259c6931d4e24095cf55194645241ffccc8a4e5ff7b7c7fbad036c0921cf783bf5851172b2e31e6dfce5c09007b30536aa5fdd8bd1bdf83386327ee620d9e174bf780b6afe52b40499ba094c8591d1908d339a8f4ed5749b9a9f65e51db8e989f8d0c0dd9b7c6c2d23fe65d305478c8c383b196db32b08ed06c5eea48af666138259f6527111da01ebef10187999d154a29d7eef0c688ca52b1d628abc7829f5cde8b546fe4183cc211cbbfb0e88bc38265661e35ec80441dc2ce2e0894973ba55520f6953064c99c4b7bc8a526bf3d0774a5b306cfbac14187a641ea1521ba11885ab59248b76d39eab1f9a5610b2858463e01d6e42d21c26b179fe6162d9c54d0f520f986d2f88539ac228885dbe498c19a98dd6e6a1292c55c967ddc9b43fef35c4c7e43cf25142a06e50d809fd2878faa67934005bd99c00c08fef81d26d55c8f07d543a402bf9e09329f2fcf9c7c5fd8dd0ca91cad7a8f18165a02e08778931d13536a589ec8abf28fcc0a2de39fb8226d911315293205f2c1b62f4ec7bba4b5a3a3e4c221634c3dfd544202b5d528ddaa3d6100741920f26324fe0c7d9db5076ddc7ecc440d2199ae61a5c6e3cb84a7c09c511ab02243e3995d3d6700aaeac91d7fb37f5c9b0a65cfca66cfd5831227d2ccef979bc234f2b0972129a04a04e2d52fecb8051806d2cff6cc02967c6c84ef3a57de9403a70ece2ae8cc3ad7a76ea75626d821dadfd1e11c49a6f7e9a98a92583ca424b47c8b9e1346581c3aec15c579c4de4161736182daf77cf56e03a3de6ded6d93dcce03505a275af858442a9a07cb553083d2e4b6a430589158988042f7f120c8008b925cded95d47637391f542f3f62c30b379a3cb247d699c02ac4f1c791d8fd0e9136ffe6b85acc48eed3cf0cf4e9bc2f9f4f78e0ef23de683b96cb97d73bf8368fa848b3b9f0af35a4dad55de8c9068a14a0fbab5bbbd42171551d65dfb5a33c786ee037feb8af03e6670d79281776314edef09a113eed5052b845c81a54f304150c8f9f4ae7f31c808fa22774ee3e990b559b3357949343773caad1ddd7e8ee35884a61f78c9191cc8627a8ec7c2ac40692099e998b4c69a2ad40e745bc5a21efc93b04b513a8f244fdfb24ed1d5887e18d619dcec7edc77f38a6b2dcaaefc23b5e9281be1921728152b392280b54a4907ee0254cdbb04809d71d909a1395ea4954fcd44166ebff5ed503817eba69af911cc090161e322470c5390dbd1659643463eff62a15905e0009fab68f8615ef5fe3d75e378054c97167ce757638fa18092b503960dea5a0d5916fcc153b6638527998ebddaceda8fd7ad8633eb36ac161bda28d110be9dc990a86eeab166b3d28f31e0934cf6b7d4dd1e934523948d8c46f2e2cb57433c9cc1d0390025891251a49c06f749f181e69d30d7cdb4b0e45daad64c175a7756b2d429d21af95b4bd2f0791e55811d90fce74d0a3a2b18dc5c62ad033346d51cc644149d2bf30e44feb907f97f16b70a64a86107851bc16c23404cc9ca730da77d4d23772332e3b4cff3abb52bb15dfe9b174f8317b6835d591832d6cf8fa4637228f397b12b7b192f86b299743bff184987458ddc3ba02226972412611d9ccf380d86176e1d33d8f8c520357c58105da8be6e8d18fbd42f62465965d0dcd14a76311d483c88e762853637e55b286583da4f50081c895342f6e20572ec053d426c8519a17c601ce926b9e7ffa53aacc04919ac228b798250c6428e9d653f1084a410ceeee2e0e58d8284d501d5083ec7f6097b4dacc0a8f10cd630d7a5013c4bcf94f30f645d1d522f6d648c07d49c8f6b03ab86ce752d23d1c0f4f80adf715bf66dbfe08bb28f2dca4c6c4f17211cdb474aa196437b244f94c7b2fca8ff4780125ecad956680451227df3824214a7451b47fa4154a1c0c70c5499cb2df4cb7ac7fe92de4ada62c3c779b21c6f84553e8d473667f276cd9a15c336fdeaaecb2467293a945eb2c31f3afdb000ffe0fa13c3c278b3e21c19568ee1ee3b170e6f3872d4f8910dce461e375049ad328ce052e7e70a27ea75e68cf7d4047bfccae75a712b8868f3c2244c53c2eb06d3cf27854ebf15f472e2f65f3064b84aa1ff3f8cc1e9c4151becd8774e03b871166b8ba79a21f725517281652038886c0ebf634b200c053ca063232e18a565edb274dccb237c1a27fa9a0a336e0995359cc571661f14729638342800b303a1874500974539140104031f3f1b73bc2f38a75b5eb89c1884a1bbcc8d75f431cea94599802e1e4335988e074d62fbf9c90bdcba6a5a1a4419143bb0ed93b78672ee4c4b84c8611508cd0963b7bf26757ce56344a01c83a2e4625a01bbcc531cbcb613a2b92fccc830bfaf1f1ee75f87c67b740d877760e6399ce6c5d0e849399719ed740d0b50c1571090f2c4d41f39188e3dd7f0537ada7fbc52668e1512aa6e78b7fbe231e2b6b865a394e54be378d54c246f9f6092d5d68311a6bbee25509a35a2b15ce84b2f76dd10ef1c3bbea769884ee7b601d9b86933ae38d4079c571ee49474433e9b711422c6f3a61a101e1851f2efb648513c1e9787168430ec56093b704985bb7fcc37fe10ba85ef4241a007c656853b560702e4e5e9acc2a049bd0440e52254c11865316164be9a4c240973ab81e54fc2115299f5ab597dd06085d1df7949d65dc6cbe78968d3bf54ab7f7ccdbda77b3521f5937f9890810c93c494077f20e866253828dd7e505094061965b5ff0f000097a18728b4714165530a088f1c52a3bf5b278e3ea78cdd3ce304c50eb8eed409e3a0a2eaaa55f319e886969c92167e9ab14171332000a4d949a7582782204a5a1c4b171767b320489479d42c1f8362220b89b8a02bfc49d0148cb14312eacebd43c084ac570e548c07559b152e399de9e4e054a994c4ccdca0d21aae7cceb46a23d908e5ea40fadcfb25eb211a750507673191797e76b495a5a0aa3ab0d646a544e152ebe832d3f3fab3b67352fd205d4d2d5456674fcdfa28b5ccc3a4304361c75406958592d640b112bbe7884d08ccdc394d34ffdfc8876596229650df69ead05c031cb26886c2f533c47d6503e18f3726f9b2bfb4043e3bcb6bef6537bd00ebc6f4f46bf4458162b05efe3688400ec32f308e76176d3a2f5ee7c3fa766de7d970623e2b3a4464afd15010938050e911b0a906a26a7c6896cee9db3dae9a207f139c72eeec54c196ffbbfae0b1ed128bdcfb37354f12a80e0fede1b497e4495ca76f7e71144682672e7926501d3a9015540815d9f744bfb32092730581b47868a032ba38aad7764a198a1691adb06b22887d9cca352373b1474a5bc07a07dadeeb4337346d9c052fdb435b969921751c22f2420724f07b5c83019e2954d7d8c781dc8d2a6eec24180c4a4007e2cbb575e91bfa3b9fa2f5580305ab9ed09f45eb74c163b830cc1e90a0066c1b0c5e3621ce6cbea1a1aac862fdfa1a02a059e8921b0be35f81544dfb3f0c5011baf9d5661c2858b206416a8ad55ce0e4864b52615d25dbe7f3e7cdc0003e600cd0d333b2c0facb12ea8ef0e32c9f0eb80eb671dfa52f429723760f2d2bd568fb2615bf59a7f11bc33e805bdafbb5151dac3f84b41204b0a877b466b2179f093457563f71ebe5170b4e512a872d3d321525261e30b73fb26acc112d454abc2589831b65b9dad352badd84201da2410c36db08cdb63aa0e54fea7eb8ec867469df239d1363968b6f347e3db191e11e554564566536a0ce4a505cb0f7d1f8982fd7c73ebbb81b2b7152f74a8cf732bbc60ebb4cef8e7dce053a367c9d1a44241f20a3d806777cee3fda6dc571bf3adab64262b1a31773b954f07595a57b19704c1822fea716e77173332d7b7d03c703b081551bc02a6dbc8af1a3e652fd33bde42eed52278cae9225bab07a4c64e3968e4076baa48fb6ddac3499ac8423a7a90412999eee97d858eff79b61b2db991a3ba0b92601864d9b5d1009c0e20c38faeb9e5dbb03b4e4a07ac715b1e4c599da9980a13f2fb0d429115250b300fbd83dd0b3650f38cedabee11ce635a8fb2f25fad424a49a78564dc23f0f9e1a20d99d21be24ee93a9b271d63462928cc7da672901c36cf9bbd314fc837a01a5df0b076f7280f46bb93eb6a742941b6318646b9db08c3fa65cebd5641b296d94a681484d74bf266f780c1a993b5ea92ee565a0e599287eb6f1bbb422ac7773f54d0295704f64d8cec50ab5c179e0f0f1287db799a1effbc529f2749ce11f5193894d080a924d0a91a94567ed4d8d7ea0f681f15cb5cd323d9c4d124b5587ce0aed6a4fb29b9facdc72fb757e4edf610f811dc2aca56c823109a3bcb8714be95df2e7ea2cf6998e8d1eaea64e6451734bb86819de72e9b01c61d9c0886eaee371e403fae76953d4f2f0aa9f3cfbe140962d9be7f6df6ad7eeddfe1c550493f663d3d1982120eae3fd416a721001bf6a7815d6eebbcefea8a3a5ae62194de9c945a467e49b815803dde4a0ea204bd5a588d21c3e1d94999e2523f8f1217453c261aed589f521ccf1f981303e90419f4a8b37e78d7f287c8ddda918f16983ba1695b45acf7f08363be24c7c2be8a1ea2805d76b57dad5a6c90e6e9454051d29d8c2e9c0ac8f61dfabb4e05564c6932cac49c6441316c6df3d990f784ba224c92b99e51ba111008dd3aaba8a8cecb91bf98e44c82191144d42c44f2b5065f4e384dd29f26adacfa31399187b17efe5ecc8ec25f5976b81125ab9fad05b91d7ab44ef91764d47cbc4113ccaf4fe7b38e8fb47547b923a5e24f863a9ce57d4d5a865633ed7a0f98f7e586fc735ed13f16645d1fcee0c39da47eb694bddc78319c1a276b10fc18d1889025c884629292ffecd8edf7e00643cc187b3b20eb23c70fed6a06110edf282a3d26cffe1d90d07aafcbd90d3cf5d19c5666a4fcef27d9fdfba6a64d4094ca3170f368f1aee25cb1647de701c84d0427430f6b56179af63a28f0710dfdbca5bca12834c253b969a398df026555e5d1ba08608a0b6b980f001c052ca0f9187d6ed4eb5a529118700cdf711fe85003a3a7e43c5656ead39632c104690da3971f5ec1b07ce05edc946e4d5ac5ae18c0bcacb693d8b8d17f80e368052392d002ab88ba304fe62bea91f564b3b7182d20314fe02ad89dc3f530207f2e8b2a42e2dd90b006a5f1e4ca5b336b8e7810184456511b0611383ed5e5fdac438b8e61a03d268d40917f22b2bd48c0c5bdfcaee3477c9a5633648cf97d81270b292da6669b811b3785d514bad1db095033c4806cd5c5a92af6b1b37dea1fe0dd08e29f4ef48fdc3a8d4c2def43d0a58cf41538fd74a4cbab5e5f2343b0f945ceb4554b7052846521597a082c484082a62244ffc6f64f9ef357b3d46b0ea5c9a3bc5af4b7f290d990738de47fb1f3a8cf83a588eba0363caf8cd969295411763ac6ccd0408717561904290574e248b31e8b1e8b40e17bffb899b220b0bf21fa7bf6d0771edeb76804992f053aa25ba"], 0x0) syz_emit_ethernet(0x1cc, &(0x7f00000011c0)={@empty, @empty, @void, {@ipv6={0x86dd, @udp={0x3, 0x6, "4f96af", 0x196, 0x11, 0x1, @loopback, @local, {[@fragment={0x3c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x66}, @routing={0x5b, 0x12, 0x0, 0xed, 0x0, [@private2, @private2, @private2, @mcast1, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @mcast1, @ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00']}], {0x4e22, 0x4e21, 0xf6, 0x0, @opaque="17554b4e5ae61a2b0e950d65449077e9d62b5ce7dadaa5f1cd43a432d2139a5a13bcbc5eab88f6d3c8f09d477da26c16f2bb3fbaf0b39342c78cb210d8294248afd7b9a5448010cd14cb648d8d717e20004c7044ace60c4b5628d51bb458abc9db8ed105af6a5cedb6574dce51d4ad0e2ce5502d2480412611ea452b3096239e558379cb255ee46ec365f7a71f52b63756f422800acc7a01172e7a0a26b8312031981ca3592355ee20a43026b8fb378f4c9788c70f72bc0c685c52eecf8d1ad37b935bd9570e6b96d45f21a7a8fc16dcddd3b88f03091f88efd89e35380b3d7e00b0c81a85c23c60d4ce36587205"}}}}}}, &(0x7f0000000000)={0x1, 0x4, [0xd23, 0xba2, 0xd9, 0x3a4]}) 06:35:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:01 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) recvmmsg$unix(r1, &(0x7f0000002c80)=[{{&(0x7f0000001740), 0x6e, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/53, 0x35}, {&(0x7f0000001800)=""/210, 0xd2}, {&(0x7f0000001900)=""/80, 0x50}], 0x3, &(0x7f00000019c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f0000001b00), 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001b80)=""/4096, 0x1000}], 0x1, &(0x7f0000002bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}], 0x2, 0x40000012, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$dupfd(r2, 0x406, r0) tee(r3, r3, 0x77, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000200)={0x1, 0x7, @start={0x0, 0x2, "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", "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"}, [0x8, 0x3, 0x200, 0x2, 0x401, 0xf1, 0x1cc936ca, 0x1, 0xffffffffffff99ee, 0x1, 0x1, 0xd4a, 0x5, 0x9, 0xff, 0xeac6, 0xe39, 0x9, 0x1, 0xfffffffffffffffa, 0x8, 0xffffffffffffff00, 0xfb, 0x3a5, 0x40, 0x1, 0x5, 0x7e, 0x6, 0x8, 0x5, 0xfffffffffffff001, 0x3a, 0xb1c, 0x1, 0x40, 0x4, 0x2, 0x7b0, 0x4, 0x0, 0x0, 0x5, 0x3, 0x1, 0xffffffff, 0x4, 0xffffffffffffff89, 0x3ff, 0x10000, 0x8, 0x20, 0xcb1, 0x2, 0x5d22, 0x6, 0x7ff, 0xca, 0x2, 0x5, 0xffffffff, 0x1, 0xc8, 0x6a46]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000600)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, 0x0, 0x10, @inherit={0x60, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000300000000000078551f000101720000000000f8ffffffffffffff000000000000070003000000000000005b00000000000000ffffffff00000000001000000000000004000000000000000300000000"]}, @devid=r4}) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000000140)={{r3}, {@val={r4}, @actul_num={@val=0x2d, 0x80000000, 0x50}}}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000100)={0x6e, 0x3, &(0x7f0000001340)}) getdents64(r2, &(0x7f0000000180)=""/67, 0x43) 06:35:01 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:35:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x5000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:01 executing program 7: r0 = gettid() r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x5, 0x7, &(0x7f0000001480)=[{&(0x7f00000001c0)="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", 0x1000, 0x499e071e}, {&(0x7f00000011c0)="ca0ab19bcce8fe09652ce03a190c99790b03f42e42cbcac43784484dfd9d66ae5109d858f88c1d479fb3100be6ece02b628263f1c23922ddd328aa8175ed3bee40acca79b53d8a66deacba6c13e514d708842428245ac0b708dc5ecd5980197e9b04421fbb9e4e9e20d223eaf10968f3aca292", 0x73, 0x1}, {&(0x7f0000001240)="934f600d72ae6bf0fa364f11bf0d7b729ac5d0f84daabc688444a3f1861da5f677f1d8a08d0ce062e497157e99b0c985d1ef810fa0e42902932c62b6746b846fe953854344d2cbe3", 0x48, 0x1}, {&(0x7f00000012c0)="85656aa7aeb695ac0c8758646532f23200a7a60a9fc3635b3fc8726d6d11c0410c2160f15150a891bd430f55093beb91ffd1053631f55a925893f19dac554a4e0f49869a438bc20d4e5d5fae6c36b95d375c3830ebe2208019d4fed07a4ca137853676dd187e2294e2f5ec4c27d619f00d29088b252c57d5d297675e8f5e05ed51e6d77eaa48faeb86", 0x89, 0x1ff}, {&(0x7f0000000140)="a7aa7ffa9743b85d1b1ee19f0bf096d61553", 0x12, 0x20}, {&(0x7f0000001380)="0a3ea897136d5d5bd012b39b584e97a91cf60ea123a26677c774239d815832c5c6fff55c1d9e5d6430d59d43e125d8a2b56daf0ed2b06a2596e8cb182a0eee8547ed7d8575c4bcf42c352e29e54abcff0784ba1ace40f115d986914ad03b07255d7ab7669f0024883c09189f4323570c98156ea4f4f3f8ee0eb582353f4a1b", 0x7f, 0x98}, {&(0x7f0000001400)="c8729e6508ceedc1b4b5510cba30c9e0ac42666dd936632fc8fdd4535f62564ec6123ec9d7f169a84a9d8364f1eafd6c83fea4772dedfd73ca24bf3f7f52dd1e803315ff4e014d3674d4505ab770536ec1e77656a05b84f98dea37118d136dcb1d12059c216a18a337a09f536e2bb443f8059b38e7a0e7e9a5", 0x79, 0x426c}], 0xb4, &(0x7f00000016c0)=ANY=[@ANYBLOB='iocharset=cp863,fowner=', @ANYRESDEC=0xee00, @ANYBLOB=',smackfstransmute=],uid=', @ANYRESDEC, @ANYBLOB="2c0071f59dcb44696a70af84562fbb6069fe8186044b6e19ff81c1447b948dc8b4d90595f70d2e94b311f913"]) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001600)={0xffffffffffffffff, 0x1, 0x8, 0x80000001}) r3 = gettid() r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001680)='/sys/power/reserved_size', 0x0, 0x0) close(r4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) openat$incfs(r4, &(0x7f00000015c0)='.log\x00', 0x4400, 0x2) setpriority(0x0, r3, 0x88) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) close_range(r5, r6, 0x2) fcntl$lock(r2, 0x26, &(0x7f0000000180)={0x0, 0x3, 0x100000000, 0x9, r3}) setpriority(0x0, r0, 0x88) r7 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents(r7, 0x0, 0x0) fstat(r7, &(0x7f0000000000)) 06:35:01 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 64) [ 944.605417] loop7: detected capacity change from 0 to 69127 [ 944.607894] No source specified [ 944.614737] No source specified [ 944.653545] loop7: detected capacity change from 0 to 69127 06:35:01 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 65) 06:35:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x5, 0xa7, 0x81, 0x0, 0x4, 0x8, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7a95, 0xfffffffffffffffc}, 0x80, 0x8376, 0x200, 0x1, 0xd62, 0x81, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0xb) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000080)) 06:35:02 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 944.701822] loop3: detected capacity change from 0 to 10 [ 944.712953] syz-executor.6: attempt to access beyond end of device [ 944.712953] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 944.713779] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:35:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = getpgrp(0xffffffffffffffff) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x1, 0x3, 0x6, 0x80, r1}) 06:35:02 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 66) [ 944.790329] No source specified [ 944.795349] No source specified [ 944.811031] syz-executor.6: attempt to access beyond end of device [ 944.811031] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 944.811903] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:35:02 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:02 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000040)={r0}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r3 = getpid() open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x80100) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r3, 0x1, r4, 0x19) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r5, r5, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000400)) 06:35:02 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 67) 06:35:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:02 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000000)=""/103, 0x67) [ 944.907065] loop3: detected capacity change from 0 to 10 06:35:02 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r1 = timerfd_create(0x9, 0x100000) sync_file_range(r1, 0x10000, 0x8, 0x1) [ 944.932768] syz-executor.6: attempt to access beyond end of device [ 944.932768] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 944.933576] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 944.983374] No source specified [ 944.991878] No source specified 06:35:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') getdents(r2, &(0x7f0000000000)=""/74, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x3, 0x0, 0x4, 0x0, 0x7, 0xc0000, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x4, @perf_config_ext={0x9, 0xc2}, 0x1103, 0x1, 0x8001, 0x8, 0x3, 0x1da7f81e, 0x8000, 0x0, 0xffffffc0}, 0x0, 0xf, r0, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x60000000000, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:35:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x7000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:14 executing program 7: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000000010000000c00018008000100", @ANYRES32=r3, @ANYBLOB="1c0002800c00010900000000000000010003000000"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r0, 0x8, 0x70bd2d, 0x3f, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3f}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xf9}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x20}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x28000}, 0x2000c000) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r4, 0x0, 0x0) 06:35:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:14 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:14 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:35:14 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/39, 0x27) 06:35:14 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 68) [ 957.180919] FAULT_INJECTION: forcing a failure. [ 957.180919] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 957.182428] CPU: 0 PID: 7560 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 957.183455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 957.184499] Call Trace: [ 957.184833] [ 957.185125] dump_stack_lvl+0xc1/0xf0 [ 957.185622] should_fail_ex+0x4b4/0x5b0 [ 957.186134] _copy_from_user+0x30/0xf0 [ 957.186629] memdup_user+0x72/0xd0 [ 957.187104] strndup_user+0x78/0xe0 [ 957.187593] __x64_sys_mount+0x137/0x310 [ 957.188136] ? __pfx___x64_sys_mount+0x10/0x10 [ 957.188756] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 957.189203] loop3: detected capacity change from 0 to 10 [ 957.189416] do_syscall_64+0x3f/0x90 [ 957.189467] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 957.190909] RIP: 0033:0x7fa185d3b04a [ 957.191380] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 957.193541] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 957.194488] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 957.195370] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 957.196251] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 957.197145] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 957.198031] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 957.198944] [ 957.223482] No source specified 06:35:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') getdents(r2, &(0x7f0000000000)=""/74, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x3, 0x0, 0x4, 0x0, 0x7, 0xc0000, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x4, @perf_config_ext={0x9, 0xc2}, 0x1103, 0x1, 0x8001, 0x8, 0x3, 0x1da7f81e, 0x8000, 0x0, 0xffffffc0}, 0x0, 0xf, r0, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x60000000000, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 957.305440] No source specified 06:35:14 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 69) [ 957.431750] FAULT_INJECTION: forcing a failure. [ 957.431750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 957.432606] CPU: 1 PID: 7578 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 957.433189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 957.433775] Call Trace: [ 957.433968] [ 957.434139] dump_stack_lvl+0xc1/0xf0 [ 957.434446] should_fail_ex+0x4b4/0x5b0 [ 957.434754] _copy_from_user+0x30/0xf0 [ 957.435047] memdup_user+0x72/0xd0 [ 957.435323] strndup_user+0x78/0xe0 [ 957.435625] __x64_sys_mount+0x180/0x310 [ 957.435961] ? __pfx___x64_sys_mount+0x10/0x10 [ 957.436345] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 957.436782] do_syscall_64+0x3f/0x90 [ 957.437105] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 957.437521] RIP: 0033:0x7fa185d3b04a [ 957.437820] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 957.439164] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 957.439739] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 957.440286] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 957.440836] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 957.441382] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 957.441922] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 957.442442] 06:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000040)=""/39, 0x27) 06:35:26 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:35:26 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 70) 06:35:26 executing program 7: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = getpgrp(r0) ptrace(0x11, r1) r2 = syz_open_procfs(r1, &(0x7f0000000000)='numa_maps\x00') getdents(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000040)=""/237, 0xed) 06:35:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r2, r1, 0x0, 0xfffffdef) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x13, r0, 0x0) syz_io_uring_submit(r3, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000000)=0x5, 0x3, 0x4) 06:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x18000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:26 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:26 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000380)=0xd, 0x4) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="970000000000a4"], 0x14}}, 0x0) [ 969.573035] No source specified [ 969.579466] syz-executor.6: attempt to access beyond end of device [ 969.579466] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 969.594253] No source specified [ 969.607310] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:35:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r0, r0, 0x77, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = syz_open_procfs(0x0, 0xfffffffffffffffc) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYBLOB="0100006d0000000018000000", @ANYRES32=r1, @ANYRESHEX=r1]) pipe(&(0x7f0000000040)) 06:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x40000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:27 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:27 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 71) [ 969.826422] No source specified [ 969.832599] No source specified 06:35:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xe042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40286608, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x3cd, 0x42101, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, @perf_config_ext={0xaf7b}, 0x8084, 0x101, 0x8, 0x9, 0xfffffffffffffffd, 0x4, 0xaeb, 0x0, 0xbc, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r0, 0x2) getpid() gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x40086602, &(0x7f0000001500)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r2, &(0x7f0000000080)="01", 0x292e9) [ 969.857334] FAULT_INJECTION: forcing a failure. [ 969.857334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 969.858772] CPU: 1 PID: 7613 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 969.859789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 969.860758] Call Trace: [ 969.861106] [ 969.861406] dump_stack_lvl+0xc1/0xf0 [ 969.861922] should_fail_ex+0x4b4/0x5b0 [ 969.862442] _copy_from_user+0x30/0xf0 [ 969.862951] memdup_user+0x72/0xd0 [ 969.863432] strndup_user+0x78/0xe0 [ 969.863931] __x64_sys_mount+0x180/0x310 [ 969.864480] ? __pfx___x64_sys_mount+0x10/0x10 [ 969.865115] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 969.865793] do_syscall_64+0x3f/0x90 [ 969.866295] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 969.866943] RIP: 0033:0x7fa185d3b04a [ 969.867429] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 969.869682] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 969.870627] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 969.871508] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 969.872382] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 969.873273] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 969.874154] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 969.875055] 06:35:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x40000100, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:40 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000008c0)={0x0, 0x0, "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", "0158eac966dcb2f640882da5280d967c75d1e81585697a60c9eabebb8f12c5441cf7163ed62f2cc9102d08d8a17ff68d755cdd2e182e186bb7ef740624f558463681c41085e8fa3e7ed37c51a23bc041b6c2c413deae902d4f357ef6541b025e283e68756dc465d8e77e6c7154478d16a653f939851aa5c7ea557b1ba4b86da2bd6e9b7f59232a5df5dfd9f7e1307ecab12006afcb92eb0335fa65aaf1968f8be1e9ed7bed0ae82d3157e3fde7761c129000b24b6af626a18a6de6cd712344faf249a38d19964f7c6da8f85b989c62ca9d3f54a7a8e1a9aa52b4d62a5d1ad04ea2fcf6e0e164c71f6484c32f9aa3ba6404d203e425577b6febe68ce240a109a96e39823f2487d16597fa2fbab92a533cb2f5ab6644cea7b04257597828d32dd769bbf285652e2456ece71696b475b031210830b4eecfc3a93dd65c31d028de410782bd7fd8b1dbfb62a6957d59ab7584005b047cbb2e95e55d706a073b0ccb48bb2c31816c366c77640eda8be1aa104afc8aea921a7c0b758dcb71592b54dfcbbf34cf1ab88051b487fe13183dd65daf03eec6a93a879006ba2c7ef108db2dcc2baf1ded453aac0690ae80277bc80935671babfb1b79652d141030329a710d2e3d51185f407d29214a4ff8677ed9183fe5253b364169e2f13acaef845b9c18458ddd3422991852464ad18d243c020e4b90aec68932d55de5d5bfd600c0980bb0aec0f8f6c2bd2fec05b48d4e22c4f572f1ebbe7b9a321d03533385abd98042f6f3f5b4525b41d6caf5ab581c274e66eff1a52597150006b4fc8b0ba7e6619ad5965212a92fca34e476f85df0c7d30bcd5dafb17d71382babaeb75cd61caa3c77ddeb256b586d25d66d8a169314d189401aa442b6eae697366222c96a9ea6ef2c4113c8c1c247451ca295a412d821e155289c63e849d1ec08a3fc05380d961d9431c7fe4c9234c50fda377e202cc91de48fefc2fb9cd667fb3b0ea5d5427e273174d09119c081514cab818285792887b382368b9e7ae6451376c56a9c1fec7cd5ae80a594596bc7d7d113c1d0b5da66ca66948c00b4851b8841af7b7fbbcb8eef357d29b3931a028f3db8bdbe77dcaa9cb1600c63ece85fb95aeb81ff7166bfe7bc9478d812eaae8aac4b8f1d473c4ae036489c5c3405ec297eccd5b537f79d08ebe78607fbdc1f6b38bfbaa54ba1c69fa89a373801ab391fca02db9d91d07c7907dfefd504429dc3a5de72150170e6ef6d89526939001e672dc6033e6641a9f2fb0c2aa7e50f3d831d78b87edf4ed7103571c8b79185f183f3ffc7743bb663e9d7e51c3c9a24cc4eaf387a5ee3831b1eef3544ba7b281a237f443eb92df712d810c1702e32094ecb09169a868053c823bb5f62ab95ccf6de171cdaaed959f346e85250441ecb9bcc128adea7737d9b7fc4752adf1cea7281045005caace2a791798481d23b618bab37c2d6f647c401f60be079452cf84817a06eeb582f840be8eecac04de0160aa9085352ffd98aa6a40df8caba41f4dbe9549ccfebba6082d8bd6a6a3575874c36fa0cf112b845432db7b171b8dc59c2f52b0fc07b3e5751755fa090f9f530983ed35850fd6287436d64c55b8a082246f1f62a8a4b964466dae421dcadab10ca141386e32a8dcc319b9821a33fa7ecc3390f29209fe07a246e63481bf781c669677b50ef8e474684c09988638e74c5cf7b050b0f960920faf80915a19d28a0fe88ae96d8528bb7382c7d52785b15ca3fb0eed380382d6f7f0936842124f3dbe99974bb2fb3cfbbae1be34b3a99150bd43fc917c2eb3e9011cc47c3c1bc14e1f94cb882703294c9c637813b7f1da9a25dc7badc9719756ef576c69cfa3ac67e44f49822f36480b6378e1e79683a34252a806f73f072eb55605524b28d242608cbadfc166d84c6212be86c4a6b1fba910f8de6768bacde473578abe06504d3dfe800aee9cd3758e9f402d56c037de255eaf22a5557c264226e0001dd9e6d75b6acf33c8648d288e1249d22807e10b3973948e0e83c1a212ad51c831e299f1cc757fcf9cacf6c40a619cc099a801ca2bbe5336a57ee815fc4c08ba0885e68d01288755977211006ef0f67825b7fdb9e46082c4fb1d43e9434aa3438a7fa5d6a524d5d29a7515f860480b57bfe3bb3aae45edc983c306a6a33a486010088d4bee15984784376a56f59ae01028c7d3ce42e057991f63c9e2aa7a2d7f8f16ab226f76e67dd5463186c3d92b1d629489006bc5d5c1173d0cdbd74fd1fe06fbd8706cff23c0b4d1a63f087d424ca4f92a90f998acffd02e119676eb2a46cee1ca680463c474fbc6dd370e03e4059252591fd1bf6896e9941fcbb63d1e2cc95b9e494ecfef3457d54304c0bc67cf8cc98e062509f01900c7202320ab9e2078db6f498ffcd3454d2fbf55f64578ccef4d706f8debd830bba450dc3921b786d9a94764d3afab98bbb545008a3312451fc13668a17037fa0e3c3b7556dc9f3895e092aeb685a1bb232db620bc5cf4256dce7a24a2d8c5c874a4632d9aa73e3fd96f6bd79134cda2d88ca78b1eef33d0f648efd9a8e5d5f8f87da7fc66a52b816a329a5dde3b7b30f6a49c75662d4202a704d807c66a85d3a5d8c9088ec46c936f74e3b6bef55d2174027a0886c90e16b1a09d292db0ebc54cd3959f401531ce78c0ba68b08e643526e3476e32ea534e0ec0bc649de0df623e7d6e242655605dd535feb0f420f8fab61fdc2b3f3f2ef5b35d0ed0abe6d6e6635f04086ad60eb2f86f1bee92dfe9c17fd9138235ef2252c73ac7185a88db3aae07ed93c94dd036c33f9aae5e1df6b6cd8f19df6b794f1e5711876cb372d240ee37db87277a33302ef69881d360b4006e8b64b98790aec74086fbdc224b13b04ef4dfd8ce0e253617f7b0369a12a862756b686d9f2777c7d7eb398795f47b6311b092a3c717a94c66dcc5f0f2303b6d6b098e16ed5d2d414957fc7ece60f0665e4a8ddfc01960dc724ceb7d2cac4d2048cbc139508a2c1c872abf920caccee0e48ab91d32cf291e1f3eec7b4eb5f86ffca73a8b2a20256a864c9efd59082783a8f0c5e1d85069d254b9f32beb745ea4b8700431fd4172c2f25e466a86d9e20037c2fbb36b012d25f19bcd7bdfcfb78bc8199e0c75bd12b3ac22f005774fdfb9ff816f9a7d6025f1349192db7c2efdd7017b3eeba7bd5362892c4f6c6dc6b4d04aed4ad01c89961879e55ac62ca2a72a26314cac339f49b009ad0cbd9bd389b4c78ebe955515b127a2afd08bd9059060d00e4ad61e46db047388574e2272535406c647918f56be51612f400d37419d372856b12cd6e95cc90dad4577613a2a49a9a68ed4f38c95b331ec06a304601c2394146b4a3cc43ece9aec618e55f264b1c4abf96be08eb9f58be2f250c6ca4f976d9c05c80c76a02f670f18955114aee0ed94a3913045b18fad20aa6d28c4492e2845663c1f1a6300e73cb1b9967148047d7178830659e4d247e614f55fe3fb6612a1db728c6927eed68eb4eb2ccb84f46f5da8de11b77b9b84669ba093eb74f69d36efa274c0ae34c1f0f620bc4b913c447f9f6541080b28a877ed438d66b16af027087a0f4b8f596578c5f6bcf3891a892a39a7824242321f158b9f9d75a4f98ddb10e4748778886269b82b04a4403e68cda21423fe7dae340e36b56c192910d320a5b31ade651562f88bf38009827b6ef3ede8970a198bbfa63f28e8253a98c50e500675a253d64a3db828fe18206b1863ed395851fa56c65b230ba0fe54da2d2d198893585691d0b56a9845423d6148003fdcdfa5c3170c3cf00ac59c8219fa7bbb90fe5d970ae799af68de293aa768b62536457fe6d55dd2b9de55e39180d04ebad91d22766bfd077821a22ed4dfe0cbcf0e31b587372dc2fa03a1153b81ab99e8c30e4721f1e81353e4b8bb6f2de76328c7f2eea302eeb52cd1a51af049ac58a18ca6c3dafd86eed2741d7f76f93debda738b3c7170e532e4a5c6648f41241726bf5494f5fe551f1b02df6d2f948afd658e549a88ad19f545344a028b51a9a7a949c17750f6da837a947c10f9640e2e00c23ca0f6defabdbeb8963733b8bcbba02177d0ca2328cc63cafc61da02177393b52c36c9f6861ab9912e8e78f069633a0b7023567ddf1d99457df4526ba064cea8df51a9b7b120c291d9e27955b8093d06b63c6ec0b451a46144ffd63bb07950af1d8400d8f6ee3ca3d8fa5ccebbc3f0520a844e81c1cf510fc0caa5563cc9ba9b57d717f24eff583efbe1b6426be693cb84e1d4ee4636585b18400619264f3b1918bfd6cf1282808cb901e987635d9f37e255ef9a3f907eb342fd2f7dcb24ebb7e69b9622d39be4325818d5899b095e66eca32b47ffaa1e11614b68eeaecce54876d0307a54e0cfbefe5463ccdb7a9fea4ef2df4aae1026018fdb3ecfc1490cfa41dc9ff97eb7d707fb3d8be98b0698000dbc0a6c57c0b47bbc2f41bcd2f6632263ca12e938b45bf140915b67ed2868184c94bf2c604e35ce457ebcd1ce1b775df9fdd19a8c05d3055ea715358c5617d98734671cb04d14529b6c6de859a5e1d410dfb82e66e37a9c868f88ab4a008fc641716a5b06af173abbf9557522990d48a404db04dce4db020e25a4c28346424df3ae78f8b7b987ad7129430e429bc3637147f8e12b36412df7aa69f094d1d02966bfcabe68c1fb5eb5e3a9424d8893e4b7d93b4d6cf97ec4a6e48dffbc75fdf8da5cf7932a5bbd86513ce8b6555a17901c63ea491af9adcf26acdd0488879ff38f98d2189db8d5787a5d725b2ff43292c8f205be0fcae1cb2c7024eb2872d5b3be2cca26d8412bf4776236c9c5658a234c8f3cef9f4c667ad03b7065d3f9b5c7c759c877f853c72b6e7025e65552b6ccb2c541d921a5728fc0c0c06689675538c54ae4ac1df6aa5f16480b13538d18548a7e1361ca6ef5ba89cf151a9409c769b4eaf2e0eacabe66fe6091a02eedc5ac0d1b77e075c04045b934f9ced86ca47d7c0a72ba22762a59066081553741ff119f9d663a198a4b518ffa8f0b078fa279afd018ad32df97861dddd61a79e570fdbd7798b1ac9565c44902b265163dea9e69065afd0cce094f9f4c4abac9671155dff25f3682828aa978177f54ace925ac71f152207f7354c61f2cc5f343b3a0b8b35667f4ab1e459e8a53e4e5a8cf3c14f8b88c455e7e8e34c84bfde000042abc4f544fadb2bc83840d4cfbd1c323cc66c667c73c99bd5dd7c6491a1f32c9422c9807d42d58c802b57fc23d0150e54cf5cf821fefe957b6f26aff9081bf8661971565346363e4fe959ca2318629fb9d260084da7b228eeaa1e9cb8be801073c2b33c7c43b9546cbff0859c87ed896f60240cc47d82eab8e85b47616b7da4fba9e7b4d94fec0057b88f01b960dab4f1b765606aa1"}) [ 983.656968] FAULT_INJECTION: forcing a failure. [ 983.656968] name failslab, interval 1, probability 0, space 0, times 0 [ 983.657771] CPU: 1 PID: 7631 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 983.658299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 983.658964] Call Trace: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000018c0)={r0, 0x0, "8a0f953b349680e7f90ad6c2e159689102b09bbb26f27d29f60b3c021cdae77e4fe13869e93440b27e1e7c01765340ece010bb5050448eb16e00a200bd2cb15c1f0605c96e46ad27d66c0915c60792d5ac513ed17787e14c0b6966cfb8233a6227e3ca3f3ee2405e93ecd432519463baa660dfcf51936e779f97032d4c0f603413beac3e8cab0a0e226377c8484934d92a6c2bcc1c56a2061e63e407d12f21d6d05838805e7c5301faadb22d3728feab904853a2fc3df8c1ca49fd96607c36c06fba41ed9a54d6479c798f9badd5a315fe1b6cf0384fc3fcc8f5c723a7f3e301dd18f53a8c78295698da13b4f4674ec902f2f888fe96ff9b2e56a5491d0fb3ee", "3a5e4796874857cf866b5d30876e27863089e4c48f94a4f145a8ea746a7fdf0a5b8dde708485fa0f98956b76d4041a290f299060e3dae1c30c677f689361ff02d54a26a7304913b6ba00651d62d4192e9fc76fd18054cfe46af2a3693a7304601aa8f013fb1661c6ab5fe3498bc6058db1cfa492112a7381cd261640105117753cce7787d79fc8419bafc304aa02a518735da1cd120558b0d9bb14a968156478b60283d6ecb802bcccad0f7e7c62c41a870ce741a9e9e391feb1f606ffabd2f417974138d4ec92813e6b2f3953f2ab80ae5417c7a0e372570cff3f769642933e3670b592998849201f20cac3f91031e75132ae7727ec134a3964ed7069c1690c69df52dc35d97e40ff144028158d527f9a42acee48b03601ed22231cb097e2e9396c06277de30163e1cb447161f3ef3f2f67515bf36f3ee36adff6d7f47900c310c403e04ce33199520e20e0434853b66735b5c80fa327e12299dd94a872695563354857ca8a2b92c5c45b356cea0fc0870c251a09065363e2854761996dfe6f76e51057102fa774f821670220200d67c5815d28f6d842c9ffc7611f23b1076f87ba0ac9a37e0f6d76e04ee956ba5335ef3ee4d0e1561fd274efe772a5602d03596a4c45d496bd15e39215b1ad5f8ba246ab06b9d86bf0c0cd4dcb634c129ee90d595f26ea035b3a9f563419a0026d605b8d12bcb0fc6d51f24e41a1935148b246cd86b071d59e418262629900b2150b09a7d813a67ed715a07b4b0197d0cf4019ef19f48ac240d2afc2c6391bcc04d221893003ef73aa240bd4ae464e79e929cca790a8f4cd82f2d8d12ec0dae77288c1a7c39e0ea2897bb762c10f79f0828d15afcb3c116672ae4d80c96402cff89adf47f9d7ec6e7b713bb038c6b54bf56a4d657da9a00415ebf94efc1c66b3970e990745f331f2f3b4db778afb632023e2b2ec298d72098ffdc965e4c3f43ddfa636f68c8a1e73637a601a4a885d5a1b6ededf51e0e6421dca3157387339abedded2fdfd5d7048178b3cf9d22503c4d5c871be32dd59a1ad8c6f91527565f22a1246af26722c42b434f6b3ff9c2f047a2462de63ff74b3b939fe02ccbe04576cd0be2d0f2f9954669cf378696144d3a72da34ae0ac0039001580d0b59ef343517d9531b6b9d7fc1a4cd2ef385c7bae0b3a43d71bca8b3994ca44d698a75780613a5c7a1eb8940817bc56c641978243f4db681483f9788de3888ff88ad79dcc6f1dcfc19d14ec48685fd1709c7afce5b83106e56e77bbedd25d3c7f229ab9a48a24d29ec17119dee780cbf026f0956676a8d29ce792d7638b46c2fc57cd44b6d68b1767b538309aebb297a7f98c355e9342dc7f4e56154906293fbc50b6736c1ba27a04f95ae739a6ff4f79b9d1e0371a64c4e2540d8d17bc0faca3fbf346102c9b49cee629b59b6bac53d1b176266d61b1cd5178caf13bb02b15449d5657833a6a6247ae445693852d29e574721e315bc53a0b73e3c5576a492f082a16c1cf76eed8a903b918f1f9ce624c3302b1922c5ed6f457a0bd3337b9a30609d95ee90e66c75594ccc6f88a861886772cf9a032a808e22a908d32499a1eb95f424a974efd8340272a774fa28303daf922a76c0c890ce8b628d62d1b172297aab84700b7daba37e85eea6612dd32ebc67113a3ce56cc6346b63f9bd0c051f9b000d807ef384f963bf63560de43a8830cd1bec644ec3ae3a4c79fa3483832600cfc5c2df87289d6573ac591ba41d97882050168d76808f8ae995ffd259f4e4c951f857746b46c09d6850080cc9887369f5f1369f3de88725c5932449935123894a5b3061498a859dc973e54b611465fcdfbb072f11849b4279587735eb7856259ad1d0c0f2dc33769e42bdde2a642022e2eda9697e7ac0b875d5ac67d695fb5c299f4dba5730efd6683e371672d6da3a338ded90d71452b55087f7f328988e5457b846670f0d61712c4e5f3cf3c12881aa315f2c4f14863ed276377652354b979ed65f9e9a2bac2a18d24f079ed075af32666523bfab2d60174987e3056b3ca931df174dd2ad1eb1bdabe5758278693913243cce3574dd28fb48418e86d3b335aa99d2de313aed7f7910f070319a9cfdb08e1155fff58f84e122898eef7c1fb123baa8c8da907ca69c777477df08f743c2a86fb201950549cade98bc68e95de04e316eaf50b453dab8df41ef630dc0bc5ca034648f017f7b0f1e1447ef5cd96154068cb156c1d430f0ecf2d73ae303f3339e53871d4101745f7fce8ec8e4a3df6743f0731e1b693343df8c673d13a102be907568d72c586c757bf949c7c720bf9fbbb184370b8f46fab9c04ad5b6efd5864acdf2baafc49fbd81b503cfe453d9edb738ce09d9b4c1c06195d46c86f88bb2a7f9257bf9612635ec15caa1cf41033520f74b9035046a2c86d220549dd2bf68dbd231ce60dfb7ba90d08f177e0e5d6dcc991ca669874fc0704269cec4834560215aab6effc6400cebe2a1f25b15387220998ef1a36415738793a7620e2876c25df78e3590c4e80a8624807cfe94074143275346faf8c4ad10dc7cf6f12a1b0c2a95ad62feee9044b303d572990e80722f8fbb9d2c76f3176839c85576d4f9c17a83f341e65cbdd6e0bf4cdc1fac55fb8b12becdddee69d4577c88173c5e99c09de32e5b95412ec678291fb850acfb6deef1bef36cca11e06ac75a5e2dc3f06a96dad318d24e089f61efabc33bdc8ab7670bc0defe2652d27b5fdf67f01736c79720a738ca823a977cc96c7a57d3121b006250665bcfd9546d0288a18bf9849112c1de5fe2ea54f2248a0ab8d2f22a67af32e13f2fd20bf619ddc4504fffb89ecce8e8312c9859c607f694af0a5c221bbfbff4c71b29ef225bf3718277fa479ed744493a2f038b6efb7aa9129eb76a55e9abca3b44428283f00bb6f8d637b72b8e115cc81423f40cee9f6350aa26d4b4df08d6e8407e67a1452345700f96bf1e93757fb12cb15825a0e719347537f8b46a435e93be8cf9255b589e45d3636f0e5b4d1443d317a9386d13e561652caccb3f4d33d2bf7ffa0e18679c2d790d09ab925370b072d7d93ff4b2a6a7379f17f6e7583194ed033ef582491a8ec72f10190aee2901d06285c290fa28c40bcf7e8ab80a4ec2a1fdd60a23d3f6802b6a81a28069498cbec845554db6ca5fc23b993042a6f8e9ef39e51eb27f5fc1a8a8786535a1fd8103cf8f9dbb1dadb8a419ed7fc78ae2b1e5fe68cb5bec532b97861eca14d53bee38315fdb38169540c37b3f689622d47e4e893002412bcf36e54e1036381b7a2b1b0c0d23647f132507339573c49ab7b64f63f4744f585e27d3ef86f60f8a67c6ae907b4383e72590854808efa8227723254234dfb94849276cfc0a56abf878ff58a6977f59ebd58ce9daa4b235ae941f4ca7c4ba14ea0ad68b8028c760dcb032c15fc4bd11edda353c098f292b5df0ad2765ff4169bd182d7c2150928aeaaa17e1aaea2fa4df153a3b2d1aab3bc9bbf6f04a46dd4f19116522a5901c7dd665d403d0c44e33438c472d26c870a43f5ca656d0b8b02c9804f813b296201b15cfdb27e7d956fe6e329b9e235fdf710670ebb756a20aed9a759dcfead174907ec3bd442085d584c856bafeb9a11f3c654b97be1185ccddc0b8214a481c522a6472c768937b548c4bd492391fb5cf79194aaa0d270216f128cf5324cfc2525cbcdbe45ea939fc6ae3f76884060b46b5f44172e09db2c74705699d9acce6e023f15c9626a0b1205a625ae7dec741e4027633cd31eb3a878b00e4bbb4910632d39266b83340b4b349783aa50d503507c037b500a128f109e0575de9cbfb18129eab1f2d5e7f8b903882f18d6574e5cad5e97e68a4dac035784314f89d9a3b75f8501d9f1e9982b3f1248a7691cf60cf69b1b915540ddedca5df60f55426c26ad424ffcf7e2000ad62d34f3c873ba98d885cbaacee66dd6b9018fd09babe4c6acd9a18515e3d2932f5166e815d4e75998eef3165ab1a2ab9a98b487215806c318875e1fa600376d373a8107a5cd3885f09235e51f15db23dc3ec0d8d4aa174eb6166aa4e699cb4bd249ed1737d023f99ed4f7ec1e2b76485d8ce0f9efea2d0102be1e289a44068faddec563d18ca357d03087f9b1f56a2f25c19a94035ff0d7a0f8ca15ec93f0e9f069e35ebef5a14dadd9b48b62c27b5041ba7901e9484564482380e63912c6c84e105e7d321c4dac03505ce346f835f34d881ba5e797fdb81c35ed8d70f3c5a2a115dc00ed3425c61149c6f6a36e343979dfbfb0606ca96d1ac19e47a7518bae0ca80049d0ed34fedc8c4c227256d717a6a7af0cb6de7ce24683274ac57c886823ab5432836d5697834899108ab951a685c068b8136fd6ae37ff4c335467f686dfd35d27598ddf10070e51c48cb18b3937b88a0242cf303a374c8fe8649caa4b0abf687aba0aa80e5f1e24251a51b97a247aa2ca16e4e86d008a0fcb2e2689cf95e3f790e489fb20c856789909b3a0d46bb960da085252c6fe185cfd83e9abb3f3e20bbd25febce76934a26ae75db560fb7d5e15aabb1bc7197a98fa75f56242fe813002414afdb0c48d3aaeef153e3b39a5aa372a008b4feb1919be4d510b3a99733698925bb63ee07f72c1ab239c3d53af60984afd97530038b54a2aafba69d1fd8a108664bd25709611a85a366129b381869c08816f5ee88d7e22096b10da9fd5bf8664043a2a41dd69b1977180e0ec55fbde0c2625b61c84218bf922e590b9cd68d1d40a7ccc495291a1743155c0e3d5e3b36ac6b38c52570b49a78dbc61666bab5275fd6709bf03f65dced173644c9a9003269ed154e800a43a09ede4e9cb8a63b89ffd3e805bf4a16a7dd1d124674a6a18e8ea4d14a827761e9a4020d80eecc005a740d8425933fe7c125e0d87f2b4bae0673c4d72fdd3d98904b2a887a9e99495e5ceb4b99b1066b626eb3ec0cedf7a1fec6e4bff6fe3b5d5f3f5a4ec19ff087cc4cd585c807213cbb4b88030fc33073af882335636aa945e559c0c8ca6370e1e8deb4b442cb5c4170da6fffb244bfe7458cbc80549f07c4bba20ffb03a12ffb9b9552d73ae4570c51b3f5f5d62ba7ba61e61bd56602e6bdaa55d1422f5c955e81232ed36ffe37ac5f92e5c5e70797ec93e7e77968de89a38f2ffe06169e31fb3a19fc490199f797ea07ea4620816776230f2e0ae8ce64dbbda573a9610a1cc13717c36549c81102ef45a946aaa3343762775ac7580a728f5d27357b1f7c572c4a6c8fb5422f9eb02cf2579589098ef03d4d87a108ee81b6219bda917475a2e75ea104bac9122f8f4dabe2ccd024cb4ab7acd3bb543abdb95dcafbbd3a3c6705fa9e88f1455e77dbe8993c910a579d910cf16945674dd7096b5606c741308f12d38b4699c8bd9157cbc"}) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0xc01, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x530b, 0x0) ioctl$DVD_READ_STRUCT(r1, 0x5390, &(0x7f0000000080)=@manufact={0x4, 0x2, 0x800, "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"}) 06:35:40 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:35:40 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:40 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 72) 06:35:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x65000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:40 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x0) close(0xffffffffffffffff) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x20, 0x0, 0x80, 0x1f, 0x0, 0x6, 0x23000, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x355, 0x1, @perf_bp={&(0x7f00000001c0), 0x2}, 0x8000, 0x40, 0xa9f, 0x9, 0x7fff, 0x4, 0x7, 0x0, 0x5, 0x0, 0xfffffffffffeffff}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000380), 0x4080, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) bind$unix(r1, &(0x7f0000000300)=@file={0x1, './file1\x00'}, 0x6e) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e24, @private=0xa010100}}, 0x0, 0x0, 0x20, 0x0, "592c72d67a72a0679d7a9641c05d867bd5c717b9b4adac8bd32d9d6dd7f515ea4e3b6212d5d3ed4141830dc7e324dea43dfb29e8775eaa996bd7f0c4ab83d240e0081b7eb3b07557d88e9e8f0a10067f"}, 0xd8) openat(r5, &(0x7f0000000000)='./file1\x00', 0x400, 0x20) write(r3, &(0x7f0000000180)="0142cab5", 0x4) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x80000001) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000380)={r0, 0x8, 0x1, 0x400}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x15}, 0x6148, 0x0, 0x0, 0x0, 0x0, 0x97, 0x6, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r5, 0x11, 0x2, &(0x7f0000000640)=""/200, &(0x7f0000000200)=0xc8) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r6, &(0x7f0000000080)="01", 0x292e9) 06:35:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:40 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) [ 983.659220] [ 983.659385] dump_stack_lvl+0xc1/0xf0 [ 983.659654] should_fail_ex+0x4b4/0x5b0 [ 983.659915] should_failslab+0x9/0x20 [ 983.660187] __kmem_cache_alloc_node+0x66/0x310 [ 983.660513] ? copy_mount_options+0x55/0x180 [ 983.660831] kmalloc_trace+0x26/0xc0 [ 983.661103] copy_mount_options+0x55/0x180 [ 983.661388] __x64_sys_mount+0x1ac/0x310 [ 983.661676] ? __pfx___x64_sys_mount+0x10/0x10 [ 983.662006] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 983.662396] do_syscall_64+0x3f/0x90 [ 983.662678] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 983.663004] RIP: 0033:0x7fa185d3b04a [ 983.663276] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 983.664546] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 983.665089] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 983.665600] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 983.666106] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 983.666610] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 983.667123] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 983.667648] [ 983.670882] No source specified [ 983.671582] No source specified 06:35:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x80040000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:41 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="08002cbd7000b5105869b64f6c5708000300", @ANYRES32=0x0, @ANYBLOB="0c009900000000fb47000000"], 0x28}, 0x1, 0x0, 0x0, 0xd080}, 0x4010) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f0000000000)=""/39, 0x27) 06:35:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 983.767982] No source specified [ 983.768746] No source specified [ 983.773545] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 06:35:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 73) [ 983.789228] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 06:35:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x68676516a020ec15, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000580)=0x6) ioprio_get$pid(0x1, r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) read$hiddev(r1, &(0x7f0000000180)=""/240, 0x61) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x81, 0x2, 0x40, 0x0, 0x0, 0x5, 0x4400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x40830, 0x4, 0x8, 0x3, 0xbcf3, 0x1, 0x0, 0x0, 0x800}, 0x0, 0xf, r1, 0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000580)) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xa) ioprio_get$pid(0x1, r2) close(0xffffffffffffffff) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x80, 0x0, 0x7, 0x0, 0x0, 0x3, 0x108, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000002c0), 0xc}, 0x408, 0x4, 0xdf, 0x2, 0x6, 0x400, 0x2, 0x0, 0x40, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ptrace$getenv(0x4201, r2, 0x9, &(0x7f0000000280)) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, &(0x7f0000000480)={&(0x7f00000003c0)=""/160, 0xa0}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:35:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xbe000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 983.851903] syz-executor.6: attempt to access beyond end of device [ 983.851903] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 983.852784] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 983.868578] loop3: detected capacity change from 0 to 10 [ 983.881836] No source specified [ 983.884951] No source specified 06:35:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 74) 06:35:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:52 executing program 1: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/stat\x00') write$binfmt_aout(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x79d) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{r3, r4/1000+10000}, {r5, r6/1000+60000}}) 06:35:52 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xe3000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:52 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:35:52 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x117) 06:35:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 995.397095] FAULT_INJECTION: forcing a failure. [ 995.397095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 995.398784] CPU: 0 PID: 7671 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 995.399833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 995.400877] Call Trace: [ 995.401229] [ 995.401536] dump_stack_lvl+0xc1/0xf0 [ 995.402073] should_fail_ex+0x4b4/0x5b0 [ 995.402609] _copy_from_user+0x30/0xf0 [ 995.403138] copy_mount_options+0x76/0x180 [ 995.403704] __x64_sys_mount+0x1ac/0x310 [ 995.404265] ? __pfx___x64_sys_mount+0x10/0x10 [ 995.404894] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 995.405621] do_syscall_64+0x3f/0x90 [ 995.406140] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 995.406812] RIP: 0033:0x7fa185d3b04a [ 995.407312] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.409491] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 995.410495] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 995.411430] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 995.412374] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 995.413323] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 995.414263] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 995.415239] [ 995.430518] loop3: detected capacity change from 0 to 10 [ 995.452226] No source specified 06:35:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 995.459633] No source specified 06:35:52 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 995.498269] syz-executor.6: attempt to access beyond end of device [ 995.498269] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:35:52 executing program 7: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0x0) socketpair(0xa, 0x800, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$802154_raw(r2, &(0x7f0000000180)={0x24, @none={0x0, 0xffff}}, 0x14) getsockopt$sock_buf(r1, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) [ 995.513776] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:35:52 executing program 0: wait4(0x0, 0x0, 0x20000008, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40005d00, 0x0, &(0x7f0000000100), 0x0, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x4, 0x6, 0x1f, 0x0, 0x0, 0x0, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x6}, 0x1, 0x100000001, 0x101, 0x4, 0x400, 0x7, 0x3315, 0x0, 0x7ff, 0x0, 0xbfb}, 0xffffffffffffffff, 0xd, r0, 0x8) 06:35:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 995.571319] No source specified [ 995.574251] No source specified 06:35:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0xa, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x860) 06:35:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfeffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:35:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 75) 06:35:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:52 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 995.686774] No source specified [ 995.692870] No source specified 06:35:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:53 executing program 1: r0 = gettid() setpriority(0x1, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000040)=""/42, 0x2a) [ 995.754481] FAULT_INJECTION: forcing a failure. [ 995.754481] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 995.756065] CPU: 0 PID: 7719 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 995.757153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 995.758228] Call Trace: [ 995.758600] [ 995.758914] dump_stack_lvl+0xc1/0xf0 [ 995.759475] should_fail_ex+0x4b4/0x5b0 [ 995.760025] _copy_from_user+0x30/0xf0 [ 995.760589] copy_mount_options+0x76/0x180 [ 995.761175] __x64_sys_mount+0x1ac/0x310 [ 995.761791] ? __pfx___x64_sys_mount+0x10/0x10 [ 995.762458] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 995.763207] do_syscall_64+0x3f/0x90 [ 995.763763] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 995.764468] RIP: 0033:0x7fa185d3b04a [ 995.764993] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 995.767353] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 995.768375] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 995.769329] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 995.770273] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 995.771219] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 995.772188] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 995.773158] [ 995.789059] No source specified [ 995.791006] No source specified 06:35:53 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:35:53 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:35:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat2(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xd0800, 0x81, 0x12}, 0x18) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x9fe0, 0x80140) tee(r3, r2, 0x2077, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x2) 06:35:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x24, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:35:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffff000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 995.848773] syz-executor.6: attempt to access beyond end of device [ 995.848773] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 995.862173] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 995.902406] No source specified [ 995.911112] No source specified [ 995.962947] loop3: detected capacity change from 0 to 10 06:36:05 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:36:05 executing program 0: wait4(0x0, 0x0, 0x20000008, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40005d00, 0x0, &(0x7f0000000100), 0x0, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x4, 0x6, 0x1f, 0x0, 0x0, 0x0, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x6}, 0x1, 0x100000001, 0x101, 0x4, 0x400, 0x7, 0x3315, 0x0, 0x7ff, 0x0, 0xbfb}, 0xffffffffffffffff, 0xd, r0, 0x8) 06:36:05 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:05 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 76) 06:36:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x94, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x50}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfffd}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x804}, 0xe0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:36:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:05 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 06:36:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3e, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1008.471344] syz-executor.6: attempt to access beyond end of device [ 1008.471344] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1008.472550] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:36:05 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 77) [ 1008.554599] No source specified [ 1008.556182] No source specified [ 1008.587492] syz-executor.6: attempt to access beyond end of device [ 1008.587492] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1008.595728] loop3: detected capacity change from 0 to 10 [ 1008.618979] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x43, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:17 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:17 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:36:17 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='\x00', 0x0, r0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:36:17 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 06:36:17 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 78) 06:36:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1020.294605] loop3: detected capacity change from 0 to 10 [ 1020.313186] FAULT_INJECTION: forcing a failure. [ 1020.313186] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.314725] CPU: 0 PID: 7780 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1020.315804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.316895] Call Trace: [ 1020.317262] [ 1020.317595] dump_stack_lvl+0xc1/0xf0 [ 1020.318158] should_fail_ex+0x4b4/0x5b0 [ 1020.318722] should_failslab+0x9/0x20 [ 1020.319253] __kmem_cache_alloc_node+0x66/0x310 [ 1020.319906] ? legacy_init_fs_context+0x44/0xe0 [ 1020.320550] ? lockdep_init_map_type+0x21e/0x7e0 [ 1020.321215] kmalloc_trace+0x26/0xc0 [ 1020.321747] legacy_init_fs_context+0x44/0xe0 [ 1020.322366] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 1020.323071] alloc_fs_context+0x571/0x9e0 [ 1020.323650] path_mount+0xa6d/0x1e50 [ 1020.324192] ? kasan_quarantine_put+0x81/0x1d0 [ 1020.324842] ? __pfx_path_mount+0x10/0x10 [ 1020.325429] ? putname+0x102/0x140 [ 1020.325950] ? kmem_cache_free+0x10d/0x4d0 [ 1020.326548] ? putname+0x102/0x140 [ 1020.327064] __x64_sys_mount+0x286/0x310 [ 1020.327650] ? __pfx___x64_sys_mount+0x10/0x10 [ 1020.327706] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1020.327753] do_syscall_64+0x3f/0x90 [ 1020.327806] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1020.327840] RIP: 0033:0x7fa185d3b04a [ 1020.327862] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.327895] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1020.327927] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 1020.327949] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 1020.327971] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 1020.327992] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 1020.328013] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 1020.328058] [ 1020.357463] No source specified [ 1020.358459] No source specified 06:36:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:29 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 06:36:29 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:36:29 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 79) 06:36:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:29 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:29 executing program 1: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) r4 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$unix(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="1d30ed44cf1023530cf640f607050521388db43c877e33c80e7af5b42c9206eadbaf5a03b67d5097539cdc5cfd39211dd10a70ab862fd8cb0256790efeade295a08eaee5ab634238b0bddcc44047f5df4ca94b981ba486c3d7e91f4a856bdf14e38bae9b7b1b10a6390372d722fda11efd68e6c7ec1fa7", 0x77}], 0x1, &(0x7f00000001c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2, r3]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r4, 0xffffffffffffffff, r5]}}], 0x60, 0x40000}, 0x0) r6 = syz_open_procfs(r0, &(0x7f0000000040)='net/protocols\x00') getdents64(r6, &(0x7f0000000000)=""/39, 0x27) [ 1032.027212] syz-executor.6: attempt to access beyond end of device [ 1032.027212] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1032.030520] No source specified [ 1032.031251] No source specified [ 1032.036723] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:29 executing program 1: r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20) inotify_rm_watch(0xffffffffffffffff, r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) 06:36:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 80) 06:36:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffffffe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1032.159056] No source specified 06:36:29 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) [ 1032.179066] No source specified [ 1032.210279] FAULT_INJECTION: forcing a failure. [ 1032.210279] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.212081] CPU: 0 PID: 7825 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1032.213160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.214202] Call Trace: [ 1032.214544] [ 1032.214848] dump_stack_lvl+0xc1/0xf0 [ 1032.215378] should_fail_ex+0x4b4/0x5b0 [ 1032.215914] should_failslab+0x9/0x20 [ 1032.216421] __kmem_cache_alloc_node+0x66/0x310 [ 1032.217039] ? legacy_init_fs_context+0x44/0xe0 [ 1032.217658] ? lockdep_init_map_type+0x21e/0x7e0 [ 1032.218300] kmalloc_trace+0x26/0xc0 [ 1032.218804] legacy_init_fs_context+0x44/0xe0 [ 1032.219416] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 1032.220116] alloc_fs_context+0x571/0x9e0 [ 1032.220670] path_mount+0xa6d/0x1e50 [ 1032.221202] ? kasan_quarantine_put+0x81/0x1d0 [ 1032.221860] ? __pfx_path_mount+0x10/0x10 [ 1032.222439] ? putname+0x102/0x140 [ 1032.222935] ? kmem_cache_free+0x10d/0x4d0 [ 1032.223522] ? putname+0x102/0x140 [ 1032.224034] __x64_sys_mount+0x286/0x310 [ 1032.224607] ? __pfx___x64_sys_mount+0x10/0x10 [ 1032.225250] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1032.225974] do_syscall_64+0x3f/0x90 [ 1032.226513] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1032.227180] RIP: 0033:0x7fa185d3b04a [ 1032.227667] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.229958] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.230929] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 1032.231836] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 1032.232730] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 1032.233646] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 1032.234545] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 1032.235488] 06:36:29 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1032.252433] loop3: detected capacity change from 0 to 10 06:36:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes128, 0x10, @auto="f6440f49a3b64662"}) [ 1032.336613] No source specified [ 1032.362224] No source specified 06:36:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x1000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:29 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1032.920177] loop3: detected capacity change from 0 to 10 06:36:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 81) 06:36:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/26, 0x1a) 06:36:42 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:36:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:42 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:42 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) [ 1045.145494] No source specified [ 1045.146298] No source specified [ 1045.151927] syz-executor.6: attempt to access beyond end of device [ 1045.151927] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1045.155366] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:42 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) 06:36:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x20400, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r2, r2, 0x77, 0x0) pread64(r2, &(0x7f0000000240)=""/234, 0xea, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)="7dde77018500cf984bef4342abd83af3203891d3952995eb27ce0a87cdd59e4a64c0241182ad09af2d9c03b09f4f2138a936d8a2c05232b2ca0ae4a10a09224267325e616097a5fd4aa3454ad4569c42bcc5fb81989d3af2c32bc36ef3745ef170c532d07ff2f5f40ac9375e52b7fd3e93b136fd32f7d016fb1aef02eee04ac10192022a893ea742379bb3cf76c2", 0x8e}], 0x1, 0xe3a, 0x2d0535b) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getdents64(r4, &(0x7f0000000040)=""/53, 0xfffffffffffffdab) 06:36:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 82) [ 1045.219753] loop3: detected capacity change from 0 to 10 [ 1045.311597] No source specified [ 1045.330335] No source specified 06:36:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x20000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:42 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1045.414763] syz-executor.6: attempt to access beyond end of device [ 1045.414763] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1045.430807] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf0ffffffffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:42 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) [ 1045.617742] No source specified [ 1045.623935] No source specified 06:36:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 83) [ 1045.761098] syz-executor.6: attempt to access beyond end of device [ 1045.761098] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1045.766575] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:36:55 executing program 1: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_vs_stats_percpu\x00') pread64(r1, &(0x7f0000000040)=""/66, 0x42, 0x5) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:36:55 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:36:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = fsmount(0xffffffffffffffff, 0x0, 0x9) mq_timedsend(r0, &(0x7f0000000140)="fed27d94924a5bb071f17fc06b265ad7b3658410507a12d7d0e0b4cb2d8c5c921981fdf395a929cade6f985cd03d19db81081f2d1ade58b5372a1a0ddfd1afb2ff91025f5ac1a11e6042e614bcb3adcebd88172a448d7290c64cd3002edd6eec04142264355b2685cb1fa97c8a208892f28864ca77ed2fc7459fc89ee18b504635f31e5068e53ea3347902f75bb5e83b78e60b25abdf366dafbe3119acde9ffec69aa67f03239835bf5f641ad64c2dbb39c28497acb5857173b4cef6472e439d7f9a9e7a87f685869293bd33c51b00fb750a", 0xd2, 0x2b79, &(0x7f0000000000)={0x0, 0x989680}) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) 06:36:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa80, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:55 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 84) 06:36:55 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:55 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 1057.747453] No source specified [ 1057.751501] loop3: detected capacity change from 0 to 10 [ 1057.762269] No source specified [ 1057.767446] FAULT_INJECTION: forcing a failure. [ 1057.767446] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.769344] CPU: 0 PID: 7911 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1057.770435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1057.771548] Call Trace: [ 1057.771915] [ 1057.772237] dump_stack_lvl+0xc1/0xf0 [ 1057.772799] should_fail_ex+0x4b4/0x5b0 [ 1057.773350] should_failslab+0x9/0x20 [ 1057.773872] __kmem_cache_alloc_node+0x66/0x310 [ 1057.774514] ? alloc_super+0x52/0xae0 [ 1057.775060] ? __pfx_lock_release+0x10/0x10 [ 1057.775651] kmalloc_trace+0x26/0xc0 [ 1057.776168] alloc_super+0x52/0xae0 [ 1057.776709] ? __pfx_test_bdev_super+0x10/0x10 [ 1057.777344] sget+0x114/0x5b0 [ 1057.777804] ? __pfx_set_bdev_super+0x10/0x10 [ 1057.778482] mount_bdev+0xf6/0x3d0 [ 1057.779006] ? __pfx_isofs_fill_super+0x10/0x10 [ 1057.779675] ? __pfx_isofs_mount+0x10/0x10 [ 1057.780276] legacy_get_tree+0x109/0x220 [ 1057.780855] vfs_get_tree+0x92/0x360 [ 1057.781400] path_mount+0x133c/0x1e50 [ 1057.781972] ? kasan_quarantine_put+0x81/0x1d0 [ 1057.782623] ? __pfx_path_mount+0x10/0x10 [ 1057.783214] ? putname+0x102/0x140 [ 1057.783734] ? kmem_cache_free+0x10d/0x4d0 [ 1057.784333] ? putname+0x102/0x140 [ 1057.784860] __x64_sys_mount+0x286/0x310 [ 1057.785391] ? __pfx___x64_sys_mount+0x10/0x10 [ 1057.786023] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1057.786769] do_syscall_64+0x3f/0x90 [ 1057.787319] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1057.788031] RIP: 0033:0x7fa185d3b04a [ 1057.788554] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1057.790971] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1057.791996] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 1057.792967] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 1057.793927] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 1057.794910] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 1057.795872] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 1057.796861] 06:36:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x20400, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r2, r2, 0x77, 0x0) pread64(r2, &(0x7f0000000240)=""/234, 0xea, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)="7dde77018500cf984bef4342abd83af3203891d3952995eb27ce0a87cdd59e4a64c0241182ad09af2d9c03b09f4f2138a936d8a2c05232b2ca0ae4a10a09224267325e616097a5fd4aa3454ad4569c42bcc5fb81989d3af2c32bc36ef3745ef170c532d07ff2f5f40ac9375e52b7fd3e93b136fd32f7d016fb1aef02eee04ac10192022a893ea742379bb3cf76c2", 0x8e}], 0x1, 0xe3a, 0x2d0535b) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getdents64(r4, &(0x7f0000000040)=""/53, 0xfffffffffffffdab) [ 1057.835342] No source specified [ 1057.836645] No source specified 06:36:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:36:55 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:36:55 executing program 1: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf25010000000c00060002000000000000000c00060000000000000000000c0006000200000002000000080003be", @ANYRES32=r0, @ANYBLOB="08000100020000000c0006000000000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40000c4}, 0x4000040) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:36:55 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 85) 06:36:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:36:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:36:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000000)) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000080)={0x24, 0x6a, 0x101, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) [ 1057.983228] No source specified [ 1058.000860] No source specified [ 1058.030632] syz-executor.6: attempt to access beyond end of device [ 1058.030632] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1058.031615] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1058.032962] loop3: detected capacity change from 0 to 10 [ 1058.055412] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 06:37:06 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:37:06 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 86) 06:37:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:06 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2141135a248505a6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='*\\*\xc2\'-{,+/.\x00') r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) 06:37:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x6, 0x2002) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000080)=""/39, 0x27}, {&(0x7f0000000100)=""/187, 0xbb}, {&(0x7f00000001c0)=""/106, 0x6a}, {&(0x7f0000000240)=""/57, 0x39}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f0000000380)=""/65, 0x41}], 0x6, 0x2, 0x7fff) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:37:06 executing program 7: perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 1069.636621] No source specified [ 1069.638863] No source specified 06:37:07 executing program 7: perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/exec\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$RTC_UIE_OFF(r1, 0x7004) getdents64(r0, &(0x7f0000000040)=""/39, 0x27) fdatasync(r0) 06:37:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1069.688378] FAULT_INJECTION: forcing a failure. [ 1069.688378] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.689974] CPU: 0 PID: 7954 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1069.691053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1069.692128] Call Trace: [ 1069.692481] [ 1069.692803] dump_stack_lvl+0xc1/0xf0 [ 1069.693351] should_fail_ex+0x4b4/0x5b0 [ 1069.693905] should_failslab+0x9/0x20 [ 1069.694450] __kmem_cache_alloc_node+0x66/0x310 [ 1069.695091] ? alloc_super+0x52/0xae0 [ 1069.695634] ? __pfx_lock_release+0x10/0x10 [ 1069.696236] kmalloc_trace+0x26/0xc0 [ 1069.696748] alloc_super+0x52/0xae0 [ 1069.697267] ? __pfx_test_bdev_super+0x10/0x10 [ 1069.697890] sget+0x114/0x5b0 [ 1069.698359] ? __pfx_set_bdev_super+0x10/0x10 [ 1069.698977] mount_bdev+0xf6/0x3d0 [ 1069.699488] ? __pfx_isofs_fill_super+0x10/0x10 [ 1069.700128] ? __pfx_isofs_mount+0x10/0x10 [ 1069.700706] legacy_get_tree+0x109/0x220 [ 1069.701270] vfs_get_tree+0x92/0x360 [ 1069.701799] path_mount+0x133c/0x1e50 [ 1069.702356] ? kasan_quarantine_put+0x81/0x1d0 [ 1069.702989] ? __pfx_path_mount+0x10/0x10 [ 1069.703567] ? putname+0x102/0x140 [ 1069.704068] ? kmem_cache_free+0x10d/0x4d0 [ 1069.704648] ? putname+0x102/0x140 [ 1069.705160] __x64_sys_mount+0x286/0x310 [ 1069.705730] ? __pfx___x64_sys_mount+0x10/0x10 [ 1069.706379] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1069.707094] do_syscall_64+0x3f/0x90 [ 1069.707630] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1069.708313] RIP: 0033:0x7fa185d3b04a [ 1069.708817] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1069.711136] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1069.712122] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 1069.713059] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 1069.713985] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 1069.714932] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 1069.715870] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 1069.716825] [ 1069.727454] loop3: detected capacity change from 0 to 10 06:37:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:07 executing program 7: perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 1069.839371] No source specified [ 1069.845277] No source specified [ 1070.921320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1070.922101] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1070.923176] Buffer I/O error on dev sr0, logical block 0, async page read [ 1070.930103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1070.930840] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1070.931954] Buffer I/O error on dev sr0, logical block 1, async page read [ 1070.962489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1070.963078] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 6 prio class 2 [ 1070.963833] Buffer I/O error on dev sr0, logical block 2, async page read [ 1070.964418] Buffer I/O error on dev sr0, logical block 3, async page read [ 1070.965068] Buffer I/O error on dev sr0, logical block 4, async page read [ 1070.965702] Buffer I/O error on dev sr0, logical block 5, async page read [ 1070.966319] Buffer I/O error on dev sr0, logical block 6, async page read [ 1070.966949] Buffer I/O error on dev sr0, logical block 7, async page read [ 1070.967974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1070.968877] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1070.970190] Buffer I/O error on dev sr0, logical block 0, async page read [ 1070.993084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1070.993594] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 7 prio class 2 [ 1070.995641] Buffer I/O error on dev sr0, logical block 1, async page read 06:37:21 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2141135a248505a6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='*\\*\xc2\'-{,+/.\x00') r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) 06:37:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:21 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:37:21 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/29, 0x1d) r1 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="34a7e38e00639ba54b846988058836b66e1635c2188ff7d0bc26eec8bb5c3d127ed855485d903f557028b259343b675a7385008471bd9b36950f3ed2a6049a5d9ebe57f082245ff59818aed0eca3e7fd7ec81b119ec496842e121e724a924fa7e108a55ade9e9b6786cb07e55681f9b71fa093aa0425ef2e59617378456cc3306522e639567007f3b2f751c8942c7052ec482867b819ee33f808d1bb619f8e63deb056789f1b16b8927eca3c22ee3aa1050a0a4770dd6ee0ec3331b072f831413a80fd8c57bffe60", 0xc8, 0x100}], 0x28404, &(0x7f0000000240)={[{'&'}], [{@smackfstransmute}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x36, 0x34, 0x66, 0x36, 0x63, 0x65, 0x39], 0x2d, [0x66, 0x38, 0x33, 0x39], 0x2d, [0x64, 0x66, 0x63, 0x39], 0x2d, [0x36, 0x35, 0x36, 0x35], 0x2d, [0x34, 0x39, 0x34, 0xe0ab6559c5786a6f, 0x33, 0x37, 0x64, 0x37]}}}, {@fowner_gt}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@subj_user}, {@uid_gt={'uid>', 0xee01}}, {@uid_eq}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x0) r5 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r4, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) pread64(r4, &(0x7f0000000580)=""/104, 0x68, 0x8) setresuid(0x0, r9, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r6}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r8}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r9}}]}}) fchownat(r1, &(0x7f0000000340)='./file0\x00', r9, 0xee01, 0x1000) ioctl$FS_IOC_ENABLE_VERITY(r7, 0x40806685, &(0x7f0000000380)={0x1, 0x2, 0x1000, 0xdd, &(0x7f00000007c0)="bad818f2ce02ad8df0a88aaa9039ac25bdbd0aecf5292660e8129219a13ebad99bf864d3d904f0eaa2c418ff06ca0d0e1cec92c39c44091b7637e3c74c0e1e04c4750a4eaf91ff9a219e0fe0746b775915a51bb6a01ef2cdcf4dd051518d628295b3adb7abea891ba4610f199a101c7cc27b55813b46735b41d7e210454535593c20c2b7c34c4fbf969a6658ebfc3cbd114645316de4be365747d7475f4efe8438a633bd334312582f7db81e8ba57b3e543ebf11aff8d4e3207ca66508bbb67ebb1004e17b220961c53390f7b2cc8a75860976b5fa3b96caf8ae2aacc0", 0xd5, 0x0, &(0x7f00000008c0)="04f6fc2ae47b7d7cbcf24c0c8a20eb8f09addc08e17fe5825ead2aa36c81a4a85560c7a25ecdb1f5a3d4f01d344883844f6d638d9c8861095171ee01c5af068e56ed16aec497a26dc6aa976a55f239684717f34925a116ddcf4de4398c7baa84de0db4bd19a1993715ff39293d3c6107e11140874c538ac8cbf216cf852a153e23531dcc618adc3d10ecb178a5e1527f1173d43d1fa76cb78f2ba275808c0a57d03b14cdd45dfd977ac22de64377353efbe9a1db9b6e800e77c70e33180962e7f68293b33bafbb96a1839974f0f14d41ddfa2ca01b"}) 06:37:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 87) 06:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2400, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:21 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1084.332947] loop3: detected capacity change from 0 to 10 [ 1084.386890] No source specified [ 1084.397357] No source specified [ 1084.409035] syz-executor.6: attempt to access beyond end of device [ 1084.409035] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1084.413741] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:37:21 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3e00, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:21 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 88) [ 1084.536288] No source specified [ 1084.539838] No source specified 06:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4300, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:21 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1084.617279] FAULT_INJECTION: forcing a failure. [ 1084.617279] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.618726] CPU: 1 PID: 8005 Comm: syz-executor.6 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1084.619641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1084.620525] Call Trace: [ 1084.620863] [ 1084.621163] dump_stack_lvl+0xc1/0xf0 [ 1084.621685] should_fail_ex+0x4b4/0x5b0 [ 1084.622100] should_failslab+0x9/0x20 [ 1084.622593] __kmem_cache_alloc_node+0x66/0x310 [ 1084.623139] ? alloc_super+0x52/0xae0 [ 1084.623659] ? __pfx_lock_release+0x10/0x10 [ 1084.624156] kmalloc_trace+0x26/0xc0 [ 1084.624591] alloc_super+0x52/0xae0 [ 1084.625042] ? __pfx_test_bdev_super+0x10/0x10 [ 1084.625609] sget+0x114/0x5b0 [ 1084.625954] ? __pfx_set_bdev_super+0x10/0x10 [ 1084.626524] mount_bdev+0xf6/0x3d0 [ 1084.626928] ? __pfx_isofs_fill_super+0x10/0x10 [ 1084.627427] ? __pfx_isofs_mount+0x10/0x10 [ 1084.627886] legacy_get_tree+0x109/0x220 [ 1084.628315] vfs_get_tree+0x92/0x360 [ 1084.628723] path_mount+0x133c/0x1e50 [ 1084.629139] ? kasan_quarantine_put+0x81/0x1d0 [ 1084.629625] ? __pfx_path_mount+0x10/0x10 [ 1084.630074] ? putname+0x102/0x140 [ 1084.630459] ? kmem_cache_free+0x10d/0x4d0 [ 1084.630911] ? putname+0x102/0x140 [ 1084.631306] __x64_sys_mount+0x286/0x310 [ 1084.631758] ? __pfx___x64_sys_mount+0x10/0x10 [ 1084.632251] ? __pfx___x64_sys_mount+0x10/0x10 [ 1084.632755] do_syscall_64+0x3f/0x90 [ 1084.633161] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1084.633688] RIP: 0033:0x7fa185d3b04a [ 1084.634078] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.635889] RSP: 002b:00007fa1832aefa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1084.636646] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 00007fa185d3b04a [ 1084.637374] RDX: 0000000020000280 RSI: 00000000200004c0 RDI: 00007fa1832af000 [ 1084.638089] RBP: 00007fa1832af040 R08: 00007fa1832af040 R09: 0000000020000280 [ 1084.638819] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000280 [ 1084.639527] R13: 00000000200004c0 R14: 00007fa1832af000 R15: 0000000020000000 [ 1084.640258] [ 1084.752376] No source specified [ 1084.758108] No source specified [ 1085.288959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.289914] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.291204] buffer_io_error: 6 callbacks suppressed [ 1085.291222] Buffer I/O error on dev sr0, logical block 0, async page read [ 1085.299265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.299649] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.300252] Buffer I/O error on dev sr0, logical block 1, async page read [ 1085.300857] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.301240] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.301833] Buffer I/O error on dev sr0, logical block 2, async page read [ 1085.302416] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.302819] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.303370] Buffer I/O error on dev sr0, logical block 3, async page read [ 1085.303961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.304337] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.304921] Buffer I/O error on dev sr0, logical block 4, async page read [ 1085.305504] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.305900] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.306499] Buffer I/O error on dev sr0, logical block 5, async page read [ 1085.307083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.307462] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.308042] Buffer I/O error on dev sr0, logical block 6, async page read [ 1085.308639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1085.309057] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1085.309641] Buffer I/O error on dev sr0, logical block 7, async page read [ 1085.389512] loop3: detected capacity change from 0 to 10 06:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800a, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:34 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)) r2 = socket$inet6(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r2, 0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffa, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xe5}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) recvmmsg$unix(r1, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socket$inet6(0xa, 0x800, 0x7) 06:37:34 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 89) 06:37:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x1800000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) fstatfs(r0, &(0x7f0000000040)=""/83) 06:37:34 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1097.118331] syz-executor.6: attempt to access beyond end of device [ 1097.118331] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1097.119297] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1097.122004] No source specified [ 1097.128890] loop3: detected capacity change from 0 to 10 [ 1097.129566] No source specified 06:37:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:34 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 90) 06:37:34 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1097.220555] No source specified [ 1097.221369] No source specified [ 1097.243279] syz-executor.6: attempt to access beyond end of device [ 1097.243279] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1097.250233] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:34 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) (fail_nth: 91) 06:37:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4000010000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1097.318501] No source specified [ 1097.321458] No source specified 06:37:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:34 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1097.424482] loop3: detected capacity change from 0 to 10 06:37:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:47 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:47 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:37:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6500000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:47 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:47 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001280)={0x0, 0x0}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/rt6_stats\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000100), r1) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_I_TEI={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004840}, 0x4000) 06:37:47 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1110.664596] No source specified [ 1110.665529] No source specified [ 1110.691354] syz-executor.6: attempt to access beyond end of device [ 1110.691354] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:37:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x5, 0x1}}, './file0\x00'}) lseek(r1, 0x80, 0x3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xa42, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x120) getdents64(r2, &(0x7f0000000100)=""/34, 0x14) [ 1110.704261] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1110.763063] loop3: detected capacity change from 0 to 10 [ 1110.766442] No source specified [ 1110.767214] No source specified 06:37:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8004000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x0, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:37:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x2, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:37:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:48 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:48 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, 0x0, 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1110.861425] No source specified [ 1110.866052] No source specified [ 1110.880402] syz-executor.6: attempt to access beyond end of device [ 1110.880402] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1110.884560] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:37:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:37:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x77, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000400)={0xbc, @multicast1, 0x4e20, 0x4, 'lblc\x00', 0x15, 0x80000000, 0x71}, 0x2c) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) sendmsg$NL80211_CMD_AUTHENTICATE(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r3, @ANYBLOB="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"], 0x12c}}, 0x4000) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000100)=""/192) 06:37:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x3, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1110.960235] No source specified 06:37:48 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:37:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x28042, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffffc, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000ff482d3a60618dc90c33c64577ac4ed5bd127f7890e4cea0d5d4fbc186ec8c8f16eff0384ce1f28f78f5108a8c26d7fd9bd7ab30353d420f", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1/file0\x00']) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x12, 0x0, 0x3) fcntl$setstatus(r3, 0x4, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) openat(r4, &(0x7f00000001c0)='./file1/file0\x00', 0x2, 0x4) recvfrom(r4, &(0x7f0000000180)=""/213, 0xd5, 0x2040, &(0x7f0000000000)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x2000}, 0x80) close(r2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) [ 1110.965550] No source specified [ 1111.091001] loop3: detected capacity change from 0 to 10 06:38:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:01 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) openat(r0, &(0x7f0000000040)='./file0\x00', 0x400000, 0x80) 06:38:01 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, 0x0, 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:38:01 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:01 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000001200), 0x0, 0x181000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000600)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000340)={{}, 0x0, 0x10, @inherit={0x60, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000300000000000078551f000101720000000000f8ffffffffffffff000000000000070003000000000000005b00000000000000ffffffff00000000001000000000000004000000000000000300000000"]}, @devid=r3}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000080)={{r1}, r2, 0x8, @unused=[0xb6, 0x9, 0x6, 0x10001], @devid=r3}) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000033e2b1c558f6a76f", @ANYRES32=r0, @ANYBLOB="7e020000000000002e2f66696c653000"]) [ 1124.575789] No source specified [ 1124.579099] No source specified [ 1124.585070] syz-executor.6: attempt to access beyond end of device [ 1124.585070] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1124.589898] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r1 = epoll_create(0x8) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xff}}, './file0\x00'}) [ 1124.615629] syz-executor.6: attempt to access beyond end of device [ 1124.615629] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1124.623761] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1124.647863] loop3: detected capacity change from 0 to 10 06:38:01 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r1, 0x80189439, &(0x7f0000000080)) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r2, 0xf50f, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000052c0)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) bind$bt_hci(r3, &(0x7f0000005300)={0x1f, 0x1}, 0x6) writev(r1, &(0x7f0000005600)=[{&(0x7f0000005340)="ac206da0c594", 0x6}, {&(0x7f0000005380)="bd4f866e7733843b6fd8a1ad34296e8e350f35e7d5864866b091075bfdb165e2391f300693a41b7d7cf583d005eb2882cc99ec4aca6a31a13240d51743bbde7691090eb8db1e9e8d59e9235dcc22e3562643c4fafe81510bfe08d220fbd0bdde33496ef204b23f9328f6db63b277090e02d29a17b169f531e616b62b7614859ded03eac7b197ed9ba72f5cfbac280782e94edcd17aabdd12e72d1ca7b05679f4f40c4bb86ea56597f0", 0xa9}, {&(0x7f0000005440)="7f6a40620481d31202d1dedfa27f27787436475b39406b911083f8686ee7dabb37ec05773c578ff153c59d5839982fa5de6a00a4c0d5e83d85e5886b747ab437851664c92915ec00c37971813fde78381dc2e1693d4e336b5d26ecd7c225d6f2a6a4532d4438ecd2f150b37fe0a117968a43ae6529d2ad030cd76431cced20071c8f3354388ebf31759a1bf1674d3294b3806c9abf34f459311459cb76250b7f870491", 0xa3}, {&(0x7f0000005500)="e19d632f4afa60f01fb5dc7a2e0f3f164d725257ad4e8860d61dfb86bfbdfc7927349481775ac27915c4c9a456480cb94c14b84ec42277f9de36d61155ded11cf4e554fda7e6c8795dc540d2842244910c775bd4bac465cfbe6afdd80bcec9d5327df7bb33308dbcceb2970e9950f834577e2b2c4dee065c348c8baf4e154be270dfddd507f1efc76684c0245798a9aeb3660751a530c7e225d47975a4f4a5385e06f95aca08ccd66f1205e5ab753f5f9e2c9ee305bcceb7e862e2287bee3649ac114dcc3a99b2473b51bcb70925eb2f121b90f46cef1234857c9c4a8f980fdef490c565a1c8779621ced5eb", 0xec}], 0x4) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = accept(0xffffffffffffffff, &(0x7f0000006a80)=@ll, &(0x7f0000006b00)=0x80) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000006b40), 0x0, 0x0) stat(&(0x7f0000006b80)='./file0\x00', &(0x7f0000006bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f0000006cc0)={&(0x7f0000005640)=@proc={0x10, 0x0, 0x25dfdbff, 0x400000}, 0xc, &(0x7f0000006a40)=[{&(0x7f0000005680)={0x1a0, 0x1c, 0x2, 0x70bd2d, 0x25dfdbfb, "", [@generic="9abd5ddf90bbd4ce6069f8dc2c80bad8b0fef34f454a1ab0f12723e2f804177ee9f0f7634c1122f2b488e6e7e0d4cf03f38b00d0ebd72ae82428ab65088c0af8addfb9cd38efb93abab73e1737c7372f364f5c276920812aa11d9b22924b09e8205e3305bc88aba1114c3b1936aa2177ca70af204bc312acc8a740e685802e12e4648c5de48ad52bf36a9900f0f1cdac5ff2ba2c0379ef7d4548b0f71372a0fd7dc2a73bf6305c992983b42ea1dabd954634a9818d03723ec22e467c7a2066e12e4ca58841d964e69def4f6ef81c7a764dd015422bcea7e43ab40a5b2c25bc104b83c08713a9cd84c7adff7b32f6777d930f839e0f099244e5", @generic="67504da984674b5bea9827968eb03236cc7809fa5dcc8a4b0097d76301b5a1869c5ef555f3a1664181d9fe9a1c8ce657d652362bd8b5661d6ecc982783df7ed3c97d38fe4eeeecf0efa1b4a4163468c1b37bdf61a6fb6719a355ea40f977b3b83f6b5cb8a69011d63c2de92581e929556fa60458ac43d62de4f35ebcf6ef1d580d1bff1f1eb139", @generic="03e431eaebd1f3fddb02cca9c95c1c4e"]}, 0x1a0}, {&(0x7f0000005840)={0x1200, 0x2b, 0x200, 0x70bd27, 0x25dfdbfd, "", [@typed={0xc, 0x73, 0x0, 0x0, @u64=0x80000001}, @nested={0x1083, 0xa, 0x0, 0x1, [@typed={0x4, 0x22}, @generic="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", @generic="2469ae109c18e45adb5ed6c8aea93b166981c8463daaf9e7ecab68e3ab1ba15b4f84a4685d59b367b4cec55476ff2a6c71f7ebf02e289c6019a086", @typed={0x6, 0x6e, 0x0, 0x0, @str='&\x00'}, @typed={0x8, 0x1c, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="a6d3e2cdb7f058c6f66a82b820f37b31d1c347cc386bed56858b3e80", @typed={0x4, 0x7a, 0x0, 0x0, @binary}, @typed={0x8, 0x5e, 0x0, 0x0, @u32}, @typed={0x8, 0x2d, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}]}, @typed={0x8, 0x5b, 0x0, 0x0, @ipv4=@multicast2}, @nested={0xc6, 0x29, 0x0, 0x1, [@generic="49a61f794b236e84ccf6656a9b50d78dccf5e064ff84ef1bceeb90abd602db960495ae7c5d901401da4642f849d7589afc9d9317429a0f293982b6b3eab4e872c8eea7259d532006dbda9d90d5faf7b5025976b92af9b0d05596d0ff8232f974bbe1bf7abaa3a950777a5c2e9391cbff15ec1d37610a511fd9823ecc1178868227d08db98b247ed762918e5c8a210d7ccbc8d8a7ace2cb5e5c5f7daaedfc6bb275a0cae9782a", @typed={0x5, 0x3f, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@multicast1}, @typed={0xc, 0x81, 0x0, 0x0, @u64=0x20}]}, @typed={0x8, 0x12, 0x0, 0x0, @u32=0xffffffff}, @generic="255aa4148ed62ae305b830b36892a66dcd6186c650febcd064649b9aef871500143c9e8434d34941109fba83bb62372516996d5fd5b43950e412a1e794c910ef5b249b91818edfa5305f2120ab37426819e2f8f7d3fe134a778d2395a1c3a1ef8533c591b2f33ba6ea5d7984f4ace5bb31d23fa8b7b41ab7f80fa1fa89c3608e546203224a"]}, 0x1200}], 0x2, &(0x7f0000006c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r6, 0xffffffffffffffff, r2, r7]}}, @rights={{0x1c, 0x1, 0x1, [r0, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, r8}}}], 0x68, 0x4008000}, 0x8004) lgetxattr(&(0x7f0000006d00)='./file0\x00', &(0x7f0000006d40)=@random={'system.', '&\x00'}, &(0x7f0000006d80)=""/234, 0xea) r9 = creat(&(0x7f0000006e80)='./file0\x00', 0x101) pwrite64(r9, &(0x7f0000006ec0)="8aef572043436dc2fd89a0d1bf718e7067e14d55b0c8e060c3cbeea80baaad0241c7470578d177ca58aa88b30506b44dc264b804936ec439ad87a220266e9ae3d90f37d16d86c958e2457a5916800b085f0b9d98181a3be72a6fe5196e369130f908b7f977d67b537036423727d4b667134fb4a18296c3355103d2d87cbd9ee6bf65ded85d0bf8bfecdcb74bba16328f568de8bccb317b5064240d973f8dcb44be07d11657b8c6473056d9f6b690a09b90b01efcd853ea0d3c88ed01607b2be6dba9937b7dd4bf8e545dae94408c21040517a8d76b710a92a37a6aa360c5ead8879fae6e9f58f340a03f", 0xea, 0x81) socketpair(0x26, 0x1, 0x2, &(0x7f0000006fc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r10, 0x8983, &(0x7f0000007000)={0x3, 'gre0\x00', {0x800}, 0xff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000008fc0)=[{{&(0x7f0000007080)=@abs, 0x6e, &(0x7f00000074c0)=[{&(0x7f0000007100)=""/14, 0xe}, {&(0x7f0000007140)=""/18, 0x12}, {&(0x7f0000007180)=""/131, 0x83}, {&(0x7f0000007240)=""/167, 0xa7}, {&(0x7f0000007300)=""/45, 0x2d}, {&(0x7f0000007340)=""/104, 0x68}, {&(0x7f00000073c0)=""/215, 0xd7}], 0x7, &(0x7f0000007540)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000075c0), 0x6e, &(0x7f00000077c0)=[{&(0x7f0000007640)=""/150, 0x96}, {&(0x7f0000007700)=""/168, 0xa8}], 0x2, &(0x7f0000007800)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f00000078c0), 0x6e, &(0x7f0000008ec0)=[{&(0x7f0000007940)=""/4096, 0x1000}, {&(0x7f0000008940)=""/202, 0xca}, {&(0x7f0000008a40)}, {&(0x7f0000008a80)=""/240, 0xf0}, {&(0x7f0000008b80)=""/113, 0x71}, {&(0x7f0000008c00)=""/126, 0x7e}, {&(0x7f0000008c80)=""/114, 0x72}, {&(0x7f0000008d00)=""/136, 0x88}, {&(0x7f0000008dc0)=""/236, 0xec}], 0x9, &(0x7f0000008f80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}], 0x3, 0x40002100, &(0x7f0000009080)={0x0, 0x3938700}) 06:38:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xbe00000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1124.731954] No source specified [ 1124.733883] No source specified 06:38:14 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4c0200001400040027bd7000010000007f000001000000000000000000000000ff0200000000000000000000000000014e2300014e2000090a0030205e000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="b36b6e0000000000e40106007f000001000000000000000000000000000000000000000000000000000000004e2000044e2000050a0080a000000000bb7400bbf80b02f635c20bab999ae303e1317d5f7931b8618b86f90e526f2d87e365b26a9f361dbadb5c8894b9f50c1e565db3b82fb62ccf5d697f100000000075480cd847e340b00dc59526fe408ba32b2e0c409658894566543c4e9d46bab2c6540306a4870d9673985cd096967ef486344c01c9d96c6e4307929c4fac64fa180b0bcc09bb83ff", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac1e0101000004d632000000ff020000000000000000000000000001dc000000000000005119e47e000000000400000000000000ffffff7f0000000001010000000000000700000000000000ff00000000000000ffffffffffffffff0600000000000000070000000000000008000000000000000600000000000000fdffffffa111000001f8ffff25bd7000000000000a0003028000000000000000e400060000000000000000000000000000000000ff0200000000000000000000000000014e2100804e2400000200604011000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d233000000ac1414aa000000000000000000000000030000000000000097e500000000000000000000000000000400000000000000c005000000000000a10000000000000001000000000000000300000000000000010000000000000006000000000000000600000000000000030000000000000007000000040000000600000027bd700001350000020000070e000000000000002c001300e00000010000000000000000000000000a010100000000000000000000000000000000000000000008001e003f000000"], 0x24c}, 0x1, 0x0, 0x0, 0x80}, 0x8004) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @broadcast}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000080)={r5, 0x1, 0x6, @broadcast}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000440)=@expire={0x2dc, 0x18, 0x200, 0x70bd2d, 0x25dfdbfd, {{{@in=@dev={0xac, 0x14, 0x14, 0x16}, @in=@remote, 0x4e20, 0x9, 0x4e23, 0x5, 0xa, 0x20, 0x0, 0x0, r3, 0xee00}, {@in6=@empty, 0x4d5, 0x33}, @in=@private=0xa010101, {0x0, 0x101, 0x6, 0xfff, 0x5, 0xffffffffffffffff, 0x8, 0x4}, {0x3, 0x992, 0xff, 0x5}, {0x3ff, 0x80000001, 0x6}, 0x70bd25, 0x3506, 0x49e9b9ff614dd277, 0x1, 0x6, 0x41}, 0x4}, [@policy_type={0xa, 0x10, {0x1}}, @policy_type={0xa, 0x10, {0x1}}, @lifetime_val={0x24, 0x9, {0xe73, 0x0, 0x5, 0x80}}, @XFRMA_IF_ID={0x8, 0x1f, r5}, @sec_ctx={0x8f, 0x8, {0x8b, 0x8, 0x0, 0x4, 0x83, "423277ef37f92f5e5fa7c9b7079ba0c4c959d4d0354149d433c90cafd320c3be93babde2b7d15b280e3d4ff27c5a518d15b781c5b324b9745daaedb55c7eb40c0de651e8c6736d07470f6501f7cafca9b2defbf6b10caaaaa44f8bc0c90214e1ef628c2f059e1f4a261923bff59a15f94ec639f71caeeea35820f7fd16456b1c36be74"}}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd27, 0x7ff}}, @replay_val={0x10, 0xa, {0x70bd2c, 0x70bd2b, 0x1f}}, @migrate={0xe8, 0x11, [{@in6=@remote, @in6=@loopback, @in=@rand_addr=0x64010101, @in=@broadcast, 0xff, 0x3, 0x0, 0x3500, 0x2, 0x2}, {@in=@empty, @in6=@private1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote, 0x3c, 0x2, 0x0, 0x3502, 0xa, 0x2}, {@in6=@private0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, @in6=@private2, 0x33, 0x4, 0x0, 0x0, 0x2, 0x2}]}, @extra_flags={0x8, 0x18, 0x8}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x4008000}, 0x6000011) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:38:14 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, 0x0, 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:38:14 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x5, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xe300000000000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:14 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x4000000008001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) r3 = gettid() r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r4, 0x5000940e, &(0x7f0000000600)={{r1}, "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"}) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000000)={0x5, 0x15, 0x9}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0xff, 0xf8, 0xfd, 0x0, 0x4c, 0x0, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x3, @perf_bp={0x0, 0x8}, 0x40400, 0x0, 0x0, 0x2, 0x8, 0x200000, 0x0, 0x0, 0x4, 0x0, 0x80}, 0x0, 0xe, 0xffffffffffffffff, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000240), 0x32b4, 0x20000) ioctl$KDENABIO(r5, 0x4b36) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9, 0xf8, 0x8, 0x0, 0x0, 0x80000000, 0x2002a, 0x17015a1f62722666, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0xffff, 0x7}, 0x988, 0x9, 0x7ff, 0x2, 0x100000001, 0x400, 0x7, 0x0, 0xff000000, 0x0, 0x6}, r3, 0x4, r0, 0x2) [ 1137.075373] syz-executor.6: attempt to access beyond end of device [ 1137.075373] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1137.086762] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1137.090320] No source specified [ 1137.113502] No source specified [ 1137.114774] syz-executor.6: attempt to access beyond end of device [ 1137.114774] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1137.119517] syz_tun: entered promiscuous mode [ 1137.120218] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1137.150457] syz_tun: left promiscuous mode [ 1137.171125] syz_tun: entered promiscuous mode [ 1137.179002] syz_tun: left promiscuous mode 06:38:14 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:38:14 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1137.333273] No source specified [ 1137.340763] No source specified [ 1137.352455] syz-executor.6: attempt to access beyond end of device [ 1137.352455] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1137.362763] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1137.759919] loop3: detected capacity change from 0 to 10 06:38:28 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:38:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:28 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:28 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x7, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:28 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:38:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:28 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1682e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x2141135a248505a6}, 0x400, 0x6, 0x3, 0x0, 0x6b28, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpid() pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x5, 0x9, 0x1, 0x4, 0x0, 0x40, 0xa0000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffff6d, 0x2, @perf_bp={&(0x7f0000000100)}, 0x2, 0x8000, 0x4, 0x1, 0x1, 0x7d48, 0x6, 0x0, 0x2, 0x0, 0x8}, r2, 0x8, 0xffffffffffffffff, 0x9) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x810, r3, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x3}, 0x4) syz_open_dev$vcsa(&(0x7f0000000680), 0x1, 0x400) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000000)={0x6, 'veth1_to_team\x00', {}, 0xfff}) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000040)=0x7) move_mount(0xffffffffffffffff, &(0x7f0000000640)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000006c0)='./file1\x00', 0x12) [ 1151.604656] No source specified [ 1151.605457] No source specified [ 1151.612606] loop3: detected capacity change from 0 to 10 [ 1151.624404] syz-executor.6: attempt to access beyond end of device [ 1151.624404] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1151.629024] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1151.796885] No source specified [ 1151.800330] No source specified 06:38:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1151.869433] syz-executor.6: attempt to access beyond end of device [ 1151.869433] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1151.876078] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:29 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x8, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:29 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1151.966656] No source specified 06:38:29 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/fib_triestat\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x150, 0x0, 0x602, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x5}, {0x8, 0x13, 0x100400}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb3e}, {0x6, 0x11, 0x5}, {0x8}, {0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xfffffffc}, {0x6, 0x11, 0x800}, {0x8, 0x13, 0xfff}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x80}, {0x6, 0x11, 0x1}, {0x8, 0x13, 0x2}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x11, 0x4}, {0x8, 0x13, 0x80000000}, {0x5, 0x14, 0x1}}]}, 0x150}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:38:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfeffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1151.975161] No source specified 06:38:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1152.036537] syz-executor.6: attempt to access beyond end of device [ 1152.036537] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1152.079712] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1152.122638] syz-executor.6: attempt to access beyond end of device [ 1152.122638] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1152.157083] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1152.191389] No source specified [ 1152.197049] No source specified [ 1152.264151] loop3: detected capacity change from 0 to 10 06:38:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:41 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x9, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)=0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r1, 0x50009417, &(0x7f00000006c0)={{r0}, r2, 0x4, @unused=[0x5, 0x9, 0x7, 0x100000000], @subvolid=0x4}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x20, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x7f}}, ["", "", ""]}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r3, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x3}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:38:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfeffffffffffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x0, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:38:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) unshare(0x8000000) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1400}], 0x1, 0x0) r0 = semget(0x3, 0x0, 0x1e8) semctl$IPC_RMID(r0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0x9, 0x1800}, {0x1, 0x4, 0x3800}], 0x2, &(0x7f0000000100)={0x0, 0x3938700}) unshare(0x48040080) semget(0x3, 0x0, 0x510) [ 1163.735575] syz-executor.6: attempt to access beyond end of device [ 1163.735575] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1163.738390] No source specified [ 1163.739180] No source specified [ 1163.746217] loop3: detected capacity change from 0 to 10 [ 1163.749745] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1163.775087] syz-executor.6: attempt to access beyond end of device [ 1163.775087] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1163.783545] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 1163.867105] No source specified [ 1163.872405] No source specified 06:38:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xa, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffffffffffff000, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1164.135842] syz-executor.6: attempt to access beyond end of device [ 1164.135842] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1164.145633] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1164.212069] No source specified [ 1164.213613] No source specified 06:38:53 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, 0x0, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:38:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x24000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:53 executing program 1: r0 = gettid() setpriority(0x0, r0, 0x88) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/vlan/vlan1\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f0000000100)) recvmmsg$unix(r1, &(0x7f0000001180)=[{{&(0x7f00000003c0)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f00000012c0)=""/78, 0x4e}, {&(0x7f00000005c0)=""/124, 0x7c}, {&(0x7f0000000640)=""/238, 0xee}, {&(0x7f0000000740)=""/183, 0xb7}, {&(0x7f0000000800)=""/161, 0xa1}], 0x6}}, {{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000000d80)=[{&(0x7f00000009c0)=""/88, 0x58}, {&(0x7f0000000a40)=""/218, 0xda}, {&(0x7f0000000b40)=""/67, 0x43}, {&(0x7f0000000bc0)=""/218, 0xda}, {&(0x7f0000001340)=""/141, 0x8d}], 0x5, &(0x7f0000000e00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x120}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/253, 0xfd}], 0x1, &(0x7f0000001080)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc8}}], 0x3, 0x10000, &(0x7f0000001240)={0x0, 0x3938700}) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000240)) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0x116) write$P9_RSTATu(r2, &(0x7f0000000280)={0x70, 0x7d, 0x1, {{0x0, 0x51, 0x40, 0x1, {0x20, 0x4, 0x7}, 0x1000000, 0x5, 0x7, 0x0, 0x0, '', 0xa, 'map_files\x00', 0xa, 'map_files\x00', 0xa, 'map_files\x00'}, 0xa, 'map_files\x00', 0xee01, r3, r6}}, 0x70) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000340)) getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:38:53 executing program 0: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xf}, 0x1417a, 0x8, 0xffff, 0x7, 0xfffffffffffffff8, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) getpid() r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r4, 0x77, 0x0) fcntl$setstatus(r4, 0x4, 0x4000) open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) 06:38:53 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:53 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xb, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:38:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1176.416265] No source specified [ 1176.426482] No source specified [ 1176.428279] loop3: detected capacity change from 0 to 10 [ 1176.434002] syz-executor.6: attempt to access beyond end of device [ 1176.434002] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1176.436894] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:38:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1176.464774] syz-executor.6: attempt to access beyond end of device [ 1176.464774] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:38:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3e000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1176.483108] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1176.514380] No source specified [ 1176.515707] No source specified [ 1176.576615] No source specified [ 1176.577482] No source specified 06:38:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x43000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:38:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e73dca03c630b747ae66f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 06:38:53 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:38:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x800a0000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1176.722951] No source specified [ 1176.730069] No source specified 06:38:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x10, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1176.776470] loop3: detected capacity change from 0 to 10 06:38:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 1176.862658] syz-executor.6: attempt to access beyond end of device [ 1176.862658] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1176.887545] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1189.051352] No source specified [ 1189.053156] loop3: detected capacity change from 0 to 10 06:39:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 1) 06:39:06 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, 0x0, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:39:06 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:39:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f00000001c0)={0xd, 0x2c}) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/79, 0x4f}, {&(0x7f0000000100)=""/112, 0x70}], 0x2, 0x0, 0xfffff812) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) read$rfkill(r0, &(0x7f0000000200), 0x8) 06:39:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x48, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) [ 1189.064387] No source specified [ 1189.071575] syz-executor.6: attempt to access beyond end of device [ 1189.071575] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1189.078787] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:39:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1189.104303] syz-executor.6: attempt to access beyond end of device [ 1189.104303] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:39:06 executing program 0: r0 = epoll_create(0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000200)={'wlan1\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="46eb04bbb9b89e3f0718959755efc8e0037b2854b97d75adb0a36a9f0bef9dd30da99501a64c2ae600eef775f5f733be350a6b3f249b039548dd0bcea445ff812cb5651cb4bf69db9a913ce14144370c6e156eea04938f93046e96f5e0221dfd03773ec09105d26fa83e528f6a1e1789c8b4e070c5ed444b42b8268c284548e9597e46a5f6"]}) 06:39:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000100)) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:39:06 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1189.134873] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:39:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 2) 06:39:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x4c, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1189.229801] No source specified [ 1189.232217] No source specified 06:39:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x4, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000100)={{}, 0x1, 0x80000000, 0x2, {0xc}, 0x5, 0xbe24}) [ 1189.351205] syz-executor.6: attempt to access beyond end of device [ 1189.351205] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1189.352994] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1189.359876] loop3: detected capacity change from 0 to 10 06:39:20 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:39:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 3) 06:39:20 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x68, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x5, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:39:20 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, 0x0, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:39:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x242440, 0x104) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xeacb99f2a61875b1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4008000}, 0x20048894) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r2 = syz_open_dev$vcsu(&(0x7f0000000340), 0x4, 0x20000) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) openat(r0, &(0x7f0000000380)='./file0\x00', 0x248900, 0x84) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x100, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, '\x00', 0x3f}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xe}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7ff}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x648}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x8840}, 0x20000000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)={0x18, 0x5a, 0x1, 0x0, 0x0, "", [@nested={0x8, 0x0, 0x0, 0x1, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}]}, 0x18}], 0x1}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r4, r2, 0x77, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) [ 1202.804089] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1202.821597] No source specified [ 1202.821869] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:39:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x6, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1202.842660] No source specified [ 1202.852409] FAULT_INJECTION: forcing a failure. [ 1202.852409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1202.854005] CPU: 1 PID: 8392 Comm: syz-executor.7 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1202.855067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1202.856137] Call Trace: [ 1202.856484] [ 1202.856800] dump_stack_lvl+0xc1/0xf0 [ 1202.857363] should_fail_ex+0x4b4/0x5b0 [ 1202.857918] _copy_from_user+0x30/0xf0 [ 1202.858461] memdup_user+0x72/0xd0 [ 1202.858979] strndup_user+0x78/0xe0 [ 1202.859497] __x64_sys_mount+0x137/0x310 [ 1202.860075] ? __pfx___x64_sys_mount+0x10/0x10 [ 1202.860733] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1202.861482] do_syscall_64+0x3f/0x90 [ 1202.862028] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1202.862757] RIP: 0033:0x7efdfe334b19 [ 1202.863276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.863618] loop3: detected capacity change from 0 to 10 [ 1202.865732] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1202.865769] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1202.868572] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1202.869565] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1202.870556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1202.871526] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1202.872561] 06:39:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1202.880072] syz-executor.6: attempt to access beyond end of device [ 1202.880072] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1202.910599] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1202.911709] perf: interrupt took too long (2543 > 2500), lowering kernel.perf_event_max_sample_rate to 78000 [ 1202.961324] syz-executor.6: attempt to access beyond end of device [ 1202.961324] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:39:20 executing program 0: ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\b', @ANYRES16=r1, @ANYBLOB="b537000000000000000005", @ANYRES32, @ANYBLOB="080099"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1202.989266] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:39:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) preadv(r1, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/216, 0xd8}, {&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f00000002c0)=""/85, 0x55}, {&(0x7f0000001440)=""/109, 0xa2}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x5, 0x4, 0x5) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) [ 1203.002732] No source specified [ 1203.006169] No source specified 06:39:20 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x6c, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1203.186600] syz-executor.6: attempt to access beyond end of device [ 1203.186600] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1203.192223] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1203.209949] syz-executor.6: attempt to access beyond end of device [ 1203.209949] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1203.215175] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:39:35 executing program 0: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x0, 0xfffd, 0x0, 0x8}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)) ioctl$FIONCLEX(r0, 0x5450) write(r1, &(0x7f0000000000)="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", 0xfa) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'filter\x00', 0x0, 0x0, 0x0, [0x0, 0x91d3, 0x0, 0x7, 0x1f, 0x2]}, &(0x7f0000000180)=0x78) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000140)={0x5, 0x1}) setresuid(0x0, r2, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 06:39:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:39:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r1, r1, 0x77, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x101) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:39:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:35 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:39:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x7, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x74, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 4) [ 1217.711339] syz-executor.6: attempt to access beyond end of device [ 1217.711339] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1217.731777] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1217.758509] syz-executor.6: attempt to access beyond end of device [ 1217.758509] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1217.766740] No source specified [ 1217.768382] No source specified [ 1217.783765] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1217.788659] FAULT_INJECTION: forcing a failure. [ 1217.788659] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.790758] CPU: 0 PID: 8426 Comm: syz-executor.7 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1217.791897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1217.793057] Call Trace: [ 1217.793444] [ 1217.793788] dump_stack_lvl+0xc1/0xf0 [ 1217.794378] should_fail_ex+0x4b4/0x5b0 [ 1217.794976] ? getname_flags.part.0+0x50/0x4f0 [ 1217.795676] should_failslab+0x9/0x20 [ 1217.796278] kmem_cache_alloc+0x61/0x390 [ 1217.796910] getname_flags.part.0+0x50/0x4f0 [ 1217.797591] getname_flags+0x9e/0xf0 [ 1217.798194] user_path_at_empty+0x2f/0x70 [ 1217.798835] __x64_sys_mount+0x1ed/0x310 [ 1217.799452] ? __pfx___x64_sys_mount+0x10/0x10 [ 1217.800167] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1217.800951] do_syscall_64+0x3f/0x90 [ 1217.801539] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1217.802276] RIP: 0033:0x7efdfe334b19 [ 1217.802817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1217.805280] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1217.806343] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1217.807319] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1217.808383] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1217.809389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1217.810401] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1217.811451] [ 1217.813500] loop3: detected capacity change from 0 to 10 06:39:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x8, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000100)=@v2={0x5, 0x1, 0x5, 0xbc, 0x67, "b5bd93de04bc0cbddcc5b66ac80c1f724c24d4a7427cdf95446fd0f634d8ad5ddc39c074de7d5b392eb6ec5aef38e8091efdde4056e61c936562b4e3b9cb50d5593da5f80c8e05039ab158a7c075283fe8aa129be55f9c650cc87c893a1551927f17832a37c4b1"}, 0x70, 0x6) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) 06:39:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x7a, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) [ 1218.018781] syz-executor.6: attempt to access beyond end of device [ 1218.018781] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1218.048623] loop3: detected capacity change from 0 to 10 06:39:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x18, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1218.056884] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1218.099156] syz-executor.6: attempt to access beyond end of device [ 1218.099156] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:39:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) r3 = socket$inet6(0xa, 0x5, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000540)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000000780)='./file1\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x281a020, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{}, {@cache_loose}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@access_uid={'access', 0x3d, r4}}, {@aname={'aname', 0x3d, '@'}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<', r6}}]}}) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000080)={r8, 0x1, 0x6, @broadcast}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@allocspi={0x3bc, 0x16, 0x200, 0x70bd29, 0x25dfdbfd, {{{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in6=@remote, 0x4e22, 0x8, 0x4e20, 0x8, 0x2, 0x20, 0x20, 0x84, 0x0, r4}, {@in6=@loopback, 0x4d3, 0x6c}, @in6=@loopback, {0x7ff, 0x7fff, 0x8000, 0x4, 0x8001, 0xe0, 0xcb8}, {0x6, 0x3f, 0x10100000000000, 0x4}, {0x8001, 0x8, 0x2}, 0x70bd26, 0x3507, 0xa, 0x3, 0x0, 0x2}, 0x2, 0x5}, [@offload={0xc, 0x1c, {r8, 0x6}}, @user_kmaddress={0x2c, 0x13, {@in6=@loopback, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0xa}}, @algo_comp={0x11a, 0x3, {{'lzs\x00'}, 0x690, "8cc8d16c571b2d6538516b01e03e931be291ad47a0317aff96d5f3c6531c8afa325dc2cc2d98bb0adea510deed1478e7c43a3e5b215bd0192276b25312cfb562a1d14e526c1711c948520e0624c0f4465c3e44d22ce1d822eba70d300792c365f788970a7af95bf6dab56f419be0b71691ad5dc21424bb79f897c24df50715ae98fd038e4d8b10d5c3de33e683356590e34cf6394f5dc917058b2b171526c59613c412972ad30df478db9da284e7687349f6a3638e997d9b29c9293105fe44c56d7fd74503d3a214ce675d8bee15d8283012"}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x800}, @tfcpad={0x8, 0x16, 0x100}, @algo_aead={0x133, 0x12, {{'gcm_base(cbc(aes-ce),nhpoly1305-sse2)\x00'}, 0x738, 0x100, "ea08a15393a4998e19fecd1aa9b99964c4ba2032022af3ba82746cd52107d8a00e396753cf90eb4f9e42586ecb6238705594a0061e0dc7640636ee1a3e825a9053d09fcfbd65b083a2f41dca6edb7eb5b0c23e85a7e5e751b1041e9a00b1b420da7cd8be99622586bdce974b8f871b27037381b896b2fa9be34fd2e44143b4066e4e2588f57c4fd1257ab6093a7cd8c4755b0838c80437f156438f7472673b02ae32ae76ed50a4b38898aeb89ee51380580281f24e9d00de603a298562d2d7a817e04b5879c0ba146f4a4fb3bda441cbc083aae3234720e17c7b4b1522a79b98c629d688d8e04a"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in=@broadcast, 0x0, 0xa}}]}, 0x3bc}}, 0x0) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r9) setsockopt$packet_drop_memb(r9, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getsockname$unix(r9, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) [ 1218.125555] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:39:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 5) [ 1218.162210] No source specified [ 1218.179049] No source specified [ 1218.242765] syz_tun: entered promiscuous mode 06:39:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xa8, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1218.393199] syz-executor.6: attempt to access beyond end of device [ 1218.393199] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1218.415063] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1218.569017] syz_tun: left promiscuous mode [ 1218.578843] syz_tun: entered promiscuous mode [ 1218.581275] syz_tun: left promiscuous mode 06:39:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) getdents64(r1, &(0x7f0000000100)=""/151, 0x97) 06:39:35 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:39:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x65, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 6) 06:39:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xb4, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) [ 1218.652622] loop3: detected capacity change from 0 to 10 [ 1218.673060] FAULT_INJECTION: forcing a failure. [ 1218.673060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1218.673949] CPU: 1 PID: 8468 Comm: syz-executor.7 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1218.674522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1218.675076] Call Trace: [ 1218.675271] [ 1218.675438] dump_stack_lvl+0xc1/0xf0 [ 1218.675738] should_fail_ex+0x4b4/0x5b0 [ 1218.676027] strncpy_from_user+0x38/0x340 [ 1218.676328] getname_flags.part.0+0x95/0x4f0 [ 1218.676649] getname_flags+0x9e/0xf0 [ 1218.676933] user_path_at_empty+0x2f/0x70 [ 1218.677232] __x64_sys_mount+0x1ed/0x310 [ 1218.677529] ? __pfx___x64_sys_mount+0x10/0x10 [ 1218.677860] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1218.678225] do_syscall_64+0x3f/0x90 [ 1218.678503] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1218.678856] RIP: 0033:0x7efdfe334b19 [ 1218.679111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1218.680312] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1218.680818] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1218.681286] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1218.681767] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1218.682244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.682746] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1218.683267] [ 1218.703806] syz-executor.6: attempt to access beyond end of device [ 1218.703806] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1218.711777] No source specified [ 1218.721317] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1218.727005] No source specified [ 1218.743425] syz-executor.6: attempt to access beyond end of device [ 1218.743425] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1218.757337] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1233.382613] loop3: detected capacity change from 0 to 10 06:39:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f00000006c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:39:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:39:50 executing program 0: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file0\x00'}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {0x0, 0x0, 0xa00}], 0x0, &(0x7f0000000080)) 06:39:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0xbe, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:39:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 7) 06:39:50 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:39:50 executing program 1: readlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000001100)=""/4096, 0x1000) r0 = syz_open_procfs(0x0, &(0x7f0000002200)='net/nf_conntrack_expect\x00') readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000002240)=""/236, 0xec) getdents64(r0, &(0x7f0000000040)=""/49, 0x31) getdents64(r0, &(0x7f0000000100)=""/4088, 0xff8) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4001, 0x108) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x3) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000004240)) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000002100)="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") recvmmsg$unix(r1, &(0x7f0000003f40)=[{{&(0x7f0000002340), 0x6e, &(0x7f00000024c0), 0x0, &(0x7f00000036c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000002540)=@abs, 0x6e, &(0x7f00000037c0)=[{&(0x7f00000025c0)=""/137, 0x89}, {&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000003680)=""/23, 0x17}, {&(0x7f0000003e00)=""/152, 0x98}, {&(0x7f0000003780)=""/17, 0x11}], 0x5, &(0x7f0000003840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x110}}, {{&(0x7f0000003980), 0x6e, &(0x7f0000004300)=[{&(0x7f0000003a00)=""/247, 0xf7}, {&(0x7f0000004280)=""/84, 0x54}], 0x2, &(0x7f0000003b40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000003b80)=""/79, 0x4f}], 0x1, &(0x7f0000003c40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000003d00)=@abs, 0x6e, &(0x7f0000003dc0)=[{&(0x7f0000003d80)=""/17, 0x11}], 0x1, &(0x7f0000004340)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x3c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}], 0x5, 0x2142, 0x0) fgetxattr(r3, &(0x7f0000004080)=@known='trusted.overlay.metacopy\x00', &(0x7f00000040c0)=""/254, 0xfe) r4 = gettid() setpriority(0x0, r4, 0x88) perf_event_open(&(0x7f00000041c0)={0x0, 0x80, 0xd7, 0x17, 0x2, 0x2, 0x0, 0x401, 0x30000, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x7fff, 0x5}, 0x2004, 0x8, 0x0, 0x4, 0x1ff, 0x3d1e, 0x7, 0x0, 0x8000, 0x0, 0xa91}, r4, 0xd, r2, 0xa) 06:39:50 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xbe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1233.389401] No source specified [ 1233.390218] No source specified [ 1233.404308] FAULT_INJECTION: forcing a failure. [ 1233.404308] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.405925] CPU: 0 PID: 8478 Comm: syz-executor.7 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1233.407032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.408152] Call Trace: [ 1233.408542] [ 1233.408882] dump_stack_lvl+0xc1/0xf0 [ 1233.409473] should_fail_ex+0x4b4/0x5b0 [ 1233.410063] should_failslab+0x9/0x20 [ 1233.410622] __kmem_cache_alloc_node+0x66/0x310 [ 1233.411300] ? alloc_fs_context+0x58/0x9e0 [ 1233.411905] ? __print_lock_name+0x201/0x250 [ 1233.412619] kmalloc_trace+0x26/0xc0 [ 1233.413181] alloc_fs_context+0x58/0x9e0 [ 1233.413838] path_mount+0xa6d/0x1e50 [ 1233.414475] ? kasan_quarantine_put+0x81/0x1d0 [ 1233.415200] ? __pfx_path_mount+0x10/0x10 [ 1233.415869] ? putname+0x102/0x140 [ 1233.416463] ? kmem_cache_free+0x10d/0x4d0 [ 1233.417149] ? putname+0x102/0x140 [ 1233.417730] __x64_sys_mount+0x286/0x310 [ 1233.418381] ? __pfx___x64_sys_mount+0x10/0x10 [ 1233.419091] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1233.419922] do_syscall_64+0x3f/0x90 [ 1233.420537] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1233.421324] RIP: 0033:0x7efdfe334b19 [ 1233.421894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.424568] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1233.425690] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1233.426770] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1233.427819] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.428916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1233.429969] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1233.431088] [ 1233.454997] syz-executor.6: attempt to access beyond end of device [ 1233.454997] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 06:39:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1233.460751] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1233.479164] syz-executor.6: attempt to access beyond end of device [ 1233.479164] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1233.485575] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1233.499032] No source specified [ 1233.500918] No source specified 06:40:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0xfe, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:04 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) timerfd_settime(r0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/39, 0x27) 06:40:04 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:40:04 executing program 0: r0 = openat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='7,\x00'/17]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_procfs$userns(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) io_submit(0x0, 0x0, 0x0) r1 = syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r3, r3, 0x77, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000500)="08d0e52ba8123f61167472c5c5bdccb561fe8bd6aeba155c890e134c72e782010d9a8220a0fb0efd1e64fa16199bd98355dafc5176122b277a50a7d31d541ab968e3994c9830f9a44f5227afd57c1853bd9d351a57ea681f6e2338de2050d67ad894d64cc7d5154afbb7ea7a0182496d1eaf1b6475db4fb17d82100880034a0ad2fd5ccc2d7ccd8618dd97f111f1cedc5a5cbf8fbf9705146e0b75d4", 0x9c}], 0x1, 0xc) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/kernel/warn_count', 0x0, 0x10) close(r4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) r7 = eventfd2(0x0, 0x0) io_submit(0x0, 0x8, &(0x7f00000004c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x401, r0, &(0x7f00000000c0)="6d73add0c266733d00a2f01397855284eaf3454c3e8e3ee9829e26620306c44f081b38fd4cc9dd4c1f2f15b049e74769106337893ed8f4afb6a8191128691081e2f250e0b18289cdea9b071c6d3a6d60d1532ca5162d3e8f3fbb99f74db81223e0df6e8d5e95a322801f45fe9a9fc110fc28121779c4501bb764daf074c56a9156c8a043000e6b7850e1a883665f17ffc05d6b235ea647598909d7008f3ecfcf8addca1001", 0xa5, 0xfff, 0x0, 0x1, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x8000, r3, &(0x7f0000000040)="5c752e3dd2acee2841c921755f94a86006ba55eae39483c5e3672e233fc342da0051e529b78ad50e1eac265df90b78f2c160a4ca8178acae4ae1328c28de49", 0x3f, 0x3, 0x0, 0x3, r4}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x6, 0x1f, r1, &(0x7f00000001c0)="1880236b997e469a92cf402037f716dbe5ea17ff6ae3bc75a32cf4b630c841", 0x1f, 0x2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, &(0x7f0000000240)="b90191a503d7b6fa89052a8ab511959e847c6d2037bd943db7638341778c580c04d4b1d90fc9", 0x26, 0xf69, 0x0, 0x2, r5}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x8, r6, &(0x7f0000000300)="890cec4f3a4900dc2195df756f9cbc0717749eb53a5d431e6bf5bd03779097e295d4e4b4c15c97659702", 0x2a, 0x8, 0x0, 0x1, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x800, r0, &(0x7f0000000380)="f564158a4bb731fbe1876f1318ef1a1562b6", 0x12, 0x2, 0x0, 0x2, r2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x51, r2, &(0x7f0000000a80)="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", 0x1000, 0xc6d8, 0x0, 0x1, r7}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0xff00, r0, &(0x7f0000000440)="d4008ba5f40cf8b3a835b1d066f34dae94a6ed7076a76f10b133d3ae9f94f00e9eaaf9fc47adcdd1ba", 0x29, 0xd3da, 0x0, 0x5}]) 06:40:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:40:04 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:40:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 8) 06:40:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0xe3, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1247.639526] No source specified [ 1247.643094] tmpfs: Unknown parameter '7' [ 1247.647129] No source specified [ 1247.655045] syz-executor.6: attempt to access beyond end of device [ 1247.655045] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1247.659946] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1247.684812] syz-executor.6: attempt to access beyond end of device [ 1247.684812] loop6: rw=0, sector=64, nr_sectors = 2 limit=0 [ 1247.694182] tmpfs: Unknown parameter '7' [ 1247.698449] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:40:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:40:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0xf0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 9) 06:40:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80000, 0x110) 06:40:05 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x300, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1247.879004] loop6: detected capacity change from 0 to 1 06:40:05 executing program 0: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x1}, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2c, 0x18, 0x0, 0x101, 0x0, 0x0, {0x2}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}]}]}, 0x2c}}, 0x0) [ 1247.912718] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1247.924801] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1247.942149] No source specified [ 1247.959529] No source specified [ 1247.977394] FAULT_INJECTION: forcing a failure. [ 1247.977394] name failslab, interval 1, probability 0, space 0, times 0 [ 1247.978874] CPU: 0 PID: 8533 Comm: syz-executor.7 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1247.979915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1247.980985] Call Trace: [ 1247.981338] [ 1247.981651] dump_stack_lvl+0xc1/0xf0 [ 1247.982198] should_fail_ex+0x4b4/0x5b0 [ 1247.982768] should_failslab+0x9/0x20 [ 1247.983296] __kmem_cache_alloc_node+0x66/0x310 [ 1247.983931] ? legacy_init_fs_context+0x44/0xe0 [ 1247.984582] ? lockdep_init_map_type+0x21e/0x7e0 06:40:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0xfe, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) [ 1247.985254] kmalloc_trace+0x26/0xc0 [ 1247.985866] legacy_init_fs_context+0x44/0xe0 [ 1247.986454] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 1247.987113] alloc_fs_context+0x571/0x9e0 [ 1247.987672] path_mount+0xa6d/0x1e50 [ 1247.988185] ? kasan_quarantine_put+0x81/0x1d0 [ 1247.988802] ? __pfx_path_mount+0x10/0x10 [ 1247.989358] ? putname+0x102/0x140 [ 1247.989837] ? kmem_cache_free+0x10d/0x4d0 [ 1247.990396] ? putname+0x102/0x140 [ 1247.990896] __x64_sys_mount+0x286/0x310 [ 1247.991451] ? __pfx___x64_sys_mount+0x10/0x10 [ 1247.992059] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1247.992750] do_syscall_64+0x3f/0x90 [ 1247.993266] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1247.993926] RIP: 0033:0x7efdfe334b19 [ 1247.994400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1247.996574] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1247.997511] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1247.998385] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1247.999250] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.000110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1248.000982] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1248.001902] [ 1248.026520] loop3: detected capacity change from 0 to 10 06:40:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1248.173954] No source specified [ 1248.179099] No source specified 06:40:17 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x500, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x4, 0xfe, 0x8, 0x20, 0x0, 0x9, 0x800c, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x890, 0x6a2, 0x40, 0x3, 0x0, 0x6ea, 0x0, 0x0, 0x0, 0x0, 0x7}, r1, 0x9, r0, 0x8) pwrite64(r2, &(0x7f0000000040)="636eca4b05b9", 0x6, 0x0) fallocate(r2, 0x20, 0x0, 0xffff77ff000) io_destroy(0x0) r3 = syz_io_uring_complete(0x0) close(0xffffffffffffffff) r4 = open(&(0x7f00000002c0)='./file1\x00', 0x80001, 0xa9) sendfile(r3, r4, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000180)=""/149, &(0x7f0000000000)=0x95) openat(r3, &(0x7f0000000300)='./file1\x00', 0x0, 0x61) syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x0) 06:40:17 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r2, &(0x7f0000000440)=ANY=[], 0x24f) r4 = syz_io_uring_setup(0x7d8b, &(0x7f0000000600), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000680), 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x1) fcntl$dupfd(r3, 0x0, r0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', 0x0, &(0x7f0000000240), 0x2, 0x2) sendfile(r2, r1, 0x0, 0xfffffdef) 06:40:17 executing program 3: ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000440008000f801", 0x17}, {&(0x7f0000000340)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0xa00}], 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x80, 0x95, 0x7, 0x0, 0x4, 0x24828, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0), 0xc}, 0x1417a, 0x8, 0xffff, 0x7, 0xe40, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x3) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x1f, 0x3, 0x79, 0x6, 0x0, 0x100000000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0x8542, 0x0, 0xfff, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x4b47, &(0x7f0000000000)={0x0, 0x8001}) r4 = getpid() open_tree(r2, &(0x7f0000000180)='./file0\x00', 0x80100) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x2040, 0x0) perf_event_open(0xffffffffffffffff, r4, 0x1, r5, 0x19) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) tee(r6, r6, 0x77, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000400)) 06:40:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 10) 06:40:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x300, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:40:17 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000005880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{}, 0x2, @in6=@empty}}, 0xe8) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f0000000000)=""/39, 0x27) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6, 0x2, 0x2, 0xcd, 0x0, 0x101, 0x40001, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x4, 0xffffffffffffffe0}, 0x800, 0x0, 0xfffffff9, 0x1, 0x7f, 0x6, 0xfff, 0x0, 0x1, 0x0, 0xdae}, 0x0, 0x9, r3, 0x1) 06:40:17 executing program 1: ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000000180)={{}, "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"}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00', 0x0, [0x2, 0x3fe0, 0x0, 0x7, 0x6]}, &(0x7f0000000080)=0x54) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000011c0)={'filter\x00', 0x7, 0x4, 0x418, 0x110, 0x0, 0x110, 0x330, 0x330, 0x330, 0x4, &(0x7f0000001180), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x33}, @mac=@multicast, @multicast1, @multicast2, 0x2}}}, {{@arp={@remote, @rand_addr=0x64010101, 0xffffff00, 0xffffff00, 0xf, 0xd, {@empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}}, 0x2, 0x3f, 0x3ff, 0x1, 0x789d, 0x3ff, 'vlan0\x00', 'syzkaller1\x00', {0xff}, {}, 0x0, 0x202}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}, @mac=@broadcast, @loopback, @local, 0x0, 0x1}}}, {{@arp={@multicast1, @multicast2, 0xff000000, 0xffffffff, 0xc, 0x2, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@mac=@broadcast, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}}, 0x2, 0x1, 0x6, 0x72, 0x5, 0x4, 'batadv_slave_1\x00', 'veth1_to_bond\x00', {0xff}, {0xff}, 0x0, 0xb8}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r2) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) memfd_secret(0x80000) pidfd_getfd(r2, r0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r3) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$CDROMPLAYMSF(r3, 0x5303, &(0x7f0000000040)={0x5, 0x3, 0x2, 0x7f, 0x6, 0xbe}) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) [ 1259.885443] loop6: detected capacity change from 0 to 2 [ 1259.903464] No source specified [ 1259.903514] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1259.912423] No source specified [ 1259.929500] loop6: detected capacity change from 0 to 2 [ 1259.937798] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 06:40:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000000)=""/39, 0x27) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x45004210}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xb4, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xa1, 0x62}}}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x80, 0x0, 0x2, 0x0, {0x7, 0x0, 0x0, 0x7, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x0, 0xb307, 0x5}}, @NL80211_ATTR_BSS_BASIC_RATES={0x1b, 0x24, [{0x5, 0x1}, {0x3}, {0x6c}, {0x36, 0x1}, {0x4}, {0x24, 0x1}, {0x5}, {0x1e}, {0x48}, {0xb}, {0x48}, {0x12}, {0x10}, {0x6c}, {0x9}, {0x18, 0x1}, {0x48, 0x1}, {0x0, 0x1}, {0x18}, {0x824b5f1229ce0ba1, 0x1}, {0x73}, {0x16}, {0xb, 0x1}]}, @NL80211_ATTR_IE={0x53, 0x2a, [@dsss={0x3, 0x1, 0x95}, @preq={0x82, 0x2b, @ext={{0x1, 0x1, 0x1}, 0xff, 0x81, 0x2, @device_b, 0xf8b, @device_b, 0xffff4f87, 0x10000, 0x1, [{{0x0, 0x0, 0x1}, @broadcast}]}}, @rann={0x7e, 0x15, {{0x1, 0x2}, 0x5, 0x3, @device_a, 0x5f61259b, 0xae4, 0x80000001}}, @mesh_chsw={0x76, 0x6, {0x6, 0x3b, 0x12, 0x9}}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0xb4}}, 0x40) 06:40:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) 06:40:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x0, 0x480, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp6\x00') sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="3c040000f403000428bd7000fedbdf25010000000500000001000000000000000809000007000000020000006508895e05000000ff0700000000010001000100010000800200000000090000000000000500000000040000090000001747000006000000000000800180000001000100060000000200000001040000ff01000000000000060000000100000000100000180e0000be02000000feffff060000008c0000000200000007000000000100000000000007000000080000000900000001000000e50900007f0000001f00000000000000000000000400000004000000cec50000f8ffffff0400000000000000070000000001000000000080ee0f0000680c00000600000009000000ff7f00000300000003000000b9040000fcffffff4f090000ea00000005000000030000005a000000ffff482bb2d106cd83aa9a6daad98487ff7f0900000001000080116c00000900000004000000070000000700000007000000060000000200000093c8c04cfef20000ffffffff8100000004000000ec0000000900000005000000020000000200000000040000db0d00000900000012000000f8af00000000000006000000ffffff7f02000000810000009445000081000000b459a673feffffff040000000001000006000000faffffff0000000009000000000000000300000003000000090000008000000006000000ff0100000800000008000000ff030000ff0300000300000091000000f56600008f0000000200000001800000ffffffff05000000f85c0000000000000500000008000000050000000000000003000000060000000600000066b368cdff0000000000010040000000200000000700000025040000e2000000ff7f000007000000000000c000020000020000000000000086d2b472ff7f0000050000007b000000010000000500000008000000040000006be6000007000000000c00000700000007000000010000000800000005000000ffffffff090000000300000005000000090000009b520000ffffff7f160000000500000000000000000400007f000000000000000101000000000043460ea231ff7f000006000000fcfffffff7ffffff02000000030000000600000000070000070000000100000007000000070000003d10e953090000001c000000ffffff7fda000000070000006c00000005000000080000000800000001000000fcffffff01000000350000000600000007000000040000000700000006000000c8ffffff24000000090000000500000007000000ffffffff5c0500000500000081000000d900000080d9003b020000000104000009000000f7ffffff7f00000008000000000000000008000000000000ff0f0000018000000600000093000000020000000800000003000000b10f0000ffff0000d2c70000400000000010000007000000030000000200000009000000b6ffffff030000000100000009000000190000002528006e65742f7463703600002540006e65742f7463701bd7000000"], 0x43c}, 0x1, 0x0, 0x0, 0xa1}, 0x44090) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config', 0x0, 0x0) close(r1) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000001f0000005c00000008000300", @ANYRES32=r5, @ANYBLOB='\b\x00k\x007\x00\x00\x00'], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000b00)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x28, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x1000, 0x33}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8001}, 0x90) getdents64(r0, &(0x7f0000000000)=""/39, 0x27) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), r3) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000ac0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x24, r7, 0x2, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x27}, @val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x12c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x37}}}}, [@NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8}]}, @NL80211_ATTR_CQM={0x68, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xfffffffa}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x9}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}, @NL80211_ATTR_CQM_RSSI_THOLD={0x1c, 0x1, [0x100, 0x3, 0x0, 0x9, 0x5, 0x7]}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x600}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x4}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x7}, @NL80211_ATTR_CQM_RSSI_THOLD={0x18, 0x1, [0x4, 0x1, 0x6, 0x8, 0x9]}]}, @NL80211_ATTR_CQM={0x34, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xdc1}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x8000}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x38}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x4}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x34a, 0x800, 0x1]}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x53d}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x80000001}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x6}]}, @NL80211_ATTR_CQM={0x2c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x5c}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x234}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x37f}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x3}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x8000}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x4c8}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x5}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x891}, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r3) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14, r8, 0x4, 0x70bd28, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x10) 06:40:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) (fail_nth: 11) [ 1260.055098] ------------[ cut here ]------------ [ 1260.055738] wlan0: Failed check-sdata-in-driver check, flags: 0x0 [ 1260.056798] WARNING: CPU: 0 PID: 8568 at net/mac80211/main.c:288 ieee80211_link_info_change_notify+0x1f7/0x320 [ 1260.057484] Modules linked in: [ 1260.057740] CPU: 0 PID: 8568 Comm: syz-executor.1 Not tainted 6.5.0-rc1-next-20230712 #1 [ 1260.058281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1260.058859] RIP: 0010:ieee80211_link_info_change_notify+0x1f7/0x320 [ 1260.059298] Code: 88 06 00 00 4d 85 ed 0f 84 d6 00 00 00 e8 41 01 2e fd e8 3c 01 2e fd 8b 54 24 0c 4c 89 ee 48 c7 c7 20 6d e0 84 e8 b9 ca f8 fc <0f> 0b 48 b8 00 00 00 00 00 fc ff df 48 8b 14 24 48 c1 ea 03 0f b6 [ 1260.060563] RSP: 0018:ffff888044ff7480 EFLAGS: 00010286 [ 1260.060937] RAX: 0000000000000000 RBX: 0000000002000000 RCX: ffffc900037eb000 [ 1260.061420] RDX: 0000000000040000 RSI: ffffffff811740e2 RDI: 0000000000000001 [ 1260.061945] RBP: ffff888042bacb80 R08: 0000000000000001 R09: 0000000000000000 [ 1260.062463] R10: 0000000000000001 R11: 0000000000000001 R12: ffff888042bae038 [ 1260.063000] R13: ffff888042bac000 R14: ffff888042560e20 R15: 0000000000000000 [ 1260.063522] FS: 00007fe89d4ea700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1260.064108] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1260.064541] CR2: 0000001b2c023000 CR3: 0000000031406000 CR4: 0000000000350ef0 [ 1260.065069] Call Trace: [ 1260.065260] [ 1260.065433] ? __warn+0xe6/0x340 [ 1260.065712] ? ieee80211_link_info_change_notify+0x1f7/0x320 [ 1260.066136] ? report_bug+0x2fe/0x400 [ 1260.066438] ? handle_bug+0x3c/0x70 [ 1260.066738] ? exc_invalid_op+0x18/0x50 [ 1260.068005] ? asm_exc_invalid_op+0x1a/0x20 [ 1260.069710] ? __warn_printk+0x172/0x220 [ 1260.070512] ? ieee80211_link_info_change_notify+0x1f7/0x320 [ 1260.071772] ieee80211_set_mcast_rate+0x42/0x50 [ 1260.072104] ? __pfx_ieee80211_set_mcast_rate+0x10/0x10 [ 1260.072493] nl80211_set_mcast_rate+0x30a/0x680 [ 1260.072840] ? __pfx_nl80211_set_mcast_rate+0x10/0x10 [ 1260.073201] ? nl80211_pre_doit+0x111/0x980 [ 1260.073505] genl_family_rcv_msg_doit.isra.0+0x1ee/0x2e0 [ 1260.073898] ? __pfx_genl_family_rcv_msg_doit.isra.0+0x10/0x10 [ 1260.074301] ? cap_capable+0x1be/0x220 [ 1260.074590] ? ns_capable+0xe4/0x120 [ 1260.074878] genl_rcv_msg+0x503/0x7e0 [ 1260.075150] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1260.075454] ? perf_trace_lock+0xc1/0x480 [ 1260.075766] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 1260.076092] ? __pfx_nl80211_set_mcast_rate+0x10/0x10 [ 1260.076454] ? __pfx_nl80211_post_doit+0x10/0x10 [ 1260.076806] ? perf_trace_lock+0xc1/0x480 [ 1260.077106] netlink_rcv_skb+0x15d/0x450 [ 1260.077408] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1260.077747] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1260.078103] ? __pfx_down_read+0x10/0x10 [ 1260.078664] ? netlink_deliver_tap+0x1b2/0xcc0 [ 1260.079097] ? is_vmalloc_addr+0x86/0xa0 [ 1260.079412] genl_rcv+0x28/0x40 [ 1260.079666] netlink_unicast+0x552/0x800 [ 1260.080002] ? __pfx_netlink_unicast+0x10/0x10 [ 1260.080340] ? __virt_addr_valid+0x102/0x340 [ 1260.080714] netlink_sendmsg+0x923/0xe40 [ 1260.081025] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1260.081375] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1260.081736] sock_sendmsg+0x1b6/0x200 [ 1260.082029] ____sys_sendmsg+0x76a/0x9a0 [ 1260.082338] ? copy_msghdr_from_user+0xfc/0x150 [ 1260.082703] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1260.083059] ? __pfx_perf_trace_lock+0x10/0x10 [ 1260.083416] ___sys_sendmsg+0x110/0x1b0 [ 1260.083741] ? __pfx____sys_sendmsg+0x10/0x10 [ 1260.084084] ? __fget_files+0x245/0x480 [ 1260.084396] ? __pfx_lock_release+0x10/0x10 [ 1260.084738] ? __pfx___perf_event_task_sched_in+0x10/0x10 [ 1260.085122] ? lock_release+0x1e3/0x680 [ 1260.085412] ? xfd_validate_state+0x51/0x170 [ 1260.085749] ? __fget_files+0x267/0x480 [ 1260.086045] ? __fget_light+0xe5/0x270 [ 1260.086325] __sys_sendmsg+0xf7/0x1d0 [ 1260.086601] ? __pfx___sys_sendmsg+0x10/0x10 [ 1260.086957] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1260.087319] ? syscall_enter_from_user_mode+0x21/0x50 [ 1260.087710] do_syscall_64+0x3f/0x90 [ 1260.087984] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1260.088342] RIP: 0033:0x7fe89ff74b19 [ 1260.088608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1260.089805] RSP: 002b:00007fe89d4ea188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1260.090309] RAX: ffffffffffffffda RBX: 00007fe8a0087f60 RCX: 00007fe89ff74b19 [ 1260.090791] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000004 [ 1260.091267] RBP: 00007fe89ffcef6d R08: 0000000000000000 R09: 0000000000000000 [ 1260.091750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1260.092216] R13: 00007ffee726cd1f R14: 00007fe89d4ea300 R15: 0000000000022000 [ 1260.092746] [ 1260.092909] irq event stamp: 2691 [ 1260.093141] hardirqs last enabled at (2701): [] __up_console_sem+0x78/0x80 [ 1260.093734] hardirqs last disabled at (2712): [] __up_console_sem+0x5d/0x80 [ 1260.094308] softirqs last enabled at (2464): [] irq_exit_rcu+0x93/0xc0 [ 1260.094907] softirqs last disabled at (2459): [] irq_exit_rcu+0x93/0xc0 [ 1260.095490] ---[ end trace 0000000000000000 ]--- 06:40:17 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x600, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) openat(r0, &(0x7f0000000180)='./file0\x00', 0xac000, 0x40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(r2, &(0x7f0000000840)='2', 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x202000, 0x0) pwrite64(r3, &(0x7f0000000140)="c0", 0x1, 0x75d6) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x3d61abb5, 0x6, 0x0, 0x80000000000}) [ 1260.159401] No source specified [ 1260.171364] No source specified [ 1260.253280] FAULT_INJECTION: forcing a failure. [ 1260.253280] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.254116] CPU: 0 PID: 8584 Comm: syz-executor.7 Tainted: G W 6.5.0-rc1-next-20230712 #1 [ 1260.254744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1260.255274] Call Trace: [ 1260.255457] [ 1260.255620] dump_stack_lvl+0xc1/0xf0 [ 1260.255904] should_fail_ex+0x4b4/0x5b0 [ 1260.256191] should_failslab+0x9/0x20 [ 1260.256463] __kmem_cache_alloc_node+0x66/0x310 [ 1260.256798] ? v9fs_mount+0x9e/0xbd0 [ 1260.257067] ? __pfx_cred_has_capability.isra.0+0x10/0x10 [ 1260.257456] kmalloc_trace+0x26/0xc0 [ 1260.257721] v9fs_mount+0x9e/0xbd0 [ 1260.257982] ? __pfx_v9fs_mount+0x10/0x10 [ 1260.258278] ? cap_capable+0x1be/0x220 [ 1260.258575] ? __pfx_v9fs_mount+0x10/0x10 [ 1260.258872] legacy_get_tree+0x109/0x220 [ 1260.259160] vfs_get_tree+0x92/0x360 [ 1260.259433] path_mount+0x133c/0x1e50 [ 1260.259723] ? kasan_quarantine_put+0x81/0x1d0 [ 1260.260070] ? __pfx_path_mount+0x10/0x10 [ 1260.260376] ? putname+0x102/0x140 [ 1260.260650] ? kmem_cache_free+0x10d/0x4d0 [ 1260.260961] ? putname+0x102/0x140 [ 1260.261241] __x64_sys_mount+0x286/0x310 [ 1260.261578] ? __pfx___x64_sys_mount+0x10/0x10 [ 1260.261947] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1260.262359] do_syscall_64+0x3f/0x90 [ 1260.262664] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 1260.263043] RIP: 0033:0x7efdfe334b19 [ 1260.263323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1260.264628] RSP: 002b:00007efdfb8aa188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1260.265150] RAX: ffffffffffffffda RBX: 00007efdfe447f60 RCX: 00007efdfe334b19 [ 1260.265679] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1260.266163] RBP: 00007efdfb8aa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1260.266643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1260.267117] R13: 00007ffc39701eaf R14: 00007efdfb8aa300 R15: 0000000000022000 [ 1260.267620] 06:40:17 executing program 6: syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000004c0)='./file0\x00', 0x700, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@overriderock}]}) 06:40:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000300)={[{@max_dir_size_kb}]}) [ 1260.335935] loop6: detected capacity change from 0 to 3 [ 1260.349903] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1260.354064] No source specified [ 1260.365060] No source specified [ 1260.375601] loop6: detected capacity change from 0 to 3 [ 1260.376641] isofs_fill_super: bread failed, dev=loop6, iso_blknum=16, block=32 [ 1260.400744] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1260.461635] loop3: detected capacity change from 0 to 10 VM DIAGNOSIS: 06:40:17 Registers: info registers vcpu 0 RAX=0000000000000069 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff825190f5 RDI=ffffffff87f828a0 RBP=ffffffff87f82860 RSP=ffff888044ff6de8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000069 R11=0000000000000001 R12=0000000000000069 R13=ffffffff87f82860 R14=0000000000000010 R15=ffffffff825190e0 RIP=ffffffff8251914d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe89d4ea700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2c023000 CR3=0000000031406000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffff00000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=1ffff1100195fe37 RCX=0000000000000002 RDX=1ffffffff0ac16e8 RSI=0000000000000000 RDI=ffffffff8560b740 RBP=ffff88800ba0d1c0 RSP=ffff88800caff030 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000002 R13=ffffffff8560b740 R14=0000000000000000 R15=0000000000000002 RIP=ffffffff812d5ff3 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555db7400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd6e6b0d718 CR3=000000000e988000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000000000000000ff000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000