1000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:53:28 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2618.776260] loop6: detected capacity change from 0 to 256 [ 2618.779642] loop2: detected capacity change from 0 to 224 [ 2618.788796] loop5: detected capacity change from 0 to 256 [ 2618.797275] isofs_fill_super: get root inode failed [ 2618.805002] isofs_fill_super: get root inode failed [ 2618.814867] ISOFS: Unable to identify CD-ROM format. [ 2618.847917] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:53:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:53:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:53:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x130) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 08:53:28 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:28 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2618.947822] loop2: detected capacity change from 0 to 224 [ 2618.973559] isofs_fill_super: get root inode failed 08:53:28 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) [ 2619.010153] loop6: detected capacity change from 0 to 256 [ 2619.017576] loop5: detected capacity change from 0 to 256 08:53:28 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x130) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 2619.028071] isofs_fill_super: get root inode failed 08:53:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2619.046966] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2619.050967] ISOFS: Unable to identify CD-ROM format. 08:53:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2619.105614] loop2: detected capacity change from 0 to 256 [ 2619.117076] isofs_fill_super: get root inode failed 08:53:44 executing program 4: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r1 = clone3(0x0, 0x0) clone3(&(0x7f00000016c0)={0x200088000, &(0x7f0000001280), &(0x7f00000012c0), &(0x7f0000001340), {0x35}, &(0x7f0000001480)=""/214, 0xd6, &(0x7f0000001680)=""/44, &(0x7f00000015c0)=[r1, 0x0, 0x0, 0x0], 0x4}, 0x58) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x5cd5, &(0x7f0000000180)={0x0, 0xbfe1, 0x4, 0x1, 0x15c}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000300)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x483, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000480)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000d25000/0xb000)=nil, &(0x7f0000fd0000/0x1000)=nil, &(0x7f0000ccd000/0x3000)=nil, &(0x7f0000d13000/0x9000)=nil, &(0x7f0000d64000/0x3000)=nil, &(0x7f0000fe7000/0x4000)=nil, &(0x7f0000fb2000/0x3000)=nil, &(0x7f0000d55000/0x2000)=nil, &(0x7f0000d26000/0x1000)=nil, &(0x7f0000000400)="8da6a610ab91a837edfb0360c90b79026743aab9f443812dcf350486edf6c16a74a1021ed115bb337b81e279644a90f7f47094c5996fb4a12d29c9c6ed233c883c3445077f8cd0d7e47213b912d7ca372a3094270956209a6b5535b319c0a731b85a36fd65228d9804e32d", 0x6b, r2}, 0x68) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e24, @private=0xa010101}, 0x10) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000100)=""/45) mmap$perf(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x100000a, 0x4010, 0xffffffffffffffff, 0xcc) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x1000) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000340)={0x9, 0x8001, 0x80000001, 0x8000, 0x2}) 08:53:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:44 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x130) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 08:53:44 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:53:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, 0x0) 08:53:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:44 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x130) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) [ 2634.443301] loop2: detected capacity change from 0 to 256 [ 2634.447953] loop6: detected capacity change from 0 to 256 [ 2634.461807] isofs_fill_super: get root inode failed [ 2634.468234] loop5: detected capacity change from 0 to 256 [ 2634.479483] loop3: detected capacity change from 0 to 136 [ 2634.486485] isofs_fill_super: get root inode failed [ 2634.518988] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:53:44 executing program 0: r0 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:53:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:44 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:53:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x130) keyctl$link(0x8, r0, r1) keyctl$read(0xb, r0, &(0x7f0000000300)=""/4096, 0x1000) 08:53:44 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, 0x0) 08:53:44 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c", 0xef, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) mount$cgroup2(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x840820, &(0x7f0000000280)={[{@subsystem='cpuacct'}, {@memory_localevents}, {@memory_localevents}, {}, {@memory_localevents}, {@memory_recursiveprot}], [{@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, 'iso9660\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'iso9660\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffc524e5e3}}, {@dont_measure}, {@smackfshat={'smackfshat', 0x3d, '%))\n^:/~*M*\\%'}}, {@seclabel}]}) 08:53:44 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 08:53:44 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2634.683772] loop2: detected capacity change from 0 to 256 [ 2634.698810] loop6: detected capacity change from 0 to 256 [ 2634.705294] isofs_fill_super: get root inode failed [ 2634.710265] loop3: detected capacity change from 0 to 136 [ 2634.722591] isofs_fill_super: get root inode failed [ 2634.738664] loop5: detected capacity change from 0 to 256 [ 2634.754223] FAULT_INJECTION: forcing a failure. [ 2634.754223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2634.755408] CPU: 1 PID: 11160 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2634.756170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2634.756857] Call Trace: [ 2634.757093] [ 2634.757344] dump_stack_lvl+0x8f/0xb7 [ 2634.757698] should_fail_ex.cold+0x5/0xa [ 2634.758056] _copy_from_user+0x30/0x1f0 [ 2634.758411] copy_clone_args_from_user+0x147/0x790 [ 2634.758866] ? lock_is_held_type+0xdb/0x130 [ 2634.759275] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2634.759805] ? lock_release+0x3b6/0x750 [ 2634.760176] ? ksys_write+0x218/0x260 [ 2634.760531] ? __pfx_lock_release+0x10/0x10 [ 2634.760910] ? lock_is_held_type+0xdb/0x130 [ 2634.761300] __do_sys_clone3+0x91/0x370 [ 2634.761648] ? __pfx___do_sys_clone3+0x10/0x10 [ 2634.762042] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2634.762466] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2634.762904] ? fput+0x2f/0x1a0 [ 2634.763180] ? syscall_enter_from_user_mode+0x21/0x50 [ 2634.763660] ? syscall_enter_from_user_mode+0x21/0x50 [ 2634.764079] do_syscall_64+0x3f/0x90 [ 2634.764388] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2634.764836] RIP: 0033:0x7fbd5db53b19 [ 2634.765265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2634.766720] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2634.767352] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2634.767957] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2634.768529] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2634.769109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2634.769695] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2634.770304] [ 2634.822106] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:54:00 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 08:54:00 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 1) 08:54:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:54:00 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00), 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, 0x0) 08:54:00 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) [ 2650.428800] loop2: detected capacity change from 0 to 256 [ 2650.432329] FAULT_INJECTION: forcing a failure. [ 2650.432329] name failslab, interval 1, probability 0, space 0, times 1 [ 2650.433555] CPU: 0 PID: 11175 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2650.434268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2650.434937] loop6: detected capacity change from 0 to 256 [ 2650.434979] Call Trace: [ 2650.435652] [ 2650.435869] dump_stack_lvl+0x8f/0xb7 [ 2650.436209] should_fail_ex.cold+0x5/0xa [ 2650.436600] ? copy_process+0x3ac/0x7220 [ 2650.436965] should_failslab+0x9/0x20 [ 2650.437307] kmem_cache_alloc_node+0x5d/0x420 [ 2650.437715] copy_process+0x3ac/0x7220 [ 2650.438069] ? lock_is_held_type+0xdb/0x130 [ 2650.438438] ? find_held_lock+0x2c/0x110 [ 2650.438802] ? lock_release+0x3b6/0x750 [ 2650.439139] ? __might_fault+0xd9/0x180 [ 2650.439482] ? __pfx_copy_process+0x10/0x10 [ 2650.439884] ? _copy_from_user+0x169/0x1f0 [ 2650.440315] loop5: detected capacity change from 0 to 256 [ 2650.440321] kernel_clone+0xeb/0x950 [ 2650.441106] ? lock_is_held_type+0xdb/0x130 [ 2650.441488] ? __pfx_kernel_clone+0x10/0x10 [ 2650.441873] ? lock_is_held_type+0xdb/0x130 [ 2650.442227] __do_sys_clone3+0x1d9/0x370 [ 2650.442567] ? __pfx___do_sys_clone3+0x10/0x10 [ 2650.442993] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2650.443434] ? fput+0x2f/0x1a0 [ 2650.443725] ? syscall_enter_from_user_mode+0x21/0x50 [ 2650.444201] ? syscall_enter_from_user_mode+0x21/0x50 [ 2650.444644] do_syscall_64+0x3f/0x90 [ 2650.444980] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2650.445423] RIP: 0033:0x7fbd5db53b19 [ 2650.445740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2650.447137] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2650.447737] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2650.448372] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2650.448958] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2650.449511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2650.450073] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2650.450685] [ 2650.458424] loop3: detected capacity change from 0 to 136 [ 2650.471562] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2650.471698] isofs_fill_super: get root inode failed [ 2650.479835] isofs_fill_super: get root inode failed 08:54:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:54:00 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:54:00 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000", 0x87, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00), 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:00 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) 08:54:00 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) [ 2650.645109] loop3: detected capacity change from 0 to 136 [ 2650.649311] loop2: detected capacity change from 0 to 256 [ 2650.653140] loop5: detected capacity change from 0 to 256 [ 2650.660292] loop6: detected capacity change from 0 to 256 [ 2650.663782] isofs_fill_super: get root inode failed [ 2650.683526] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2650.690698] isofs_fill_super: get root inode failed 08:54:00 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2650.704279] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:54:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:54:16 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0000002, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:16 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 08:54:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00), 0x0, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:54:16 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 1) [ 2666.535622] loop2: detected capacity change from 0 to 256 [ 2666.542822] loop5: detected capacity change from 0 to 256 [ 2666.546104] loop6: detected capacity change from 0 to 256 [ 2666.554598] isofs_fill_super: get root inode failed [ 2666.557518] FAULT_INJECTION: forcing a failure. [ 2666.557518] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.558472] CPU: 0 PID: 11222 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2666.559189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.559888] Call Trace: [ 2666.560142] [ 2666.560369] dump_stack_lvl+0x8f/0xb7 [ 2666.560740] should_fail_ex.cold+0x5/0xa [ 2666.561142] should_failslab+0x9/0x20 [ 2666.561477] __kmem_cache_alloc_node+0x5b/0x400 [ 2666.561899] ? __do_sys_memfd_create+0xac/0x4e0 [ 2666.562368] ? __do_sys_memfd_create+0xac/0x4e0 [ 2666.562769] __kmalloc+0x46/0xc0 [ 2666.563071] __do_sys_memfd_create+0xac/0x4e0 [ 2666.563461] do_syscall_64+0x3f/0x90 [ 2666.563790] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2666.564291] RIP: 0033:0x7ff78264ab19 [ 2666.564619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.566193] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2666.566805] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2666.567364] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2666.567936] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2666.568534] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2666.569090] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2666.569700] [ 2666.573970] FAULT_INJECTION: forcing a failure. [ 2666.573970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2666.575172] CPU: 0 PID: 11219 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2666.575882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2666.576603] Call Trace: [ 2666.576833] [ 2666.577044] dump_stack_lvl+0x8f/0xb7 [ 2666.577422] should_fail_ex.cold+0x5/0xa [ 2666.577781] prepare_alloc_pages+0x178/0x500 [ 2666.578168] ? find_held_lock+0x2c/0x110 [ 2666.578547] __alloc_pages+0x149/0x500 [ 2666.578907] ? __pfx___alloc_pages+0x10/0x10 [ 2666.579339] ? lock_is_held_type+0xdb/0x130 [ 2666.579725] ? rcu_read_lock_sched_held+0x42/0x80 [ 2666.580151] ? trace_kmem_cache_alloc+0x2d/0xe0 [ 2666.580573] copy_process+0x440/0x7220 [ 2666.580890] ? lock_is_held_type+0xdb/0x130 [ 2666.581304] ? find_held_lock+0x2c/0x110 [ 2666.581713] ? lock_release+0x3b6/0x750 [ 2666.582072] ? __might_fault+0xd9/0x180 [ 2666.582439] ? __pfx_copy_process+0x10/0x10 [ 2666.582819] ? _copy_from_user+0x169/0x1f0 [ 2666.583212] kernel_clone+0xeb/0x950 [ 2666.583545] ? lock_is_held_type+0xdb/0x130 [ 2666.583922] ? __pfx_kernel_clone+0x10/0x10 [ 2666.584358] ? lock_is_held_type+0xdb/0x130 [ 2666.584803] __do_sys_clone3+0x1d9/0x370 [ 2666.585158] ? __pfx___do_sys_clone3+0x10/0x10 [ 2666.585551] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2666.585993] ? fput+0x2f/0x1a0 [ 2666.586289] ? syscall_enter_from_user_mode+0x21/0x50 [ 2666.586736] ? syscall_enter_from_user_mode+0x21/0x50 [ 2666.587198] do_syscall_64+0x3f/0x90 [ 2666.587322] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2666.587523] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2666.588556] RIP: 0033:0x7fbd5db53b19 [ 2666.588871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2666.590369] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2666.591019] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2666.591620] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2666.592236] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.592848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2666.593462] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2666.594088] [ 2666.615543] isofs_fill_super: get root inode failed 08:54:16 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0000004, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:54:16 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) 08:54:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)='ER', 0x2, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2666.770783] loop2: detected capacity change from 0 to 256 [ 2666.780970] loop5: detected capacity change from 0 to 256 [ 2666.786078] isofs_fill_super: get root inode failed [ 2666.807258] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:54:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 2) 08:54:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002102, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)='ER', 0x2, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) 08:54:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) 08:54:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2682.479106] loop6: detected capacity change from 0 to 256 [ 2682.481560] loop3: detected capacity change from 0 to 136 [ 2682.496015] isofs_fill_super: get root inode failed [ 2682.514549] loop5: detected capacity change from 0 to 256 [ 2682.515069] loop2: detected capacity change from 0 to 256 [ 2682.526203] FAULT_INJECTION: forcing a failure. [ 2682.526203] name failslab, interval 1, probability 0, space 0, times 0 [ 2682.527316] CPU: 0 PID: 11249 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2682.527984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2682.528724] Call Trace: [ 2682.528967] [ 2682.529196] dump_stack_lvl+0x8f/0xb7 [ 2682.529577] should_fail_ex.cold+0x5/0xa [ 2682.529929] ? prepare_creds+0x2f/0x6f0 [ 2682.530295] should_failslab+0x9/0x20 [ 2682.530655] kmem_cache_alloc+0x5a/0x410 [ 2682.531027] prepare_creds+0x2f/0x6f0 [ 2682.531372] copy_creds+0x7a/0xb20 [ 2682.531693] copy_process+0xcfe/0x7220 [ 2682.532027] ? lock_is_held_type+0xdb/0x130 [ 2682.532488] ? find_held_lock+0x2c/0x110 [ 2682.532855] ? lock_release+0x3b6/0x750 [ 2682.533221] ? __might_fault+0xd9/0x180 [ 2682.533649] ? __pfx_copy_process+0x10/0x10 [ 2682.534061] ? _copy_from_user+0x169/0x1f0 [ 2682.534433] kernel_clone+0xeb/0x950 [ 2682.534757] ? lock_is_held_type+0xdb/0x130 [ 2682.535149] ? __pfx_kernel_clone+0x10/0x10 [ 2682.535554] ? lock_is_held_type+0xdb/0x130 [ 2682.535964] __do_sys_clone3+0x1d9/0x370 [ 2682.536377] ? __pfx___do_sys_clone3+0x10/0x10 [ 2682.536784] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2682.537286] ? fput+0x2f/0x1a0 [ 2682.537608] ? syscall_enter_from_user_mode+0x21/0x50 [ 2682.538111] ? syscall_enter_from_user_mode+0x21/0x50 [ 2682.538572] do_syscall_64+0x3f/0x90 [ 2682.538916] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2682.539416] RIP: 0033:0x7fbd5db53b19 [ 2682.539717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.541307] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2682.541925] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2682.542557] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2682.543206] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.543778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2682.544424] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2682.545023] [ 2682.576793] isofs_fill_super: get root inode failed [ 2682.598270] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:54:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002103, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 08:54:32 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) 08:54:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2682.693999] loop6: detected capacity change from 0 to 256 08:54:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 3) [ 2682.726833] isofs_fill_super: get root inode failed 08:54:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)='ER', 0x2, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2682.796005] FAULT_INJECTION: forcing a failure. [ 2682.796005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2682.796953] CPU: 0 PID: 11269 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2682.797496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2682.798037] Call Trace: [ 2682.798216] [ 2682.798379] dump_stack_lvl+0x8f/0xb7 [ 2682.798652] should_fail_ex.cold+0x5/0xa [ 2682.798918] _copy_from_user+0x30/0x1f0 [ 2682.799183] __do_sys_memfd_create+0x103/0x4e0 [ 2682.799482] do_syscall_64+0x3f/0x90 [ 2682.799727] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2682.800063] RIP: 0033:0x7ff78264ab19 [ 2682.800430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2682.801916] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2682.802529] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2682.803113] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2682.803689] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2682.804342] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2682.804918] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2682.805503] 08:54:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002104, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2682.823270] loop2: detected capacity change from 0 to 256 [ 2682.831949] isofs_fill_super: get root inode failed [ 2682.868313] loop5: detected capacity change from 0 to 256 08:54:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) (fail_nth: 1) 08:54:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2682.921900] FAULT_INJECTION: forcing a failure. [ 2682.921900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2682.923022] CPU: 1 PID: 11279 Comm: syz-executor.0 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2682.923750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2682.924464] Call Trace: [ 2682.924688] [ 2682.924881] dump_stack_lvl+0x8f/0xb7 [ 2682.925235] should_fail_ex.cold+0x5/0xa [ 2682.925614] _copy_to_user+0x30/0x1c0 [ 2682.925975] simple_read_from_buffer+0xd0/0x170 [ 2682.926392] proc_fail_nth_read+0x19c/0x230 [ 2682.926788] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2682.927212] ? security_file_permission+0xb5/0xe0 [ 2682.927641] vfs_read+0x2e1/0x9f0 [ 2682.927948] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2682.928372] ? __pfx_vfs_read+0x10/0x10 [ 2682.928750] ? __fget_files+0x270/0x450 [ 2682.929115] ksys_read+0x12b/0x260 [ 2682.929442] ? __pfx_ksys_read+0x10/0x10 [ 2682.929831] ? syscall_enter_from_user_mode+0x21/0x50 [ 2682.930286] ? syscall_enter_from_user_mode+0x21/0x50 [ 2682.930727] do_syscall_64+0x3f/0x90 [ 2682.931070] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2682.931505] RIP: 0033:0x7fe6ba09e69c [ 2682.931814] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2682.933335] RSP: 002b:00007fe6b7661170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2682.933986] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fe6ba09e69c [ 2682.934561] RDX: 000000000000000f RSI: 00007fe6b76611e0 RDI: 0000000000000003 [ 2682.935152] RBP: 00007fe6b76611d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.935751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2682.936354] R13: 00007ffd751655ff R14: 00007fe6b7661300 R15: 0000000000022000 [ 2682.936969] [ 2682.943537] loop6: detected capacity change from 0 to 256 08:54:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 4) [ 2682.959661] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2682.964602] isofs_fill_super: get root inode failed 08:54:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2683.042089] FAULT_INJECTION: forcing a failure. [ 2683.042089] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.043108] CPU: 1 PID: 11286 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2683.043816] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2683.044556] Call Trace: [ 2683.044786] [ 2683.044989] dump_stack_lvl+0x8f/0xb7 [ 2683.045388] should_fail_ex.cold+0x5/0xa [ 2683.045766] should_failslab+0x9/0x20 [ 2683.046134] kmem_cache_alloc_lru+0x6b/0x760 [ 2683.046304] loop2: detected capacity change from 0 to 224 [ 2683.046515] ? shmem_alloc_inode+0x27/0x50 [ 2683.047277] ? lock_release+0x3b6/0x750 [ 2683.047648] ? alloc_fd+0x2d8/0x6e0 [ 2683.048008] shmem_alloc_inode+0x27/0x50 [ 2683.048404] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 2683.048827] alloc_inode+0x63/0x240 [ 2683.049182] new_inode+0x25/0x1f0 [ 2683.049501] shmem_get_inode+0x191/0xdb0 [ 2683.049875] __shmem_file_setup+0xb8/0x320 [ 2683.050271] __do_sys_memfd_create+0x1ca/0x4e0 [ 2683.050699] do_syscall_64+0x3f/0x90 [ 2683.051046] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2683.051508] RIP: 0033:0x7ff78264ab19 [ 2683.051836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2683.053332] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2683.053994] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2683.054605] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2683.055236] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2683.055897] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2683.056536] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2683.057148] [ 2683.065632] isofs_fill_super: root inode is not a directory. Corrupted media? 08:54:47 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 08:54:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:47 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 5) 08:54:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 08:54:47 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2697.518229] loop5: detected capacity change from 0 to 256 08:54:47 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:54:47 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002105, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:54:47 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2697.526843] FAULT_INJECTION: forcing a failure. [ 2697.526843] name failslab, interval 1, probability 0, space 0, times 0 [ 2697.527810] CPU: 0 PID: 11299 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2697.528362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.528932] Call Trace: [ 2697.529118] [ 2697.529285] dump_stack_lvl+0x8f/0xb7 [ 2697.529592] should_fail_ex.cold+0x5/0xa [ 2697.529894] should_failslab+0x9/0x20 [ 2697.530032] loop3: detected capacity change from 0 to 136 [ 2697.530166] __kmem_cache_alloc_node+0x5b/0x400 [ 2697.531215] ? security_prepare_creds+0x116/0x190 [ 2697.531568] ? security_prepare_creds+0x116/0x190 [ 2697.531913] __kmalloc+0x46/0xc0 [ 2697.532166] security_prepare_creds+0x116/0x190 [ 2697.532528] prepare_creds+0x509/0x6f0 [ 2697.532812] copy_creds+0x7a/0xb20 [ 2697.533085] copy_process+0xcfe/0x7220 [ 2697.533369] ? lock_is_held_type+0xdb/0x130 [ 2697.533692] ? find_held_lock+0x2c/0x110 [ 2697.533985] ? lock_release+0x3b6/0x750 [ 2697.534271] ? __might_fault+0xd9/0x180 [ 2697.534570] ? __pfx_copy_process+0x10/0x10 [ 2697.534889] ? _copy_from_user+0x169/0x1f0 [ 2697.535204] kernel_clone+0xeb/0x950 [ 2697.535477] ? lock_is_held_type+0xdb/0x130 [ 2697.535800] ? __pfx_kernel_clone+0x10/0x10 [ 2697.536125] ? lock_is_held_type+0xdb/0x130 [ 2697.536464] __do_sys_clone3+0x1d9/0x370 [ 2697.536764] ? __pfx___do_sys_clone3+0x10/0x10 [ 2697.537101] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2697.537478] ? fput+0x2f/0x1a0 [ 2697.537731] ? syscall_enter_from_user_mode+0x21/0x50 [ 2697.538113] ? syscall_enter_from_user_mode+0x21/0x50 [ 2697.538494] do_syscall_64+0x3f/0x90 [ 2697.538770] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2697.539156] RIP: 0033:0x7fbd5db53b19 [ 2697.539427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2697.540706] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2697.541238] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2697.541740] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2697.542242] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.542745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2697.543251] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2697.543768] [ 2697.548087] loop2: detected capacity change from 0 to 224 [ 2697.549712] loop6: detected capacity change from 0 to 256 [ 2697.560742] isofs_fill_super: get root inode failed [ 2697.582871] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2697.585206] isofs_fill_super: root inode is not a directory. Corrupted media? 08:54:47 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 6) 08:54:47 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 08:54:47 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2697.753618] FAULT_INJECTION: forcing a failure. [ 2697.753618] name failslab, interval 1, probability 0, space 0, times 0 [ 2697.754451] CPU: 0 PID: 11315 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2697.754988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2697.755543] Call Trace: [ 2697.755722] [ 2697.755883] dump_stack_lvl+0x8f/0xb7 [ 2697.756167] should_fail_ex.cold+0x5/0xa [ 2697.756475] ? security_inode_alloc+0x38/0x160 [ 2697.756809] should_failslab+0x9/0x20 [ 2697.757082] kmem_cache_alloc+0x5a/0x410 [ 2697.757376] security_inode_alloc+0x38/0x160 [ 2697.757690] inode_init_always+0xbb2/0xea0 [ 2697.757987] alloc_inode+0x84/0x240 [ 2697.758252] new_inode+0x25/0x1f0 [ 2697.758507] shmem_get_inode+0x191/0xdb0 [ 2697.758807] __shmem_file_setup+0xb8/0x320 [ 2697.759113] __do_sys_memfd_create+0x1ca/0x4e0 [ 2697.759439] do_syscall_64+0x3f/0x90 [ 2697.759705] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2697.760069] RIP: 0033:0x7ff78264ab19 [ 2697.760328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2697.761498] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2697.762004] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2697.762470] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2697.762947] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2697.763440] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2697.763932] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2697.764454] 08:55:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 7) 08:55:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 08:55:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000ed66001c0000000000001c00080000000008007809140b2a3a080200000100000101015252050181505824016d", 0xb4, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e00550058002000200020002000200020002000200020002000200043004400", 0x2d, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x2, 0x0, r0) 08:55:03 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002106, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2713.599592] FAULT_INJECTION: forcing a failure. [ 2713.599592] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.600769] CPU: 1 PID: 11322 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2713.601443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2713.602129] Call Trace: [ 2713.602366] [ 2713.602562] dump_stack_lvl+0x8f/0xb7 [ 2713.602951] should_fail_ex.cold+0x5/0xa [ 2713.603311] ? dup_fd+0x8d/0xcb0 [ 2713.603619] should_failslab+0x9/0x20 [ 2713.603978] kmem_cache_alloc+0x5a/0x410 [ 2713.604356] dup_fd+0x8d/0xcb0 [ 2713.604652] ? __pfx_audit_alloc+0x10/0x10 [ 2713.605026] ? security_task_alloc+0xea/0x260 [ 2713.605436] copy_process+0x1df1/0x7220 [ 2713.605788] ? lock_is_held_type+0xdb/0x130 [ 2713.606157] ? find_held_lock+0x2c/0x110 [ 2713.606527] ? __pfx_copy_process+0x10/0x10 [ 2713.606911] ? _copy_from_user+0x169/0x1f0 [ 2713.607297] kernel_clone+0xeb/0x950 [ 2713.607625] ? lock_is_held_type+0xdb/0x130 [ 2713.608001] ? __pfx_kernel_clone+0x10/0x10 [ 2713.608368] ? lock_is_held_type+0xdb/0x130 [ 2713.608780] __do_sys_clone3+0x1d9/0x370 [ 2713.609149] ? __pfx___do_sys_clone3+0x10/0x10 [ 2713.609546] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2713.610023] ? fput+0x2f/0x1a0 [ 2713.610331] ? syscall_enter_from_user_mode+0x21/0x50 [ 2713.610777] ? syscall_enter_from_user_mode+0x21/0x50 [ 2713.611250] do_syscall_64+0x3f/0x90 [ 2713.611609] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2713.612065] RIP: 0033:0x7fbd5db53b19 [ 2713.612413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2713.613909] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2713.614530] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2713.615133] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2713.615724] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2713.616324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2713.616940] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2713.617555] [ 2713.655044] loop5: detected capacity change from 0 to 256 [ 2713.657689] loop2: detected capacity change from 0 to 224 [ 2713.663628] loop6: detected capacity change from 0 to 256 [ 2713.669845] loop3: detected capacity change from 0 to 136 [ 2713.694113] isofs_fill_super: get root inode failed [ 2713.694894] isofs_fill_super: root inode is not a directory. Corrupted media? 08:55:03 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) [ 2713.705801] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 8) 08:55:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x3, 0x0, r0) 08:55:03 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002107, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2713.865254] FAULT_INJECTION: forcing a failure. [ 2713.865254] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.866308] CPU: 0 PID: 11343 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2713.867008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2713.867708] Call Trace: [ 2713.867940] [ 2713.868156] dump_stack_lvl+0x8f/0xb7 [ 2713.868532] should_fail_ex.cold+0x5/0xa [ 2713.868948] should_failslab+0x9/0x20 [ 2713.869291] kmem_cache_alloc_lru+0x6b/0x760 [ 2713.869702] ? __d_alloc+0x31/0x9c0 [ 2713.870077] __d_alloc+0x31/0x9c0 [ 2713.870423] ? get_random_u32+0x406/0x6e0 [ 2713.870807] d_alloc_pseudo+0x1d/0x70 [ 2713.871152] alloc_file_pseudo+0xd2/0x260 [ 2713.871544] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2713.871989] ? shmem_get_inode+0x6b2/0xdb0 [ 2713.872394] __shmem_file_setup+0x144/0x320 [ 2713.872817] __do_sys_memfd_create+0x1ca/0x4e0 [ 2713.873245] do_syscall_64+0x3f/0x90 [ 2713.873611] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2713.874096] RIP: 0033:0x7ff78264ab19 [ 2713.874447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2713.875977] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2713.876682] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2713.877306] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2713.877923] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2713.878543] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2713.879151] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2713.879798] [ 2713.892247] loop5: detected capacity change from 0 to 256 [ 2713.907223] loop6: detected capacity change from 0 to 256 [ 2713.927695] loop2: detected capacity change from 0 to 256 [ 2713.930954] isofs_fill_super: get root inode failed [ 2713.953594] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x4, 0x0, r0) [ 2713.987783] isofs_fill_super: get root inode failed 08:55:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:03 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002108, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:19 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 9) 08:55:19 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002109, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:19 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x5, 0x0, r0) 08:55:19 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:19 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:19 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 08:55:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:19 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2730.223219] loop3: detected capacity change from 0 to 136 [ 2730.242918] FAULT_INJECTION: forcing a failure. [ 2730.242918] name failslab, interval 1, probability 0, space 0, times 0 [ 2730.244031] CPU: 0 PID: 11379 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2730.244745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2730.245466] Call Trace: [ 2730.245707] [ 2730.245927] dump_stack_lvl+0x8f/0xb7 [ 2730.246293] should_fail_ex.cold+0x5/0xa [ 2730.246672] should_failslab+0x9/0x20 [ 2730.247036] __kmem_cache_alloc_node+0x5b/0x400 [ 2730.247483] ? alloc_fdtable+0x84/0x280 [ 2730.247849] ? do_raw_spin_lock+0x125/0x270 [ 2730.248280] kmalloc_trace+0x26/0x60 [ 2730.248637] alloc_fdtable+0x84/0x280 [ 2730.249032] dup_fd+0x726/0xcb0 [ 2730.249361] copy_process+0x1df1/0x7220 [ 2730.249738] ? lock_is_held_type+0xdb/0x130 [ 2730.249963] loop5: detected capacity change from 0 to 256 [ 2730.250128] ? find_held_lock+0x2c/0x110 [ 2730.251000] ? __pfx_copy_process+0x10/0x10 [ 2730.251107] loop2: detected capacity change from 0 to 256 [ 2730.251394] ? _copy_from_user+0x169/0x1f0 [ 2730.252252] kernel_clone+0xeb/0x950 [ 2730.252605] ? lock_is_held_type+0xdb/0x130 [ 2730.253051] ? __pfx_kernel_clone+0x10/0x10 [ 2730.253458] ? lock_is_held_type+0xdb/0x130 [ 2730.253863] __do_sys_clone3+0x1d9/0x370 [ 2730.254251] ? __pfx___do_sys_clone3+0x10/0x10 [ 2730.254662] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2730.255119] ? fput+0x2f/0x1a0 [ 2730.255414] ? syscall_enter_from_user_mode+0x21/0x50 [ 2730.255891] ? syscall_enter_from_user_mode+0x21/0x50 [ 2730.256355] do_syscall_64+0x3f/0x90 [ 2730.256793] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2730.257328] RIP: 0033:0x7fbd5db53b19 [ 2730.257661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2730.259111] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2730.259813] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2730.260406] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2730.260996] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2730.261573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2730.262143] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2730.262737] [ 2730.270168] loop6: detected capacity change from 0 to 256 [ 2730.271539] isofs_fill_super: get root inode failed [ 2730.297771] isofs_fill_super: get root inode failed [ 2730.303111] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:19 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x66, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:19 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000210a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:35 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000210c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:35 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 10) 08:55:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x6, 0x0, r0) 08:55:35 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020", 0x44, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:35 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) [ 2746.229934] loop6: detected capacity change from 0 to 256 [ 2746.236015] FAULT_INJECTION: forcing a failure. [ 2746.236015] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.237001] CPU: 0 PID: 11407 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2746.237715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2746.238392] Call Trace: [ 2746.238623] [ 2746.238824] dump_stack_lvl+0x8f/0xb7 [ 2746.239205] should_fail_ex.cold+0x5/0xa [ 2746.239557] ? __alloc_file+0x21/0x240 [ 2746.239887] should_failslab+0x9/0x20 [ 2746.240211] kmem_cache_alloc+0x5a/0x410 [ 2746.240536] ? d_instantiate+0x79/0xa0 [ 2746.240861] __alloc_file+0x21/0x240 [ 2746.241200] alloc_empty_file+0x71/0x170 [ 2746.241569] alloc_file+0x59/0x800 [ 2746.241882] alloc_file_pseudo+0x16e/0x260 [ 2746.242244] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2746.242671] ? shmem_get_inode+0x6b2/0xdb0 [ 2746.243047] __shmem_file_setup+0x144/0x320 [ 2746.243426] __do_sys_memfd_create+0x1ca/0x4e0 [ 2746.243842] do_syscall_64+0x3f/0x90 [ 2746.244150] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2746.244549] RIP: 0033:0x7ff78264ab19 [ 2746.244849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2746.246322] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2746.246997] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2746.247572] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2746.248118] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2746.248671] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2746.249199] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2746.249796] [ 2746.252272] loop2: detected capacity change from 0 to 256 [ 2746.259071] loop5: detected capacity change from 0 to 256 [ 2746.269784] isofs_fill_super: get root inode failed [ 2746.271957] isofs_fill_super: get root inode failed [ 2746.303187] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x7, 0x0, r0) 08:55:35 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:35 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000210d, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:36 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:36 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 11) 08:55:36 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2746.482783] loop2: detected capacity change from 0 to 256 [ 2746.485766] loop6: detected capacity change from 0 to 256 [ 2746.489214] isofs_fill_super: get root inode failed 08:55:36 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) [ 2746.503497] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2746.509208] isofs_fill_super: get root inode failed [ 2746.510000] loop3: detected capacity change from 0 to 136 08:55:36 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2746.527827] loop5: detected capacity change from 0 to 256 08:55:36 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002110, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x9, 0x0, r0) [ 2746.587965] FAULT_INJECTION: forcing a failure. [ 2746.587965] name failslab, interval 1, probability 0, space 0, times 0 [ 2746.588983] CPU: 0 PID: 11431 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2746.589683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2746.590447] Call Trace: [ 2746.590711] [ 2746.590950] dump_stack_lvl+0x8f/0xb7 [ 2746.591314] should_fail_ex.cold+0x5/0xa [ 2746.591677] ? __should_failslab+0x9e/0x110 [ 2746.592067] ? kvmalloc_node+0xaa/0x200 [ 2746.592422] should_failslab+0x9/0x20 [ 2746.592808] __kmem_cache_alloc_node+0x5b/0x400 [ 2746.593262] ? kvmalloc_node+0xaa/0x200 [ 2746.593628] ? kvmalloc_node+0xaa/0x200 [ 2746.593983] __kmalloc_node+0x45/0xb0 [ 2746.594351] kvmalloc_node+0xaa/0x200 [ 2746.594709] alloc_fdtable+0xd3/0x280 [ 2746.595071] dup_fd+0x726/0xcb0 [ 2746.595442] copy_process+0x1df1/0x7220 [ 2746.595792] ? lock_is_held_type+0xdb/0x130 [ 2746.596197] ? find_held_lock+0x2c/0x110 [ 2746.596588] ? __pfx_copy_process+0x10/0x10 [ 2746.596993] ? _copy_from_user+0x169/0x1f0 [ 2746.597369] kernel_clone+0xeb/0x950 [ 2746.597691] ? lock_is_held_type+0xdb/0x130 [ 2746.598069] ? __pfx_kernel_clone+0x10/0x10 [ 2746.598451] ? lock_is_held_type+0xdb/0x130 [ 2746.598835] __do_sys_clone3+0x1d9/0x370 [ 2746.599194] ? __pfx___do_sys_clone3+0x10/0x10 [ 2746.599617] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2746.600055] ? fput+0x2f/0x1a0 [ 2746.600337] ? syscall_enter_from_user_mode+0x21/0x50 [ 2746.600813] ? syscall_enter_from_user_mode+0x21/0x50 [ 2746.601335] do_syscall_64+0x3f/0x90 [ 2746.601683] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2746.602114] RIP: 0033:0x7fbd5db53b19 [ 2746.602440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2746.603881] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2746.604480] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2746.605047] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2746.605669] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2746.606273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2746.606848] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2746.607479] 08:55:36 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2746.609861] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:52 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 08:55:52 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x292, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:52 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 12) 08:55:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xa, 0x0, r0) 08:55:52 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002111, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2762.547856] FAULT_INJECTION: forcing a failure. [ 2762.547856] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.549029] CPU: 0 PID: 11454 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2762.549813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2762.550307] loop5: detected capacity change from 0 to 256 [ 2762.550514] Call Trace: [ 2762.550524] [ 2762.550534] dump_stack_lvl+0x8f/0xb7 [ 2762.551830] should_fail_ex.cold+0x5/0xa [ 2762.552232] ? security_file_alloc+0x38/0x170 [ 2762.552646] should_failslab+0x9/0x20 [ 2762.553007] kmem_cache_alloc+0x5a/0x410 [ 2762.553411] security_file_alloc+0x38/0x170 [ 2762.553816] __alloc_file+0xb6/0x240 [ 2762.554214] alloc_empty_file+0x71/0x170 [ 2762.554590] alloc_file+0x59/0x800 [ 2762.554934] alloc_file_pseudo+0x16e/0x260 [ 2762.555354] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 2762.555788] ? shmem_get_inode+0x6b2/0xdb0 [ 2762.556235] __shmem_file_setup+0x144/0x320 [ 2762.556636] loop6: detected capacity change from 0 to 256 [ 2762.556650] __do_sys_memfd_create+0x1ca/0x4e0 [ 2762.557640] do_syscall_64+0x3f/0x90 [ 2762.558000] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2762.558490] RIP: 0033:0x7ff78264ab19 [ 2762.558830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2762.560384] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2762.561051] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264ab19 [ 2762.561697] RDX: 0000000000011000 RSI: 0000000000000000 RDI: 00007ff7826a40fb [ 2762.562340] RBP: 0000000000000001 R08: 0000000000008800 R09: ffffffffffffffff [ 2762.562959] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 2762.563061] loop2: detected capacity change from 0 to 256 [ 2762.563567] R13: 0000000020000100 R14: 0000000000011000 R15: 0000000020012200 [ 2762.563608] [ 2762.573246] isofs_fill_super: get root inode failed [ 2762.580810] isofs_fill_super: get root inode failed [ 2762.601190] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:55:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xb, 0x0, r0) 08:55:52 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:55:52 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002114, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:55:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:55:52 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 13) 08:55:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {0x0, 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2762.732514] loop6: detected capacity change from 0 to 256 08:55:52 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000", 0x4f, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2762.759946] loop3: detected capacity change from 0 to 136 08:55:52 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) [ 2762.798647] isofs_fill_super: get root inode failed 08:55:52 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 14) [ 2762.837984] loop2: detected capacity change from 0 to 256 [ 2762.839949] FAULT_INJECTION: forcing a failure. [ 2762.839949] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.841099] CPU: 1 PID: 11477 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2762.841829] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2762.842505] Call Trace: [ 2762.842752] [ 2762.842955] dump_stack_lvl+0x8f/0xb7 [ 2762.843374] should_fail_ex.cold+0x5/0xa [ 2762.843757] ? kvmalloc_node+0xaa/0x200 [ 2762.844115] should_failslab+0x9/0x20 [ 2762.844454] __kmem_cache_alloc_node+0x5b/0x400 [ 2762.844877] ? kvmalloc_node+0xaa/0x200 [ 2762.845235] ? kvmalloc_node+0xaa/0x200 [ 2762.845658] __kmalloc_node+0x45/0xb0 [ 2762.846009] kvmalloc_node+0xaa/0x200 [ 2762.846357] alloc_fdtable+0x13f/0x280 [ 2762.846748] dup_fd+0x726/0xcb0 [ 2762.847077] copy_process+0x1df1/0x7220 [ 2762.847452] ? lock_is_held_type+0xdb/0x130 [ 2762.847855] ? find_held_lock+0x2c/0x110 [ 2762.848253] ? __pfx_copy_process+0x10/0x10 [ 2762.848693] ? _copy_from_user+0x169/0x1f0 [ 2762.849115] kernel_clone+0xeb/0x950 [ 2762.849517] ? lock_is_held_type+0xdb/0x130 [ 2762.849899] ? __pfx_kernel_clone+0x10/0x10 [ 2762.850312] ? lock_is_held_type+0xdb/0x130 [ 2762.850731] __do_sys_clone3+0x1d9/0x370 [ 2762.851127] ? __pfx___do_sys_clone3+0x10/0x10 [ 2762.851535] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2762.852056] ? fput+0x2f/0x1a0 [ 2762.852362] ? syscall_enter_from_user_mode+0x21/0x50 [ 2762.852842] ? syscall_enter_from_user_mode+0x21/0x50 [ 2762.853346] do_syscall_64+0x3f/0x90 [ 2762.853724] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2762.854182] RIP: 0033:0x7fbd5db53b19 [ 2762.854517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2762.856034] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2762.856669] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2762.857257] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2762.857900] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.858492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.859095] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2762.859723] 08:55:52 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002115, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2762.872882] isofs_fill_super: get root inode failed [ 2762.875831] loop5: detected capacity change from 0 to 256 [ 2762.906096] FAULT_INJECTION: forcing a failure. [ 2762.906096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2762.907700] CPU: 0 PID: 11482 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2762.908387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2762.909064] Call Trace: [ 2762.909292] [ 2762.909512] dump_stack_lvl+0x8f/0xb7 [ 2762.909861] should_fail_ex.cold+0x5/0xa [ 2762.910202] prepare_alloc_pages+0x178/0x500 [ 2762.910566] ? lock_is_held_type+0xdb/0x130 [ 2762.910975] __alloc_pages+0x149/0x500 [ 2762.911341] ? lock_release+0x3b6/0x750 [ 2762.911718] ? __pfx___alloc_pages+0x10/0x10 [ 2762.912121] ? __pfx_lock_release+0x10/0x10 [ 2762.912528] vma_alloc_folio+0xe2/0x480 [ 2762.912937] shmem_alloc_folio+0x108/0x1d0 [ 2762.913355] ? __pfx_shmem_alloc_folio+0x10/0x10 [ 2762.913808] ? percpu_counter_add_batch+0xb8/0x180 [ 2762.914242] ? __vm_enough_memory+0x188/0x390 [ 2762.914650] shmem_get_folio_gfp.constprop.0+0x6ed/0x1670 [ 2762.915152] ? current_time+0x79/0x2c0 [ 2762.915494] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 2762.916010] ? mark_held_locks+0x9e/0xe0 [ 2762.916364] shmem_write_begin+0x148/0x360 [ 2762.916749] ? __pfx_shmem_write_begin+0x10/0x10 [ 2762.917190] generic_perform_write+0x25a/0x580 [ 2762.917609] ? __pfx_generic_perform_write+0x10/0x10 [ 2762.918085] ? __pfx_file_update_time+0x10/0x10 [ 2762.918517] ? generic_write_checks+0x2c0/0x400 [ 2762.918671] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2762.918913] __generic_file_write_iter+0x308/0x4b0 [ 2762.920000] generic_file_write_iter+0xe7/0x350 [ 2762.920424] vfs_write+0xa4f/0xe40 [ 2762.920749] ? __pfx_vfs_write+0x10/0x10 [ 2762.921137] __x64_sys_pwrite64+0x1ff/0x260 [ 2762.921547] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2762.921959] ? syscall_enter_from_user_mode+0x21/0x50 [ 2762.922395] ? syscall_enter_from_user_mode+0x21/0x50 [ 2762.922846] do_syscall_64+0x3f/0x90 [ 2762.923187] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2762.923638] RIP: 0033:0x7ff7825fdab7 [ 2762.923959] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2762.925445] RSP: 002b:00007ff77fbbff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2762.926068] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fdab7 [ 2762.926670] RDX: 000000000000005a RSI: 0000000020010600 RDI: 0000000000000004 [ 2762.927247] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 2762.927820] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000004 [ 2762.928399] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 2762.929036] [ 2762.986861] loop3: detected capacity change from 0 to 136 [ 2762.995313] isofs_fill_super: bread failed, dev=loop3, iso_blknum=34, block=68 08:56:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 15) 08:56:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xc, 0x0, r0) 08:56:08 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000211d, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:08 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x480, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:08 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:08 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 08:56:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2778.906072] loop3: detected capacity change from 0 to 136 [ 2778.906962] loop6: detected capacity change from 0 to 256 [ 2778.918090] loop2: detected capacity change from 0 to 256 [ 2778.920236] loop5: detected capacity change from 0 to 256 [ 2778.922160] isofs_fill_super: get root inode failed [ 2778.944216] isofs_fill_super: get root inode failed [ 2778.971577] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:56:08 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:08 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xd, 0x0, r0) 08:56:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 16) 08:56:08 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000212c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:08 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2779.128807] loop6: detected capacity change from 0 to 256 [ 2779.145294] loop3: detected capacity change from 0 to 136 [ 2779.154545] isofs_fill_super: get root inode failed [ 2779.169846] loop2: detected capacity change from 0 to 256 [ 2779.184486] isofs_fill_super: get root inode failed [ 2779.202894] loop5: detected capacity change from 0 to 256 [ 2779.244826] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:56:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf00000000", 0x55, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:24 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 08:56:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100), 0x0, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:24 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002138, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:24 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xe, 0x0, r0) [ 2795.132688] FAULT_INJECTION: forcing a failure. [ 2795.132688] name failslab, interval 1, probability 0, space 0, times 0 [ 2795.133646] CPU: 1 PID: 11530 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2795.134293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.135002] Call Trace: [ 2795.135220] [ 2795.135418] dump_stack_lvl+0x8f/0xb7 [ 2795.135743] should_fail_ex.cold+0x5/0xa [ 2795.136065] ? copy_fs_struct+0x49/0x350 [ 2795.136390] should_failslab+0x9/0x20 [ 2795.136705] kmem_cache_alloc+0x5a/0x410 [ 2795.137042] copy_fs_struct+0x49/0x350 [ 2795.137377] copy_process+0x3422/0x7220 [ 2795.137709] ? lock_is_held_type+0xdb/0x130 [ 2795.138070] ? find_held_lock+0x2c/0x110 [ 2795.138418] ? __pfx_copy_process+0x10/0x10 [ 2795.138779] ? _copy_from_user+0x169/0x1f0 [ 2795.139145] kernel_clone+0xeb/0x950 [ 2795.139459] ? lock_is_held_type+0xdb/0x130 [ 2795.139811] ? __pfx_kernel_clone+0x10/0x10 [ 2795.140161] ? lock_is_held_type+0xdb/0x130 [ 2795.140522] __do_sys_clone3+0x1d9/0x370 [ 2795.140843] ? __pfx___do_sys_clone3+0x10/0x10 [ 2795.141224] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2795.141415] loop2: detected capacity change from 0 to 256 [ 2795.141677] ? fput+0x2f/0x1a0 [ 2795.142474] ? syscall_enter_from_user_mode+0x21/0x50 [ 2795.142901] ? syscall_enter_from_user_mode+0x21/0x50 [ 2795.143326] do_syscall_64+0x3f/0x90 [ 2795.143637] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2795.144061] RIP: 0033:0x7fbd5db53b19 [ 2795.144364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2795.145723] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2795.146262] loop5: detected capacity change from 0 to 256 [ 2795.146334] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2795.146351] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2795.146364] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2795.148502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2795.149036] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2795.149620] [ 2795.153949] isofs_fill_super: get root inode failed 08:56:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 17) [ 2795.189920] FAULT_INJECTION: forcing a failure. [ 2795.189920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2795.191042] CPU: 1 PID: 11543 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2795.191696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2795.192334] Call Trace: [ 2795.192559] [ 2795.192813] dump_stack_lvl+0x8f/0xb7 [ 2795.193217] should_fail_ex.cold+0x5/0xa [ 2795.193681] copy_page_from_iter_atomic+0x26e/0x12f0 [ 2795.194126] ? mark_held_locks+0x9e/0xe0 [ 2795.194448] ? __pfx_copy_page_from_iter_atomic+0x10/0x10 [ 2795.194930] ? shmem_write_begin+0x15f/0x360 [ 2795.195386] ? __pfx_shmem_write_begin+0x10/0x10 [ 2795.195712] loop6: detected capacity change from 0 to 256 [ 2795.195869] generic_perform_write+0x2cf/0x580 [ 2795.196798] ? __pfx_generic_perform_write+0x10/0x10 [ 2795.196920] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2795.197230] ? __pfx_file_update_time+0x10/0x10 [ 2795.198289] ? generic_write_checks+0x2c0/0x400 [ 2795.198726] __generic_file_write_iter+0x308/0x4b0 [ 2795.199145] generic_file_write_iter+0xe7/0x350 [ 2795.199556] vfs_write+0xa4f/0xe40 [ 2795.199906] ? __pfx_vfs_write+0x10/0x10 [ 2795.200327] __x64_sys_pwrite64+0x1ff/0x260 [ 2795.200738] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 2795.201167] ? syscall_enter_from_user_mode+0x21/0x50 [ 2795.201632] ? syscall_enter_from_user_mode+0x21/0x50 [ 2795.202125] do_syscall_64+0x3f/0x90 [ 2795.202466] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2795.202934] RIP: 0033:0x7ff7825fdab7 [ 2795.203260] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 2795.204783] RSP: 002b:00007ff77fbbff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2795.205416] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fdab7 [ 2795.206057] RDX: 000000000000005a RSI: 0000000020010600 RDI: 0000000000000004 [ 2795.206659] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 2795.207293] R10: 0000000000008800 R11: 0000000000000293 R12: 0000000000000004 [ 2795.207918] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 2795.208536] [ 2795.222448] isofs_fill_super: get root inode failed [ 2795.236970] loop3: detected capacity change from 0 to 136 08:56:24 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0xf, 0x0, r0) 08:56:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:24 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000213a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:24 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2795.346660] loop2: detected capacity change from 0 to 256 [ 2795.355651] isofs_fill_super: get root inode failed 08:56:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:24 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) [ 2795.414101] loop5: detected capacity change from 0 to 256 [ 2795.435806] loop6: detected capacity change from 0 to 256 [ 2795.451722] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2795.451816] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2795.454966] isofs_fill_super: get root inode failed [ 2811.027040] loop2: detected capacity change from 0 to 256 08:56:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 18) 08:56:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x10, 0x0, r0) 08:56:40 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 08:56:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:40 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000213e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:40 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2811.050817] FAULT_INJECTION: forcing a failure. [ 2811.050817] name failslab, interval 1, probability 0, space 0, times 0 [ 2811.051884] CPU: 0 PID: 11576 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2811.052557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.053256] Call Trace: [ 2811.053508] [ 2811.053721] dump_stack_lvl+0x8f/0xb7 [ 2811.054087] should_fail_ex.cold+0x5/0xa [ 2811.054442] ? getname_flags.part.0+0x50/0x4f0 [ 2811.054848] should_failslab+0x9/0x20 [ 2811.055177] kmem_cache_alloc+0x5a/0x410 [ 2811.055563] getname_flags.part.0+0x50/0x4f0 [ 2811.055991] ? vfs_write+0x51b/0xe40 [ 2811.056337] getname+0x92/0xe0 [ 2811.056648] do_sys_openat2+0xf9/0x4c0 [ 2811.056991] ? __pfx_do_sys_openat2+0x10/0x10 [ 2811.057401] __x64_sys_openat+0x143/0x200 [ 2811.057760] ? __pfx___x64_sys_openat+0x10/0x10 [ 2811.058213] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.058699] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.059149] do_syscall_64+0x3f/0x90 [ 2811.059484] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2811.059927] RIP: 0033:0x7ff7825fda04 [ 2811.060255] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2811.060981] FAULT_INJECTION: forcing a failure. [ 2811.060981] name failslab, interval 1, probability 0, space 0, times 0 [ 2811.061765] RSP: 002b:00007ff77fbbfed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2811.061792] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fda04 [ 2811.061806] RDX: 0000000000000002 RSI: 00007ff77fbc0000 RDI: 00000000ffffff9c [ 2811.064575] RBP: 00007ff77fbc0000 R08: 0000000000000000 R09: ffffffffffffffff [ 2811.065164] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2811.065803] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2811.066447] [ 2811.066654] CPU: 1 PID: 11578 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2811.067398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.068068] Call Trace: [ 2811.068303] [ 2811.068506] dump_stack_lvl+0x8f/0xb7 [ 2811.068834] should_fail_ex.cold+0x5/0xa [ 2811.069213] ? copy_process+0x1f5b/0x7220 [ 2811.069558] should_failslab+0x9/0x20 [ 2811.069881] kmem_cache_alloc+0x5a/0x410 [ 2811.070283] ? _raw_spin_unlock+0x28/0x50 [ 2811.070628] copy_process+0x1f5b/0x7220 [ 2811.070952] ? lock_is_held_type+0xdb/0x130 [ 2811.071324] ? find_held_lock+0x2c/0x110 [ 2811.071699] ? __pfx_copy_process+0x10/0x10 [ 2811.072080] ? _copy_from_user+0x169/0x1f0 [ 2811.072533] kernel_clone+0xeb/0x950 [ 2811.072858] ? lock_is_held_type+0xdb/0x130 [ 2811.073238] ? __pfx_kernel_clone+0x10/0x10 [ 2811.073623] ? lock_is_held_type+0xdb/0x130 [ 2811.074041] __do_sys_clone3+0x1d9/0x370 [ 2811.074374] ? __pfx___do_sys_clone3+0x10/0x10 [ 2811.074755] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2811.075171] ? fput+0x2f/0x1a0 [ 2811.075445] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.075871] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.076301] do_syscall_64+0x3f/0x90 [ 2811.076619] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2811.077078] RIP: 0033:0x7fbd5db53b19 [ 2811.077388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2811.078942] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2811.079583] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2811.080165] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2811.080747] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2811.081303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2811.081883] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2811.081922] [ 2811.089225] loop6: detected capacity change from 0 to 256 [ 2811.096837] isofs_fill_super: get root inode failed [ 2811.104540] isofs_fill_super: get root inode failed [ 2811.117525] loop5: detected capacity change from 0 to 256 08:56:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x11, 0x0, r0) 08:56:40 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002141, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2811.156116] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:56:40 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1800, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:40 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 08:56:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 19) [ 2811.241864] loop6: detected capacity change from 0 to 256 08:56:40 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf", 0x58, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2811.266059] isofs_fill_super: get root inode failed [ 2811.287746] loop2: detected capacity change from 0 to 256 [ 2811.305434] isofs_fill_super: get root inode failed [ 2811.321857] FAULT_INJECTION: forcing a failure. [ 2811.321857] name failslab, interval 1, probability 0, space 0, times 0 [ 2811.322905] CPU: 1 PID: 11598 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2811.323551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2811.324204] Call Trace: [ 2811.324414] [ 2811.324603] dump_stack_lvl+0x8f/0xb7 [ 2811.324934] should_fail_ex.cold+0x5/0xa [ 2811.325282] ? copy_fs_struct+0x49/0x350 [ 2811.325630] should_failslab+0x9/0x20 [ 2811.325955] kmem_cache_alloc+0x5a/0x410 [ 2811.326320] copy_fs_struct+0x49/0x350 [ 2811.326660] copy_process+0x3422/0x7220 [ 2811.326991] ? lock_is_held_type+0xdb/0x130 [ 2811.327347] ? find_held_lock+0x2c/0x110 [ 2811.327695] ? __pfx_copy_process+0x10/0x10 [ 2811.328075] ? _copy_from_user+0x169/0x1f0 [ 2811.328439] kernel_clone+0xeb/0x950 [ 2811.328756] ? lock_is_held_type+0xdb/0x130 [ 2811.329140] ? __pfx_kernel_clone+0x10/0x10 [ 2811.329542] ? lock_is_held_type+0xdb/0x130 [ 2811.329939] __do_sys_clone3+0x1d9/0x370 [ 2811.330338] ? __pfx___do_sys_clone3+0x10/0x10 [ 2811.330568] loop3: detected capacity change from 0 to 136 [ 2811.330701] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2811.331581] ? fput+0x2f/0x1a0 [ 2811.331867] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.332284] ? syscall_enter_from_user_mode+0x21/0x50 [ 2811.332730] do_syscall_64+0x3f/0x90 [ 2811.333057] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2811.333476] RIP: 0033:0x7fbd5db53b19 [ 2811.333774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2811.335193] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2811.335789] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2811.336345] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2811.336894] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2811.337465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2811.338027] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2811.338593] [ 2811.347800] loop5: detected capacity change from 0 to 256 [ 2811.391101] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:56:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:56 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 20) 08:56:56 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002148, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:56 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed000000000000", 0x87, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x12, 0x0, r0) 08:56:56 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) [ 2826.954213] loop6: detected capacity change from 0 to 256 [ 2826.970120] FAULT_INJECTION: forcing a failure. [ 2826.970120] name failslab, interval 1, probability 0, space 0, times 0 [ 2826.971297] CPU: 0 PID: 11613 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2826.972029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2826.972744] Call Trace: [ 2826.972974] [ 2826.973173] dump_stack_lvl+0x8f/0xb7 [ 2826.973560] should_fail_ex.cold+0x5/0xa [ 2826.973965] ? copy_process+0x20da/0x7220 [ 2826.974356] should_failslab+0x9/0x20 [ 2826.974697] kmem_cache_alloc+0x5a/0x410 [ 2826.975086] ? _raw_spin_unlock_irq+0x23/0x50 [ 2826.975519] copy_process+0x20da/0x7220 [ 2826.975914] ? lock_is_held_type+0xdb/0x130 [ 2826.976291] ? find_held_lock+0x2c/0x110 [ 2826.976712] ? __pfx_copy_process+0x10/0x10 [ 2826.977094] ? _copy_from_user+0x169/0x1f0 [ 2826.977528] kernel_clone+0xeb/0x950 [ 2826.977865] ? lock_is_held_type+0xdb/0x130 [ 2826.978271] ? __pfx_kernel_clone+0x10/0x10 [ 2826.978677] ? lock_is_held_type+0xdb/0x130 [ 2826.979068] __do_sys_clone3+0x1d9/0x370 [ 2826.979422] ? __pfx___do_sys_clone3+0x10/0x10 [ 2826.979904] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2826.980357] ? fput+0x2f/0x1a0 [ 2826.980665] ? syscall_enter_from_user_mode+0x21/0x50 [ 2826.981112] ? syscall_enter_from_user_mode+0x21/0x50 [ 2826.981566] do_syscall_64+0x3f/0x90 [ 2826.981893] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2826.982397] RIP: 0033:0x7fbd5db53b19 [ 2826.982759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2826.984239] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2826.984826] loop5: detected capacity change from 0 to 256 [ 2826.984914] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2826.984934] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2826.986613] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2826.987215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2826.987856] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2826.988505] [ 2827.003656] loop2: detected capacity change from 0 to 256 [ 2827.006969] isofs_fill_super: get root inode failed [ 2827.010825] FAULT_INJECTION: forcing a failure. [ 2827.010825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2827.012095] CPU: 0 PID: 11620 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2827.012908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2827.013625] Call Trace: [ 2827.013855] [ 2827.014079] dump_stack_lvl+0x8f/0xb7 [ 2827.014569] should_fail_ex.cold+0x5/0xa [ 2827.014948] strncpy_from_user+0x38/0x500 [ 2827.015386] getname_flags.part.0+0x95/0x4f0 [ 2827.015786] ? vfs_write+0x51b/0xe40 [ 2827.016130] getname+0x92/0xe0 [ 2827.016450] do_sys_openat2+0xf9/0x4c0 [ 2827.016834] ? __pfx_do_sys_openat2+0x10/0x10 [ 2827.017243] __x64_sys_openat+0x143/0x200 [ 2827.017629] ? __pfx___x64_sys_openat+0x10/0x10 [ 2827.018063] ? syscall_enter_from_user_mode+0x21/0x50 [ 2827.018531] ? syscall_enter_from_user_mode+0x21/0x50 [ 2827.018999] do_syscall_64+0x3f/0x90 [ 2827.019349] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2827.019838] RIP: 0033:0x7ff7825fda04 [ 2827.020175] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2827.021705] RSP: 002b:00007ff77fbbfed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2827.022352] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fda04 [ 2827.022969] RDX: 0000000000000002 RSI: 00007ff77fbc0000 RDI: 00000000ffffff9c [ 2827.023565] RBP: 00007ff77fbc0000 R08: 0000000000000000 R09: ffffffffffffffff [ 2827.024146] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2827.024721] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2827.025312] [ 2827.031517] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2827.039773] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2827.043434] isofs_fill_super: get root inode failed 08:56:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x13, 0x0, r0) 08:56:56 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:56 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:56:56 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000214a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:56:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:56:56 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 21) 08:56:56 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) 08:56:56 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2827.179313] loop2: detected capacity change from 0 to 256 [ 2827.201402] isofs_fill_super: get root inode failed [ 2827.220707] loop6: detected capacity change from 0 to 256 08:56:56 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2827.235568] isofs_fill_super: get root inode failed [ 2827.251267] FAULT_INJECTION: forcing a failure. [ 2827.251267] name failslab, interval 1, probability 0, space 0, times 0 [ 2827.251524] loop5: detected capacity change from 0 to 256 [ 2827.252263] CPU: 1 PID: 11638 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2827.253268] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2827.253941] Call Trace: [ 2827.254164] [ 2827.254376] dump_stack_lvl+0x8f/0xb7 [ 2827.254728] should_fail_ex.cold+0x5/0xa [ 2827.255086] ? __alloc_file+0x21/0x240 [ 2827.255413] should_failslab+0x9/0x20 [ 2827.255738] kmem_cache_alloc+0x5a/0x410 [ 2827.256080] __alloc_file+0x21/0x240 [ 2827.256397] alloc_empty_file+0x71/0x170 [ 2827.256751] path_openat+0xd4/0x29b0 [ 2827.257099] ? __pfx_path_openat+0x10/0x10 [ 2827.257468] ? __pfx_perf_trace_lock+0x10/0x10 [ 2827.257875] do_filp_open+0x1ba/0x410 [ 2827.258213] ? __pfx_do_filp_open+0x10/0x10 [ 2827.258577] ? find_held_lock+0x2c/0x110 [ 2827.258917] ? lock_release+0x3b6/0x750 [ 2827.259254] ? do_raw_spin_lock+0x125/0x270 [ 2827.259634] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2827.260044] ? _raw_spin_unlock+0x28/0x50 [ 2827.260402] ? alloc_fd+0x2d8/0x6e0 [ 2827.260737] do_sys_openat2+0x171/0x4c0 [ 2827.261080] ? __pfx_do_sys_openat2+0x10/0x10 [ 2827.261485] __x64_sys_openat+0x143/0x200 [ 2827.261829] ? __pfx___x64_sys_openat+0x10/0x10 [ 2827.262240] ? syscall_enter_from_user_mode+0x21/0x50 [ 2827.262682] ? syscall_enter_from_user_mode+0x21/0x50 [ 2827.263127] do_syscall_64+0x3f/0x90 [ 2827.263455] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2827.263899] RIP: 0033:0x7ff7825fda04 [ 2827.264213] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2827.265620] RSP: 002b:00007ff77fbbfed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2827.266243] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fda04 [ 2827.266829] RDX: 0000000000000002 RSI: 00007ff77fbc0000 RDI: 00000000ffffff9c [ 2827.267402] RBP: 00007ff77fbc0000 R08: 0000000000000000 R09: ffffffffffffffff [ 2827.267964] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2827.268525] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2827.269127] [ 2827.289820] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:57:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x14, 0x0, r0) 08:57:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 22) [ 2841.603863] loop6: detected capacity change from 0 to 256 08:57:11 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5a00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:11 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:11 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000214c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:11 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) 08:57:11 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf25", 0x59, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2841.627959] loop5: detected capacity change from 0 to 256 [ 2841.629293] loop2: detected capacity change from 0 to 256 [ 2841.632544] FAULT_INJECTION: forcing a failure. [ 2841.632544] name failslab, interval 1, probability 0, space 0, times 0 [ 2841.633529] CPU: 0 PID: 11651 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2841.634256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2841.634951] Call Trace: [ 2841.635198] [ 2841.635419] dump_stack_lvl+0x8f/0xb7 [ 2841.635775] should_fail_ex.cold+0x5/0xa [ 2841.636167] ? create_new_namespaces+0x30/0xb30 [ 2841.636582] should_failslab+0x9/0x20 [ 2841.636922] kmem_cache_alloc+0x5a/0x410 [ 2841.637254] ? cap_capable+0x1da/0x240 [ 2841.637583] create_new_namespaces+0x30/0xb30 [ 2841.637968] copy_namespaces+0x3b7/0x4a0 [ 2841.638314] copy_process+0x29e3/0x7220 [ 2841.638685] ? lock_is_held_type+0xdb/0x130 [ 2841.639052] ? find_held_lock+0x2c/0x110 [ 2841.639395] ? __pfx_copy_process+0x10/0x10 [ 2841.639790] ? _copy_from_user+0x169/0x1f0 [ 2841.640171] kernel_clone+0xeb/0x950 [ 2841.640497] ? lock_is_held_type+0xdb/0x130 [ 2841.640893] ? __pfx_kernel_clone+0x10/0x10 [ 2841.641303] ? lock_is_held_type+0xdb/0x130 [ 2841.641684] __do_sys_clone3+0x1d9/0x370 [ 2841.642033] ? __pfx___do_sys_clone3+0x10/0x10 [ 2841.642454] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2841.642896] ? fput+0x2f/0x1a0 [ 2841.643214] ? syscall_enter_from_user_mode+0x21/0x50 [ 2841.643660] ? syscall_enter_from_user_mode+0x21/0x50 [ 2841.644136] do_syscall_64+0x3f/0x90 [ 2841.644521] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2841.644972] RIP: 0033:0x7fbd5db53b19 [ 2841.645296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2841.646833] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2841.647442] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2841.648025] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2841.648601] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2841.649215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2841.649818] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2841.650482] [ 2841.651095] loop3: detected capacity change from 0 to 136 [ 2841.652467] isofs_fill_super: get root inode failed [ 2841.665639] isofs_fill_super: get root inode failed [ 2841.697497] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:57:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x15, 0x0, r0) 08:57:11 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:11 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 08:57:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 23) 08:57:11 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000215e, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:11 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e780914", 0x5a, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2841.826435] loop6: detected capacity change from 0 to 256 [ 2841.850580] isofs_fill_super: get root inode failed [ 2841.857450] FAULT_INJECTION: forcing a failure. [ 2841.857450] name failslab, interval 1, probability 0, space 0, times 0 [ 2841.858525] CPU: 0 PID: 11678 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2841.859202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2841.859870] Call Trace: [ 2841.860091] [ 2841.860282] dump_stack_lvl+0x8f/0xb7 [ 2841.860624] should_fail_ex.cold+0x5/0xa [ 2841.860978] ? security_file_alloc+0x38/0x170 [ 2841.861360] should_failslab+0x9/0x20 [ 2841.861701] kmem_cache_alloc+0x5a/0x410 [ 2841.862070] security_file_alloc+0x38/0x170 [ 2841.862491] __alloc_file+0xb6/0x240 [ 2841.862834] alloc_empty_file+0x71/0x170 [ 2841.863195] path_openat+0xd4/0x29b0 [ 2841.863537] ? __pfx_path_openat+0x10/0x10 [ 2841.863909] ? __pfx_perf_trace_lock+0x10/0x10 [ 2841.864313] do_filp_open+0x1ba/0x410 [ 2841.864648] ? __pfx_do_filp_open+0x10/0x10 [ 2841.865010] ? find_held_lock+0x2c/0x110 [ 2841.865353] ? lock_release+0x3b6/0x750 [ 2841.865715] ? do_raw_spin_lock+0x125/0x270 [ 2841.866077] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2841.866500] ? _raw_spin_unlock+0x28/0x50 [ 2841.866847] ? alloc_fd+0x2d8/0x6e0 [ 2841.867160] do_sys_openat2+0x171/0x4c0 [ 2841.867485] ? __pfx_do_sys_openat2+0x10/0x10 [ 2841.867864] ? xfd_validate_state+0x5d/0x180 [ 2841.868233] __x64_sys_openat+0x143/0x200 [ 2841.868573] ? __pfx___x64_sys_openat+0x10/0x10 [ 2841.868950] ? syscall_enter_from_user_mode+0x21/0x50 [ 2841.869367] ? syscall_enter_from_user_mode+0x21/0x50 [ 2841.869800] do_syscall_64+0x3f/0x90 [ 2841.870124] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2841.870581] RIP: 0033:0x7ff7825fda04 [ 2841.870885] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2841.872304] RSP: 002b:00007ff77fbbfed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2841.872916] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff7825fda04 [ 2841.873476] RDX: 0000000000000002 RSI: 00007ff77fbc0000 RDI: 00000000ffffff9c [ 2841.874053] RBP: 00007ff77fbc0000 R08: 0000000000000000 R09: ffffffffffffffff [ 2841.874659] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2841.875219] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2841.875821] [ 2841.885656] loop2: detected capacity change from 0 to 256 [ 2841.919627] isofs_fill_super: get root inode failed 08:57:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 24) 08:57:26 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x18, 0x0, r0) [ 2856.694671] loop6: detected capacity change from 0 to 256 [ 2856.697789] loop5: detected capacity change from 0 to 256 [ 2856.701239] loop3: detected capacity change from 0 to 136 08:57:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:26 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:26 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002160, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:26 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 2856.715620] FAULT_INJECTION: forcing a failure. [ 2856.715620] name failslab, interval 1, probability 0, space 0, times 0 [ 2856.717310] CPU: 0 PID: 11694 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2856.718338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2856.719364] Call Trace: [ 2856.719694] [ 2856.720008] dump_stack_lvl+0x8f/0xb7 [ 2856.720533] should_fail_ex.cold+0x5/0xa [ 2856.721089] should_failslab+0x9/0x20 [ 2856.721587] __kmem_cache_alloc_node+0x5b/0x400 [ 2856.722202] ? copy_net_ns+0xdd/0x760 [ 2856.722727] ? copy_net_ns+0xdd/0x760 [ 2856.723239] __kmalloc+0x46/0xc0 [ 2856.723709] copy_net_ns+0xdd/0x760 [ 2856.724202] ? copy_cgroup_ns+0xa7/0x6f0 [ 2856.724726] create_new_namespaces+0x3f6/0xb30 [ 2856.725372] copy_namespaces+0x3b7/0x4a0 [ 2856.725937] copy_process+0x29e3/0x7220 [ 2856.726455] ? lock_is_held_type+0xdb/0x130 [ 2856.727057] ? find_held_lock+0x2c/0x110 [ 2856.727607] ? __pfx_copy_process+0x10/0x10 [ 2856.728179] ? _copy_from_user+0x169/0x1f0 [ 2856.728741] kernel_clone+0xeb/0x950 [ 2856.729250] ? lock_is_held_type+0xdb/0x130 [ 2856.729826] ? __pfx_kernel_clone+0x10/0x10 [ 2856.730396] ? lock_is_held_type+0xdb/0x130 [ 2856.730987] __do_sys_clone3+0x1d9/0x370 [ 2856.731512] ? __pfx___do_sys_clone3+0x10/0x10 [ 2856.732110] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2856.732681] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2856.732762] ? fput+0x2f/0x1a0 [ 2856.733748] ? syscall_enter_from_user_mode+0x21/0x50 [ 2856.734441] ? syscall_enter_from_user_mode+0x21/0x50 [ 2856.735132] do_syscall_64+0x3f/0x90 [ 2856.735628] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2856.736298] RIP: 0033:0x7fbd5db53b19 [ 2856.736785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2856.739060] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2856.739757] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2856.739983] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2856.741457] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2856.742329] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2856.743214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2856.744080] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2856.744990] [ 2856.775781] loop2: detected capacity change from 0 to 256 08:57:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x19, 0x0, r0) [ 2856.800927] isofs_fill_super: get root inode failed 08:57:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 25) 08:57:26 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002168, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:26 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2856.886511] FAULT_INJECTION: forcing a failure. [ 2856.886511] name failslab, interval 1, probability 0, space 0, times 0 [ 2856.887546] CPU: 1 PID: 11707 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2856.888194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2856.888827] Call Trace: [ 2856.889029] [ 2856.889217] dump_stack_lvl+0x8f/0xb7 [ 2856.889555] should_fail_ex.cold+0x5/0xa [ 2856.889895] ? __kernfs_new_node+0xd4/0x8c0 [ 2856.890244] should_failslab+0x9/0x20 [ 2856.890563] kmem_cache_alloc+0x5a/0x410 [ 2856.890924] __kernfs_new_node+0xd4/0x8c0 [ 2856.891279] ? __pfx___kernfs_new_node+0x10/0x10 [ 2856.891670] ? selinux_sb_statfs+0x1be/0x250 [ 2856.892030] ? __pfx_selinux_sb_statfs+0x10/0x10 [ 2856.892429] ? __pfx_perf_trace_lock+0x10/0x10 [ 2856.892799] ? shmem_statfs+0x1b7/0x3e0 [ 2856.893135] kernfs_create_dir_ns+0xa0/0x230 [ 2856.893514] internal_create_group+0x786/0xb20 [ 2856.893898] ? __pfx_internal_create_group+0x10/0x10 [ 2856.894325] loop_configure+0xf37/0x1a00 [ 2856.894692] lo_ioctl+0x93a/0x1990 [ 2856.894987] ? do_syscall_64+0x3f/0x90 [ 2856.895322] ? __pfx_lo_ioctl+0x10/0x10 [ 2856.895644] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2856.896055] ? __pfx_perf_trace_lock+0x10/0x10 [ 2856.896439] ? __lock_acquire+0xbad/0x5e70 [ 2856.896839] ? __pfx_lock_release+0x10/0x10 [ 2856.897183] ? __pfx_do_sys_openat2+0x10/0x10 [ 2856.897558] ? __pfx_lo_ioctl+0x10/0x10 [ 2856.897873] blkdev_ioctl+0x349/0xa00 [ 2856.898190] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2856.898540] ? selinux_file_ioctl+0xb5/0x260 [ 2856.898912] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2856.899265] __x64_sys_ioctl+0x19e/0x210 [ 2856.899598] do_syscall_64+0x3f/0x90 [ 2856.899903] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2856.900322] RIP: 0033:0x7ff78264a8d7 [ 2856.900615] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2856.901967] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2856.902546] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2856.903105] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2856.903658] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2856.904194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2856.904732] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2856.905288] [ 2856.905520] loop3: detected capacity change from 0 to 136 [ 2856.920196] loop5: detected capacity change from 0 to 256 08:57:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:26 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8100, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2856.941698] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 08:57:26 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) [ 2856.986382] loop6: detected capacity change from 0 to 256 [ 2857.029770] loop2: detected capacity change from 0 to 256 [ 2857.049368] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2857.055066] isofs_fill_super: get root inode failed 08:57:43 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 08:57:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1b, 0x0, r0) 08:57:43 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9202, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:43 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000216c, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 26) 08:57:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120", 0x71, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2873.866259] loop5: detected capacity change from 0 to 256 [ 2873.867250] loop6: detected capacity change from 0 to 256 [ 2873.879311] loop3: detected capacity change from 0 to 136 [ 2873.880116] loop2: detected capacity change from 0 to 256 [ 2873.884422] FAULT_INJECTION: forcing a failure. [ 2873.884422] name failslab, interval 1, probability 0, space 0, times 0 [ 2873.885422] CPU: 1 PID: 11741 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2873.886108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2873.886797] Call Trace: [ 2873.887063] [ 2873.887255] dump_stack_lvl+0x8f/0xb7 [ 2873.887591] should_fail_ex.cold+0x5/0xa [ 2873.887931] ? copy_net_ns+0x129/0x760 [ 2873.888285] should_failslab+0x9/0x20 [ 2873.888624] kmem_cache_alloc+0x5a/0x410 [ 2873.888994] ? rcu_read_lock_sched_held+0x42/0x80 [ 2873.889443] copy_net_ns+0x129/0x760 [ 2873.889777] ? copy_cgroup_ns+0xa7/0x6f0 [ 2873.890135] create_new_namespaces+0x3f6/0xb30 [ 2873.890570] copy_namespaces+0x3b7/0x4a0 [ 2873.890968] copy_process+0x29e3/0x7220 [ 2873.891329] ? lock_is_held_type+0xdb/0x130 [ 2873.891709] ? find_held_lock+0x2c/0x110 [ 2873.892074] ? __pfx_copy_process+0x10/0x10 [ 2873.892460] ? _copy_from_user+0x169/0x1f0 [ 2873.892853] kernel_clone+0xeb/0x950 [ 2873.893198] ? lock_is_held_type+0xdb/0x130 [ 2873.893581] ? __pfx_kernel_clone+0x10/0x10 [ 2873.893968] ? lock_is_held_type+0xdb/0x130 [ 2873.894374] __do_sys_clone3+0x1d9/0x370 [ 2873.894735] ? __pfx___do_sys_clone3+0x10/0x10 [ 2873.895167] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2873.895636] ? fput+0x2f/0x1a0 [ 2873.895930] ? syscall_enter_from_user_mode+0x21/0x50 [ 2873.896385] ? syscall_enter_from_user_mode+0x21/0x50 [ 2873.896852] do_syscall_64+0x3f/0x90 [ 2873.897203] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2873.897654] RIP: 0033:0x7fbd5db53b19 [ 2873.898022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2873.899491] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2873.900127] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2873.900726] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2873.901305] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2873.901865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2873.902438] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2873.903088] [ 2873.906017] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2873.909506] isofs_fill_super: bread failed, dev=loop5, iso_blknum=64, block=128 [ 2873.924008] isofs_fill_super: get root inode failed 08:57:43 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1c, 0x0, r0) 08:57:43 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002174, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:43 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 27) 08:57:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:43 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 08:57:43 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1d, 0x0, r0) [ 2874.123485] loop5: detected capacity change from 0 to 256 [ 2874.140189] loop2: detected capacity change from 0 to 256 [ 2874.142115] loop6: detected capacity change from 0 to 256 [ 2874.149621] FAULT_INJECTION: forcing a failure. [ 2874.149621] name failslab, interval 1, probability 0, space 0, times 0 [ 2874.150611] CPU: 1 PID: 11760 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2874.151274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2874.151935] Call Trace: [ 2874.152146] [ 2874.152341] dump_stack_lvl+0x8f/0xb7 [ 2874.152688] should_fail_ex.cold+0x5/0xa [ 2874.153040] ? __kernfs_new_node+0xd4/0x8c0 [ 2874.153394] should_failslab+0x9/0x20 [ 2874.153426] kmem_cache_alloc+0x5a/0x410 [ 2874.154153] __kernfs_new_node+0xd4/0x8c0 [ 2874.154509] ? __pfx___kernfs_new_node+0x10/0x10 [ 2874.154942] ? find_held_lock+0x2c/0x110 [ 2874.155282] ? lock_release+0x3b6/0x750 [ 2874.155607] ? kernfs_add_one+0x175/0x4f0 [ 2874.155954] ? __pfx_lock_release+0x10/0x10 [ 2874.156323] kernfs_new_node+0x97/0x120 [ 2874.156693] __kernfs_create_file+0x55/0x350 [ 2874.157065] sysfs_add_file_mode_ns+0x21c/0x440 [ 2874.157486] ? __pfx_dev_attr_store+0x10/0x10 [ 2874.157880] internal_create_group+0x322/0xb20 [ 2874.158282] ? __pfx_internal_create_group+0x10/0x10 [ 2874.158728] loop_configure+0xf37/0x1a00 [ 2874.159128] lo_ioctl+0x93a/0x1990 [ 2874.159428] ? do_syscall_64+0x3f/0x90 [ 2874.159764] ? __pfx_lo_ioctl+0x10/0x10 [ 2874.160093] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2874.160520] ? __pfx_perf_trace_lock+0x10/0x10 [ 2874.160911] ? __lock_acquire+0xbad/0x5e70 [ 2874.161304] ? __pfx_lock_release+0x10/0x10 [ 2874.161660] ? __pfx_do_sys_openat2+0x10/0x10 [ 2874.162034] ? xfd_validate_state+0x5d/0x180 [ 2874.162395] ? __pfx_lo_ioctl+0x10/0x10 [ 2874.162720] blkdev_ioctl+0x349/0xa00 [ 2874.163076] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2874.163437] ? selinux_file_ioctl+0xb5/0x260 [ 2874.163811] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2874.164174] __x64_sys_ioctl+0x19e/0x210 [ 2874.164525] do_syscall_64+0x3f/0x90 [ 2874.164859] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2874.165351] RIP: 0033:0x7ff78264a8d7 [ 2874.165664] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2874.167085] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2874.167710] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2874.168287] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2874.168905] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2874.169493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2874.170061] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2874.170668] [ 2874.191152] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2874.217746] isofs_fill_super: get root inode failed [ 2874.240389] loop3: detected capacity change from 0 to 136 08:57:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 08:57:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000217a, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x1e, 0x0, r0) 08:57:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:57:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 28) [ 2890.116050] loop5: detected capacity change from 0 to 256 [ 2890.138125] FAULT_INJECTION: forcing a failure. [ 2890.138125] name failslab, interval 1, probability 0, space 0, times 0 [ 2890.138761] loop2: detected capacity change from 0 to 256 [ 2890.139118] CPU: 1 PID: 11781 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2890.140222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2890.140903] Call Trace: [ 2890.141118] [ 2890.141304] dump_stack_lvl+0x8f/0xb7 [ 2890.141651] should_fail_ex.cold+0x5/0xa [ 2890.142009] should_failslab+0x9/0x20 [ 2890.142349] __kmem_cache_alloc_node+0x5b/0x400 [ 2890.142760] ? copy_net_ns+0x177/0x760 [ 2890.143134] ? rcu_read_lock_sched_held+0x42/0x80 [ 2890.143568] kmalloc_trace+0x26/0x60 [ 2890.143924] copy_net_ns+0x177/0x760 [ 2890.144243] ? copy_cgroup_ns+0xa7/0x6f0 [ 2890.144256] loop6: detected capacity change from 0 to 256 [ 2890.144596] create_new_namespaces+0x3f6/0xb30 [ 2890.144640] copy_namespaces+0x3b7/0x4a0 [ 2890.144674] copy_process+0x29e3/0x7220 [ 2890.144694] ? lock_is_held_type+0xdb/0x130 [ 2890.146434] ? find_held_lock+0x2c/0x110 [ 2890.146781] ? __pfx_copy_process+0x10/0x10 [ 2890.147168] ? _copy_from_user+0x169/0x1f0 [ 2890.147534] kernel_clone+0xeb/0x950 [ 2890.147856] ? lock_is_held_type+0xdb/0x130 [ 2890.148210] ? __pfx_kernel_clone+0x10/0x10 [ 2890.148594] ? lock_is_held_type+0xdb/0x130 [ 2890.148954] __do_sys_clone3+0x1d9/0x370 [ 2890.149286] ? __pfx___do_sys_clone3+0x10/0x10 [ 2890.149696] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2890.150134] ? fput+0x2f/0x1a0 [ 2890.150408] ? syscall_enter_from_user_mode+0x21/0x50 [ 2890.150829] ? syscall_enter_from_user_mode+0x21/0x50 [ 2890.151306] do_syscall_64+0x3f/0x90 [ 2890.151645] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2890.152104] RIP: 0033:0x7fbd5db53b19 [ 2890.152403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2890.153797] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2890.153818] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2890.153831] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2890.153843] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2890.156199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2890.156762] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2890.157364] [ 2890.167241] loop3: detected capacity change from 0 to 136 [ 2890.173036] isofs_fill_super: get root inode failed [ 2890.183101] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:57:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x32, 0x0, r0) 08:57:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:57:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000219b, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:57:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2890.330523] loop5: detected capacity change from 0 to 256 08:58:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 29) 08:58:15 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:58:15 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000002480)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef004ee2b88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60", 0x2f}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, 0x0) keyctl$invalidate(0x15, 0x0) r4 = add_key$user(&(0x7f0000001400), &(0x7f0000001440)={'syz', 0x1}, &(0x7f0000001480)="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", 0x1000, r1) [ 2906.063887] loop3: detected capacity change from 0 to 136 keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001380)=[{&(0x7f0000000200)="9ec70820", 0x4}, {&(0x7f0000000240)="5b8b63b7c5460a4ba51a5b9de3a90635d6e003e2ba2a93fefbb67915d5ddc99d5236ef828771b7b9f0e5bdc99019ac5331de79e168b1f1d02ba410a8e291777924b8495aba0829769dee5ddfc7b393a87ab2bf7f1fc449d6520300328b28ce2193748ea2fd4cce21598ddb4a6ea9fb04e12dc462e14b3083737b2773", 0x7c}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="3ba7479bc60f35731e60052be3a8f676cbb341007131c88613414e9299ffbd1140c8362420da5dd17c999e41e977e59eac66e5484580db09cc90fa77428d0df877a1c190a43dc4b1224a61b3706e5e1c8ef58ba694ac655b905e", 0x5a}, {&(0x7f0000001340)="92e067a072497876b0e1912f68292c9f8f6c330be322714b9e31b38cc3f80639dc8c", 0x22}], 0x5, r4) keyctl$invalidate(0x15, r3) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60", 0x4}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) keyctl$invalidate(0x15, r5) keyctl$KEYCTL_MOVE(0x1e, r3, r1, r5, 0x1) keyctl$link(0x8, 0x0, r2) 08:58:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c01200000000000002000000000", 0x7c, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:15 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc00021a8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:58:15 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) 08:58:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2906.075238] loop5: detected capacity change from 0 to 256 [ 2906.099071] loop6: detected capacity change from 0 to 256 [ 2906.106615] loop2: detected capacity change from 0 to 256 [ 2906.125686] isofs_fill_super: get root inode failed 08:58:15 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:58:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 30) 08:58:15 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc00021b2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2906.200008] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:58:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:15 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) keyctl$link(0x8, 0x0, r0) [ 2906.265675] loop3: detected capacity change from 0 to 136 08:58:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2906.330491] loop5: detected capacity change from 0 to 256 08:58:15 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) 08:58:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 31) 08:58:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2906.369918] loop2: detected capacity change from 0 to 256 [ 2906.394325] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2906.396698] isofs_fill_super: get root inode failed [ 2906.406686] loop6: detected capacity change from 0 to 256 08:58:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r1, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, 0xfffffffffffffffd, 0x1) 08:58:16 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc00021fc, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2906.447275] FAULT_INJECTION: forcing a failure. [ 2906.447275] name failslab, interval 1, probability 0, space 0, times 0 [ 2906.448325] CPU: 1 PID: 11842 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2906.449008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2906.449671] Call Trace: [ 2906.449895] [ 2906.450094] dump_stack_lvl+0x8f/0xb7 [ 2906.450450] should_fail_ex.cold+0x5/0xa [ 2906.450807] ? __kernfs_new_node+0xd4/0x8c0 [ 2906.451176] should_failslab+0x9/0x20 [ 2906.451549] kmem_cache_alloc+0x5a/0x410 [ 2906.451908] __kernfs_new_node+0xd4/0x8c0 [ 2906.452269] ? lock_release+0x3b6/0x750 [ 2906.452614] ? __pfx___kernfs_new_node+0x10/0x10 [ 2906.453018] ? __pfx_lock_release+0x10/0x10 [ 2906.453406] ? up_write+0x1b0/0x520 [ 2906.453736] kernfs_new_node+0x97/0x120 [ 2906.454088] __kernfs_create_file+0x55/0x350 [ 2906.454471] sysfs_add_file_mode_ns+0x21c/0x440 [ 2906.454857] ? __pfx_dev_attr_store+0x10/0x10 [ 2906.455278] internal_create_group+0x322/0xb20 [ 2906.455702] ? __pfx_internal_create_group+0x10/0x10 [ 2906.456160] loop_configure+0xf37/0x1a00 [ 2906.456535] lo_ioctl+0x93a/0x1990 [ 2906.456848] ? do_syscall_64+0x3f/0x90 [ 2906.457198] ? __pfx_lo_ioctl+0x10/0x10 [ 2906.457539] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2906.457970] ? __pfx_perf_trace_lock+0x10/0x10 [ 2906.458378] ? __lock_acquire+0xbad/0x5e70 [ 2906.458802] ? __pfx_lock_release+0x10/0x10 [ 2906.459161] ? __pfx_do_sys_openat2+0x10/0x10 [ 2906.459580] ? __pfx_lo_ioctl+0x10/0x10 [ 2906.459922] blkdev_ioctl+0x349/0xa00 [ 2906.460252] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2906.460618] ? selinux_file_ioctl+0xb5/0x260 [ 2906.461005] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2906.461407] __x64_sys_ioctl+0x19e/0x210 [ 2906.461766] do_syscall_64+0x3f/0x90 [ 2906.462090] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2906.462575] RIP: 0033:0x7ff78264a8d7 [ 2906.462884] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2906.464315] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2906.464938] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2906.465530] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2906.466099] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2906.466660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2906.467217] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2906.467839] 08:58:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2906.510303] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2906.548781] loop3: detected capacity change from 0 to 136 [ 2906.571593] loop2: detected capacity change from 0 to 256 [ 2906.587630] isofs_fill_super: get root inode failed 08:58:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "40939f2a8598dc097eafcb13981c28b3e2c3bed1f5ca11462bef7b69e7afd0bd347f5dceeee14c51306f27c909b2b85f92aa5341be021a5bb3d1fbc94e388209", 0x1d}, 0x48, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) keyctl$link(0x8, r2, r1) 08:58:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc00021fe, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:58:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 32) 08:58:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) 08:58:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2922.579745] loop6: detected capacity change from 0 to 256 [ 2922.582895] loop2: detected capacity change from 0 to 256 [ 2922.585800] loop5: detected capacity change from 0 to 256 [ 2922.601876] loop3: detected capacity change from 0 to 136 [ 2922.604614] isofs_fill_super: get root inode failed [ 2922.646415] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:58:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:58:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:58:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000", 0x7d, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, r0) r1 = add_key$user(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="3f51325b36bfd58c2712faf92557773d32c55a538e76379d454fce59df0ceee276acf6fa3c", 0x25, r0) keyctl$read(0xb, r1, &(0x7f0000000140)=""/102, 0x66) 08:58:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 33) 08:58:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2922.826044] loop2: detected capacity change from 0 to 256 [ 2922.829137] FAULT_INJECTION: forcing a failure. [ 2922.829137] name failslab, interval 1, probability 0, space 0, times 0 [ 2922.830161] CPU: 1 PID: 11889 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2922.830777] loop5: detected capacity change from 0 to 256 [ 2922.830843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2922.832061] Call Trace: [ 2922.832299] [ 2922.832506] dump_stack_lvl+0x8f/0xb7 [ 2922.832869] should_fail_ex.cold+0x5/0xa [ 2922.833228] ? __kernfs_new_node+0xd4/0x8c0 [ 2922.833617] should_failslab+0x9/0x20 [ 2922.833955] kmem_cache_alloc+0x5a/0x410 [ 2922.834315] __kernfs_new_node+0xd4/0x8c0 [ 2922.834709] ? lock_release+0x3b6/0x750 [ 2922.835064] ? __pfx___kernfs_new_node+0x10/0x10 [ 2922.835525] ? __pfx_lock_release+0x10/0x10 [ 2922.835953] ? up_write+0x1b0/0x520 [ 2922.836305] kernfs_new_node+0x97/0x120 [ 2922.836680] __kernfs_create_file+0x55/0x350 [ 2922.837065] sysfs_add_file_mode_ns+0x21c/0x440 [ 2922.837493] ? __pfx_dev_attr_store+0x10/0x10 [ 2922.837902] internal_create_group+0x322/0xb20 [ 2922.838319] ? __pfx_internal_create_group+0x10/0x10 [ 2922.838789] loop_configure+0xf37/0x1a00 [ 2922.839185] lo_ioctl+0x93a/0x1990 [ 2922.839531] ? do_syscall_64+0x3f/0x90 [ 2922.839904] ? __pfx_lo_ioctl+0x10/0x10 [ 2922.840271] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2922.840745] ? __pfx_perf_trace_lock+0x10/0x10 [ 2922.841190] ? __lock_acquire+0xbad/0x5e70 [ 2922.841641] ? __pfx_lock_release+0x10/0x10 [ 2922.842045] ? __pfx_do_sys_openat2+0x10/0x10 [ 2922.842477] ? __pfx_lo_ioctl+0x10/0x10 [ 2922.842830] blkdev_ioctl+0x349/0xa00 [ 2922.843194] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2922.843657] ? selinux_file_ioctl+0xb5/0x260 [ 2922.844062] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2922.844457] __x64_sys_ioctl+0x19e/0x210 [ 2922.844811] do_syscall_64+0x3f/0x90 [ 2922.845139] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2922.845583] RIP: 0033:0x7ff78264a8d7 [ 2922.845884] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2922.847390] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2922.848021] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2922.848619] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2922.849203] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2922.849796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2922.850384] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2922.850965] [ 2922.870517] loop6: detected capacity change from 0 to 256 [ 2922.889143] isofs_fill_super: get root inode failed [ 2922.898477] loop3: detected capacity change from 0 to 136 [ 2922.913850] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:58:48 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) [ 2938.474850] loop3: detected capacity change from 0 to 136 08:58:48 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:58:48 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 34) 08:58:48 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1e5bc2c58822ae9fbf8a8c12421c7bc4aac13759ffa8125861ae055ca13c9489b36dc5dfa21f2c75296b03d3ed1c2258b283f02e42a54c4e2ba526d4c2363034", 0x39}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) keyctl$reject(0x13, r2, 0x3, 0x4, r1) keyctl$link(0x8, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000380)={0x0, "20107a2fae51c3b1ced3889a47ed0b5239a87670eaf2283d93521e44925918de8dfedea6e19ba2f8728742c7367235b25c4fabe8b53e805a2c10e46bf4d46fdc", 0x1a}, 0x48, r2) keyctl$instantiate(0xc, r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e657720637279707419a2a3103030303030303030303030303400"/48], 0x30, r4) 08:58:48 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf0ffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:58:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:58:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2938.515908] loop6: detected capacity change from 0 to 256 [ 2938.519972] FAULT_INJECTION: forcing a failure. [ 2938.519972] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.521300] CPU: 0 PID: 11903 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2938.522007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2938.522692] Call Trace: [ 2938.522927] [ 2938.523141] dump_stack_lvl+0x8f/0xb7 [ 2938.523495] should_fail_ex.cold+0x5/0xa [ 2938.523870] ? __proc_create+0x2b3/0x8b0 [ 2938.524232] should_failslab+0x9/0x20 [ 2938.524574] kmem_cache_alloc+0x5a/0x410 [ 2938.524968] __proc_create+0x2b3/0x8b0 [ 2938.525335] ? __pfx___proc_create+0x10/0x10 [ 2938.525731] ? lock_release+0x3b6/0x750 [ 2938.526102] ? kmem_cache_alloc+0x273/0x410 [ 2938.526480] ? mark_held_locks+0x9e/0xe0 [ 2938.526835] _proc_mkdir+0xb2/0x200 [ 2938.527176] ? __pfx__proc_mkdir+0x10/0x10 [ 2938.527562] ? rcu_read_lock_sched_held+0x42/0x80 [ 2938.528079] ? trace_kmem_cache_alloc+0x2d/0xe0 [ 2938.528509] ? __pfx_proc_net_ns_init+0x10/0x10 [ 2938.528966] proc_net_ns_init+0x265/0x410 [ 2938.529349] ops_init+0xbb/0x680 [ 2938.529676] setup_net+0x40c/0x9d0 [ 2938.530038] ? down_read_killable+0x1af/0x4a0 [ 2938.530448] ? __pfx_setup_net+0x10/0x10 [ 2938.530839] copy_net_ns+0x31c/0x760 [ 2938.531189] create_new_namespaces+0x3f6/0xb30 [ 2938.531620] copy_namespaces+0x3b7/0x4a0 [ 2938.532028] copy_process+0x29e3/0x7220 [ 2938.532389] ? lock_is_held_type+0xdb/0x130 [ 2938.532798] ? find_held_lock+0x2c/0x110 [ 2938.533183] ? __pfx_copy_process+0x10/0x10 [ 2938.533563] ? _copy_from_user+0x169/0x1f0 [ 2938.533973] kernel_clone+0xeb/0x950 [ 2938.534312] ? lock_is_held_type+0xdb/0x130 [ 2938.534708] ? __pfx_kernel_clone+0x10/0x10 [ 2938.535073] ? lock_is_held_type+0xdb/0x130 [ 2938.535430] __do_sys_clone3+0x1d9/0x370 [ 2938.535815] ? __pfx___do_sys_clone3+0x10/0x10 [ 2938.536225] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2938.536696] ? fput+0x2f/0x1a0 [ 2938.536999] ? syscall_enter_from_user_mode+0x21/0x50 [ 2938.537447] ? syscall_enter_from_user_mode+0x21/0x50 [ 2938.537901] do_syscall_64+0x3f/0x90 [ 2938.538254] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2938.538732] RIP: 0033:0x7fbd5db53b19 [ 2938.539059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2938.540617] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2938.541272] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2938.541883] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2938.542477] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2938.543087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2938.543686] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2938.544327] [ 2938.571129] loop5: detected capacity change from 0 to 256 [ 2938.576159] loop2: detected capacity change from 0 to 256 [ 2938.577454] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2938.590188] isofs_fill_super: get root inode failed 08:58:48 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 35) 08:58:48 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2938.699710] FAULT_INJECTION: forcing a failure. [ 2938.699710] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.700737] CPU: 1 PID: 11917 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2938.701405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2938.702102] Call Trace: [ 2938.702342] [ 2938.702565] dump_stack_lvl+0x8f/0xb7 [ 2938.702913] should_fail_ex.cold+0x5/0xa [ 2938.703274] ? __kernfs_new_node+0xd4/0x8c0 [ 2938.703636] should_failslab+0x9/0x20 [ 2938.703975] kmem_cache_alloc+0x5a/0x410 [ 2938.704344] __kernfs_new_node+0xd4/0x8c0 [ 2938.704730] ? lock_release+0x3b6/0x750 [ 2938.705122] ? __pfx___kernfs_new_node+0x10/0x10 [ 2938.705598] ? __pfx_lock_release+0x10/0x10 [ 2938.705984] ? up_write+0x1b0/0x520 [ 2938.706356] kernfs_new_node+0x97/0x120 [ 2938.706697] __kernfs_create_file+0x55/0x350 [ 2938.707078] sysfs_add_file_mode_ns+0x21c/0x440 [ 2938.707481] ? __pfx_dev_attr_store+0x10/0x10 [ 2938.707953] internal_create_group+0x322/0xb20 [ 2938.708414] ? __pfx_internal_create_group+0x10/0x10 [ 2938.708887] loop_configure+0xf37/0x1a00 [ 2938.709252] lo_ioctl+0x93a/0x1990 [ 2938.709548] ? do_syscall_64+0x3f/0x90 [ 2938.709885] ? __pfx_lo_ioctl+0x10/0x10 [ 2938.710208] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2938.710621] ? __pfx_perf_trace_lock+0x10/0x10 [ 2938.711023] ? __lock_acquire+0xbad/0x5e70 [ 2938.711461] ? __pfx_lock_release+0x10/0x10 [ 2938.711863] ? __pfx_do_sys_openat2+0x10/0x10 [ 2938.712268] ? xfd_validate_state+0x5d/0x180 [ 2938.712661] ? __pfx_lo_ioctl+0x10/0x10 [ 2938.713001] blkdev_ioctl+0x349/0xa00 [ 2938.713337] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2938.713697] ? selinux_file_ioctl+0xb5/0x260 [ 2938.714102] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2938.714465] __x64_sys_ioctl+0x19e/0x210 [ 2938.714845] do_syscall_64+0x3f/0x90 [ 2938.715180] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2938.715685] RIP: 0033:0x7ff78264a8d7 [ 2938.716022] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2938.717438] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2938.718028] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2938.718593] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2938.719139] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2938.719721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2938.720338] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2938.720989] [ 2938.770982] loop3: detected capacity change from 0 to 136 08:59:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 36) 08:59:05 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:05 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:05 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 08:59:05 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x290921, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="27f0ffeb", @ANYRES16=0x0, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x814}, 0x4040804) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[], 0x100}, 0x1, 0x0, 0x0, 0x20008804}, 0x4000004) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x94, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x2d}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044800) r6 = syz_io_uring_setup(0x2d47, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x10, r6, 0x10000000) syz_io_uring_submit(r7, r9, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x802, 0x0, 0x0, 0x4, 0x0, 0x0, {0xffff, r8}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYRESHEX=r2]) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="9c080000", @ANYRES16=r2, @ANYBLOB="000225bd7000fddbdf250e00000005002d0001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x880) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000000c0)={0x0, 0x6, [0x9, 0x4, 0x24, 0x9, 0x8000, 0x5]}) r10 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r10) keyctl$link(0x8, 0x0, r10) [ 2955.536483] loop6: detected capacity change from 0 to 256 [ 2955.553093] loop3: detected capacity change from 0 to 136 [ 2955.557882] loop5: detected capacity change from 0 to 256 [ 2955.560944] loop2: detected capacity change from 0 to 256 [ 2955.590278] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 2955.592385] isofs_fill_super: get root inode failed 08:59:05 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:05 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 37) 08:59:05 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:05 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2955.767705] FAULT_INJECTION: forcing a failure. [ 2955.767705] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.768883] CPU: 1 PID: 11948 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2955.769611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2955.770291] Call Trace: [ 2955.770529] [ 2955.770750] dump_stack_lvl+0x8f/0xb7 [ 2955.771125] should_fail_ex.cold+0x5/0xa [ 2955.771484] ? __kernfs_new_node+0xd4/0x8c0 [ 2955.771855] should_failslab+0x9/0x20 [ 2955.772219] kmem_cache_alloc+0x5a/0x410 [ 2955.772600] __kernfs_new_node+0xd4/0x8c0 [ 2955.772983] ? lock_release+0x3b6/0x750 [ 2955.773352] ? __pfx___kernfs_new_node+0x10/0x10 [ 2955.773786] ? __pfx_lock_release+0x10/0x10 [ 2955.774195] ? up_write+0x1b0/0x520 [ 2955.774556] kernfs_new_node+0x97/0x120 [ 2955.774911] __kernfs_create_file+0x55/0x350 [ 2955.775289] sysfs_add_file_mode_ns+0x21c/0x440 [ 2955.775682] ? __pfx_dev_attr_store+0x10/0x10 [ 2955.776108] internal_create_group+0x322/0xb20 [ 2955.776507] ? __pfx_internal_create_group+0x10/0x10 [ 2955.776944] loop_configure+0xf37/0x1a00 [ 2955.777311] lo_ioctl+0x93a/0x1990 [ 2955.777612] ? do_syscall_64+0x3f/0x90 [ 2955.777968] ? __pfx_lo_ioctl+0x10/0x10 [ 2955.778344] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2955.778798] ? __pfx_perf_trace_lock+0x10/0x10 [ 2955.779217] ? __lock_acquire+0xbad/0x5e70 [ 2955.779640] ? __pfx_lock_release+0x10/0x10 [ 2955.780034] ? __pfx_do_sys_openat2+0x10/0x10 [ 2955.780430] ? __pfx_lo_ioctl+0x10/0x10 [ 2955.780795] blkdev_ioctl+0x349/0xa00 [ 2955.781155] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2955.781522] ? selinux_file_ioctl+0xb5/0x260 [ 2955.781920] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2955.782317] __x64_sys_ioctl+0x19e/0x210 [ 2955.782674] do_syscall_64+0x3f/0x90 [ 2955.783040] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2955.783515] RIP: 0033:0x7ff78264a8d7 [ 2955.783850] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2955.785395] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2955.786060] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2955.786664] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2955.787275] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2955.787893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2955.788520] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2955.789171] [ 2955.836635] loop2: detected capacity change from 0 to 256 [ 2955.837860] loop6: detected capacity change from 0 to 256 [ 2955.855270] isofs_fill_super: get root inode failed [ 2955.860911] loop5: detected capacity change from 0 to 256 [ 2955.863760] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:59:05 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) 08:59:05 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2955.898866] loop3: detected capacity change from 0 to 136 [ 2955.901083] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:59:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/85, 0x55) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "3a33e902623f095cab166f896cce533f8a14993541f6a6bca284e85cf0c474523e1e044fea6fe583fc20fabf1f30d41a321fa73e6eef7168c0b5333bbe51285f", 0x1e}, 0x48, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r2) [ 2955.982263] FAULT_INJECTION: forcing a failure. 08:59:05 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2955.982263] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.983791] CPU: 0 PID: 11960 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2955.984527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2955.985166] Call Trace: [ 2955.985394] [ 2955.985594] dump_stack_lvl+0x8f/0xb7 [ 2955.985952] should_fail_ex.cold+0x5/0xa [ 2955.986316] ? __proc_create+0x2b3/0x8b0 [ 2955.986679] should_failslab+0x9/0x20 [ 2955.987020] kmem_cache_alloc+0x5a/0x410 [ 2955.987379] __proc_create+0x2b3/0x8b0 [ 2955.987729] ? __pfx___proc_create+0x10/0x10 [ 2955.988162] ? mark_held_locks+0x9e/0xe0 [ 2955.988525] _proc_mkdir+0xb2/0x200 [ 2955.988848] ? __pfx__proc_mkdir+0x10/0x10 [ 2955.989216] ? trace_kmem_cache_alloc+0x2d/0xe0 [ 2955.989633] ? __pfx_netfilter_net_init+0x10/0x10 [ 2955.990055] netfilter_net_init+0x215/0x2f0 [ 2955.990437] ops_init+0xbb/0x680 [ 2955.990772] setup_net+0x40c/0x9d0 [ 2955.991076] ? down_read_killable+0x1af/0x4a0 [ 2955.991462] ? __pfx_setup_net+0x10/0x10 [ 2955.991857] copy_net_ns+0x31c/0x760 [ 2955.992205] create_new_namespaces+0x3f6/0xb30 [ 2955.992639] copy_namespaces+0x3b7/0x4a0 [ 2955.993019] copy_process+0x29e3/0x7220 [ 2955.993376] ? lock_is_held_type+0xdb/0x130 [ 2955.993774] ? find_held_lock+0x2c/0x110 [ 2955.994139] ? __pfx_copy_process+0x10/0x10 [ 2955.994522] ? _copy_from_user+0x169/0x1f0 [ 2955.994902] kernel_clone+0xeb/0x950 [ 2955.995225] ? lock_is_held_type+0xdb/0x130 [ 2955.995605] ? __pfx_kernel_clone+0x10/0x10 [ 2955.996014] ? lock_is_held_type+0xdb/0x130 [ 2955.996405] __do_sys_clone3+0x1d9/0x370 [ 2955.996751] ? __pfx___do_sys_clone3+0x10/0x10 [ 2955.997136] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2955.997592] ? fput+0x2f/0x1a0 [ 2955.997884] ? syscall_enter_from_user_mode+0x21/0x50 [ 2955.998315] ? syscall_enter_from_user_mode+0x21/0x50 [ 2955.998744] do_syscall_64+0x3f/0x90 [ 2955.999069] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2955.999493] RIP: 0033:0x7fbd5db53b19 [ 2955.999804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.001258] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2956.001857] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2956.002412] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2956.002968] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.003522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.004097] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2956.004711] [ 2956.005030] cannot create netfilter proc entry [ 2956.072851] loop5: detected capacity change from 0 to 256 [ 2956.080751] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:59:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) 08:59:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 38) 08:59:21 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x50000) lseek(0xffffffffffffffff, 0x7fff, 0x3) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x1) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) r2 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='.-\x00', r1) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r2) 08:59:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:21 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2971.865310] loop6: detected capacity change from 0 to 256 [ 2971.869688] loop3: detected capacity change from 0 to 136 [ 2971.882707] loop5: detected capacity change from 0 to 256 [ 2971.888290] loop2: detected capacity change from 0 to 256 [ 2971.891291] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 2971.904898] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 2971.907445] isofs_fill_super: get root inode failed [ 2971.932996] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:59:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "96ffa0489eb489f05a1f21bb203bf0ff86bf063c3f5df5207e72f35e5411ecb642a697c50118ab88aa7cbf780ab279be281eef12797cb62ec51555320ee60026", 0x18}, 0x48, r0) keyctl$link(0x8, r1, r1) 08:59:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 39) 08:59:21 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2972.086851] FAULT_INJECTION: forcing a failure. [ 2972.086851] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.087892] CPU: 1 PID: 11998 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2972.088604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2972.089230] Call Trace: [ 2972.089439] [ 2972.089630] dump_stack_lvl+0x8f/0xb7 [ 2972.089960] should_fail_ex.cold+0x5/0xa [ 2972.090289] ? __kernfs_new_node+0xd4/0x8c0 [ 2972.090634] should_failslab+0x9/0x20 [ 2972.090953] kmem_cache_alloc+0x5a/0x410 [ 2972.091284] __kernfs_new_node+0xd4/0x8c0 [ 2972.091622] ? lock_release+0x3b6/0x750 [ 2972.091952] ? __pfx___kernfs_new_node+0x10/0x10 [ 2972.092419] ? __pfx_lock_release+0x10/0x10 [ 2972.092780] ? up_write+0x1b0/0x520 [ 2972.093118] kernfs_new_node+0x97/0x120 [ 2972.093465] __kernfs_create_file+0x55/0x350 [ 2972.093855] sysfs_add_file_mode_ns+0x21c/0x440 [ 2972.094295] ? __pfx_dev_attr_store+0x10/0x10 [ 2972.094682] internal_create_group+0x322/0xb20 [ 2972.095110] ? __pfx_internal_create_group+0x10/0x10 [ 2972.095586] loop_configure+0xf37/0x1a00 [ 2972.095970] lo_ioctl+0x93a/0x1990 [ 2972.096332] ? do_syscall_64+0x3f/0x90 [ 2972.096662] ? __pfx_lo_ioctl+0x10/0x10 [ 2972.096980] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 2972.097410] ? __pfx_perf_trace_lock+0x10/0x10 [ 2972.097831] ? __lock_acquire+0xbad/0x5e70 [ 2972.098243] ? __pfx_lock_release+0x10/0x10 [ 2972.098603] ? __pfx_do_sys_openat2+0x10/0x10 [ 2972.098994] ? __pfx_lo_ioctl+0x10/0x10 [ 2972.099324] blkdev_ioctl+0x349/0xa00 [ 2972.099647] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2972.100003] ? selinux_file_ioctl+0xb5/0x260 [ 2972.100414] ? __pfx_blkdev_ioctl+0x10/0x10 [ 2972.100783] __x64_sys_ioctl+0x19e/0x210 [ 2972.101165] do_syscall_64+0x3f/0x90 [ 2972.101494] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2972.101935] RIP: 0033:0x7ff78264a8d7 [ 2972.102298] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2972.103707] RSP: 002b:00007ff77fbbff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2972.104368] RAX: ffffffffffffffda RBX: 00007ff782694970 RCX: 00007ff78264a8d7 [ 2972.104924] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2972.105533] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2972.106128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2972.106702] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2972.107345] [ 2972.125216] loop2: detected capacity change from 0 to 256 08:59:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2972.145201] loop5: detected capacity change from 0 to 256 [ 2972.148930] loop6: detected capacity change from 0 to 256 [ 2972.152847] isofs_fill_super: get root inode failed 08:59:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) [ 2972.161881] ISOFS: Logical zone size(0) < hardware blocksize(1024) 08:59:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) [ 2972.184772] loop3: detected capacity change from 0 to 136 [ 2972.193398] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:59:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 40) 08:59:38 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0006e00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:38 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) 08:59:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:38 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:38 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) 08:59:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 2988.645022] loop3: detected capacity change from 0 to 136 [ 2988.652601] loop6: detected capacity change from 0 to 256 [ 2988.662151] loop5: detected capacity change from 0 to 256 [ 2988.666246] loop2: detected capacity change from 0 to 256 [ 2988.681889] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 2988.688397] isofs_fill_super: get root inode failed [ 2988.706863] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:59:38 executing program 0: keyctl$link(0x8, 0x0, 0x0) r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="548ae19801e703902efb7a59a792cff246f0c41a83dec6efa89ddf4a4d51daf287dc19136c66b7fa5d9b9ffb27df04f8480c22d83e607809dca42195145b333d34914d78c1f056d67fb097ea3535dc87611bb55550d8285435ea1f73c0565476f8f1555fc8986521ec27474e3a5c656333f6c28592dbafa393916e368158df97b36e1beee5685f1ddb225b1041f04a39cc4459e86e7f83a43020", 0x9a, r0) keyctl$read(0xb, r1, &(0x7f00000001c0)=""/191, 0xbf) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffffa, r0, 0x1) 08:59:38 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 41) 08:59:38 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:38 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0007301, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000", 0x80, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:38 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:38 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:38 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) [ 2988.899722] loop3: detected capacity change from 0 to 136 [ 2988.900454] FAULT_INJECTION: forcing a failure. [ 2988.900454] name failslab, interval 1, probability 0, space 0, times 0 [ 2988.901460] CPU: 1 PID: 12051 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2988.902109] loop2: detected capacity change from 0 to 256 [ 2988.902153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2988.903321] Call Trace: [ 2988.903541] [ 2988.903744] dump_stack_lvl+0x8f/0xb7 [ 2988.904089] should_fail_ex.cold+0x5/0xa [ 2988.904477] ? getname_flags.part.0+0x50/0x4f0 [ 2988.904528] loop5: detected capacity change from 0 to 256 [ 2988.904893] should_failslab+0x9/0x20 [ 2988.905713] kmem_cache_alloc+0x5a/0x410 [ 2988.906066] getname_flags.part.0+0x50/0x4f0 [ 2988.906486] __x64_sys_mkdir+0xde/0x150 [ 2988.906845] do_syscall_64+0x3f/0x90 [ 2988.907168] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2988.907606] RIP: 0033:0x7ff782649c27 [ 2988.907923] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2988.909428] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2988.910046] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 2988.910627] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2988.911201] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 2988.911780] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2988.912359] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 2988.912978] [ 2988.917651] loop6: detected capacity change from 0 to 256 [ 2988.920639] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 2988.925642] isofs_fill_super: get root inode failed [ 2988.962505] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 08:59:38 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 2988.999780] FAULT_INJECTION: forcing a failure. [ 2988.999780] name failslab, interval 1, probability 0, space 0, times 0 [ 2989.000855] CPU: 1 PID: 12057 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 2989.001578] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2989.002357] Call Trace: [ 2989.002601] [ 2989.002807] dump_stack_lvl+0x8f/0xb7 [ 2989.003157] should_fail_ex.cold+0x5/0xa [ 2989.003520] ? nf_log_net_init+0xa0/0x370 [ 2989.003902] should_failslab+0x9/0x20 [ 2989.004286] __kmem_cache_alloc_node+0x5b/0x400 [ 2989.004765] ? nf_log_net_init+0xa0/0x370 [ 2989.005178] ? proc_create_net_data+0x151/0x1c0 [ 2989.005608] ? __pfx_nf_log_net_init+0x10/0x10 [ 2989.006001] ? nf_log_net_init+0xa0/0x370 [ 2989.006368] __kmalloc_node_track_caller+0x43/0xb0 [ 2989.006829] ? __pfx_nf_log_net_init+0x10/0x10 [ 2989.007273] kmemdup+0x2c/0x60 [ 2989.007569] nf_log_net_init+0xa0/0x370 [ 2989.007916] ? __pfx_nf_log_net_init+0x10/0x10 [ 2989.008351] ops_init+0xbb/0x680 [ 2989.008673] setup_net+0x40c/0x9d0 [ 2989.008977] ? down_read_killable+0x1af/0x4a0 [ 2989.009376] ? __pfx_setup_net+0x10/0x10 [ 2989.009742] copy_net_ns+0x31c/0x760 [ 2989.010109] create_new_namespaces+0x3f6/0xb30 [ 2989.010529] copy_namespaces+0x3b7/0x4a0 [ 2989.010888] copy_process+0x29e3/0x7220 [ 2989.011275] ? lock_is_held_type+0xdb/0x130 08:59:38 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) r2 = add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="b2aea3cdeba0dd4cc76b37ce0aebdcdfa3358ea84f7d17dcdfc28b2182e32720987e9f82c4ec4282fc57b788a126a0d429c3f715502bd2eb1dbaa52017aaaa573a63125277ab98f11e2d4ac4d1bcf34f8b3c053a69512c5864207b08d3568b52d4cb84bbab95b2d73d3d9a467273a4df665971693db79bc38f8f09666f5d43cc5ba22a8c891435f61f63c9ed92979a7d25144c2620a6c7db3d7a0427f808c8a88d0f66cd921be6db36fa", 0xaa, r0) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r1) keyctl$link(0x8, r1, r0) [ 2989.011644] ? find_held_lock+0x2c/0x110 [ 2989.012212] ? __pfx_copy_process+0x10/0x10 [ 2989.012608] ? _copy_from_user+0x169/0x1f0 [ 2989.012986] kernel_clone+0xeb/0x950 [ 2989.013324] ? lock_is_held_type+0xdb/0x130 [ 2989.013705] ? __pfx_kernel_clone+0x10/0x10 [ 2989.014075] ? lock_is_held_type+0xdb/0x130 [ 2989.014462] __do_sys_clone3+0x1d9/0x370 [ 2989.014803] ? __pfx___do_sys_clone3+0x10/0x10 [ 2989.015193] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 2989.015638] ? fput+0x2f/0x1a0 [ 2989.015933] ? syscall_enter_from_user_mode+0x21/0x50 [ 2989.016410] ? syscall_enter_from_user_mode+0x21/0x50 [ 2989.016833] do_syscall_64+0x3f/0x90 [ 2989.017162] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 2989.017620] RIP: 0033:0x7fbd5db53b19 [ 2989.017926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2989.019399] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2989.020018] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 2989.020627] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 2989.021195] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2989.021760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2989.022361] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 2989.022957] 08:59:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:54 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc000f507, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r0, 0x1) keyctl$link(0x8, 0x0, r0) 08:59:54 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) 08:59:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 42) 08:59:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:54 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3004.731174] loop3: detected capacity change from 0 to 136 [ 3004.731453] loop5: detected capacity change from 0 to 256 [ 3004.732029] FAULT_INJECTION: forcing a failure. [ 3004.732029] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.733485] CPU: 0 PID: 12073 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3004.734178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3004.734604] loop6: detected capacity change from 0 to 256 [ 3004.734854] Call Trace: [ 3004.734866] [ 3004.735817] dump_stack_lvl+0x8f/0xb7 [ 3004.736169] should_fail_ex.cold+0x5/0xa [ 3004.736541] should_failslab+0x9/0x20 [ 3004.736903] kmem_cache_alloc_lru+0x6b/0x760 [ 3004.737291] ? __d_alloc+0x31/0x9c0 [ 3004.737639] __d_alloc+0x31/0x9c0 [ 3004.737969] d_alloc+0x4a/0x1d0 [ 3004.738279] __lookup_hash+0xcc/0x190 [ 3004.738632] filename_create+0x1d6/0x4a0 [ 3004.739004] ? __pfx_filename_create+0x10/0x10 [ 3004.739413] ? __pfx_lock_release+0x10/0x10 [ 3004.739806] ? __virt_addr_valid+0x102/0x340 [ 3004.740199] do_mkdirat+0x96/0x2d0 [ 3004.740529] ? __pfx_do_mkdirat+0x10/0x10 [ 3004.740991] ? getname_flags.part.0+0x1dd/0x4f0 [ 3004.741405] __x64_sys_mkdir+0xf6/0x150 [ 3004.741771] do_syscall_64+0x3f/0x90 [ 3004.742117] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3004.742581] RIP: 0033:0x7ff782649c27 [ 3004.742913] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3004.744410] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3004.745056] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3004.745644] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3004.746235] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3004.746884] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3004.747468] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3004.748068] [ 3004.758928] loop2: detected capacity change from 0 to 256 [ 3004.759913] isofs_fill_super: get root inode failed [ 3004.786958] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 3004.799988] isofs_fill_super: get root inode failed 08:59:54 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:59:54 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1c000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 08:59:54 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:54 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 08:59:54 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) [ 3004.941279] loop6: detected capacity change from 0 to 256 08:59:54 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 43) [ 3004.977428] loop5: detected capacity change from 0 to 256 [ 3004.984140] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 3004.990585] loop2: detected capacity change from 0 to 256 [ 3004.993582] isofs_fill_super: get root inode failed [ 3005.002924] isofs_fill_super: get root inode failed [ 3005.018046] FAULT_INJECTION: forcing a failure. [ 3005.018046] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.019023] CPU: 0 PID: 12099 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3005.019683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3005.020363] Call Trace: [ 3005.020611] [ 3005.020815] dump_stack_lvl+0x8f/0xb7 [ 3005.021179] should_fail_ex.cold+0x5/0xa [ 3005.021557] should_failslab+0x9/0x20 [ 3005.021898] __kmem_cache_alloc_node+0x5b/0x400 [ 3005.022300] ? __register_sysctl_table+0x116/0x1150 [ 3005.022736] ? __register_sysctl_table+0x116/0x1150 [ 3005.023158] __kmalloc+0x46/0xc0 [ 3005.023455] __register_sysctl_table+0x116/0x1150 [ 3005.023858] ? lock_is_held_type+0xdb/0x130 [ 3005.024233] ? __pfx___register_sysctl_table+0x10/0x10 [ 3005.024703] ? is_module_address+0x8c/0xc0 [ 3005.025071] ? register_net_sysctl+0x219/0x2c0 [ 3005.025475] nf_log_net_init+0x105/0x370 [ 3005.025841] ? __pfx_nf_log_net_init+0x10/0x10 [ 3005.026231] ops_init+0xbb/0x680 [ 3005.026553] setup_net+0x40c/0x9d0 [ 3005.026909] ? down_read_killable+0x1af/0x4a0 [ 3005.027323] ? __pfx_setup_net+0x10/0x10 [ 3005.027687] copy_net_ns+0x31c/0x760 [ 3005.028032] create_new_namespaces+0x3f6/0xb30 [ 3005.028437] copy_namespaces+0x3b7/0x4a0 [ 3005.028805] copy_process+0x29e3/0x7220 [ 3005.029142] ? lock_is_held_type+0xdb/0x130 [ 3005.029502] ? find_held_lock+0x2c/0x110 [ 3005.029861] ? __pfx_copy_process+0x10/0x10 [ 3005.030222] ? _copy_from_user+0x169/0x1f0 [ 3005.030596] kernel_clone+0xeb/0x950 [ 3005.030918] ? lock_is_held_type+0xdb/0x130 [ 3005.031296] ? __pfx_kernel_clone+0x10/0x10 [ 3005.031679] ? lock_is_held_type+0xdb/0x130 [ 3005.032082] __do_sys_clone3+0x1d9/0x370 [ 3005.032527] ? __pfx___do_sys_clone3+0x10/0x10 [ 3005.032971] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3005.033424] ? fput+0x2f/0x1a0 [ 3005.033731] ? syscall_enter_from_user_mode+0x21/0x50 [ 3005.034176] ? syscall_enter_from_user_mode+0x21/0x50 [ 3005.034603] do_syscall_64+0x3f/0x90 [ 3005.034924] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3005.035358] RIP: 0033:0x7fbd5db53b19 [ 3005.035672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3005.037159] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3005.037910] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3005.038492] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3005.039084] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3005.039657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3005.040214] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3005.040816] [ 3005.058423] loop3: detected capacity change from 0 to 136 09:00:09 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:09 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:00:09 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 09:00:09 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f4500", 0x5c, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 44) 09:00:09 executing program 0: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000001500)={{0x1, 0x1, 0xfffffffffffffe08, 0xffffffffffffffff, {0x4, 0x3}}, './file0\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00b5001800010100000000000000000a00000008000000e0000001"], 0x1c}}, 0x0) r2 = mq_open(&(0x7f0000000000)='@\x00', 0xc1, 0xb2, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, &(0x7f0000000500)={{}, r3, 0x12, @unused=[0x1, 0x1, 0x7ff, 0x6], @subvolid=0x80000000}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000280)={{r1}, r3, 0x13, @inherit={0x80, &(0x7f0000000200)={0x0, 0x7, 0x0, 0x0, {0x1a, 0xffff, 0xffff, 0x8, 0x10001}, [0xe3e1, 0xa8, 0x100000001, 0x3, 0xff, 0x8001, 0x0]}}, @subvolid=0x1}) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x40, 0x9}, {0x7565, 0x4}]}, 0x14, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r4) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r4) keyctl$get_persistent(0x16, 0xffffffffffffffff, r5) 09:00:09 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3020.344850] loop3: detected capacity change from 0 to 136 [ 3020.345709] loop6: detected capacity change from 0 to 256 [ 3020.346473] FAULT_INJECTION: forcing a failure. [ 3020.346473] name failslab, interval 1, probability 0, space 0, times 0 [ 3020.347220] CPU: 1 PID: 12114 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3020.347754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3020.348293] Call Trace: [ 3020.348474] [ 3020.348636] dump_stack_lvl+0x8f/0xb7 [ 3020.348932] should_fail_ex.cold+0x5/0xa [ 3020.349225] should_failslab+0x9/0x20 [ 3020.349493] kmem_cache_alloc_lru+0x6b/0x760 [ 3020.349796] ? __d_alloc+0x31/0x9c0 [ 3020.350067] __d_alloc+0x31/0x9c0 [ 3020.350325] d_alloc+0x4a/0x1d0 [ 3020.350570] __lookup_hash+0xcc/0x190 [ 3020.350839] filename_create+0x1d6/0x4a0 [ 3020.351112] ? __pfx_filename_create+0x10/0x10 [ 3020.351433] ? __pfx_lock_release+0x10/0x10 [ 3020.351743] ? __virt_addr_valid+0x102/0x340 [ 3020.352060] do_mkdirat+0x96/0x2d0 [ 3020.352321] ? __pfx_do_mkdirat+0x10/0x10 [ 3020.352600] ? getname_flags.part.0+0x1dd/0x4f0 [ 3020.352944] __x64_sys_mkdir+0xf6/0x150 [ 3020.353232] do_syscall_64+0x3f/0x90 [ 3020.353503] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3020.353860] RIP: 0033:0x7ff782649c27 [ 3020.354112] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3020.355305] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3020.355841] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3020.356336] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3020.356848] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3020.357344] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3020.357836] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3020.358355] [ 3020.381276] FAULT_INJECTION: forcing a failure. [ 3020.381276] name failslab, interval 1, probability 0, space 0, times 0 [ 3020.381548] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 3020.382879] CPU: 0 PID: 12116 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3020.384280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3020.385315] Call Trace: [ 3020.385665] [ 3020.385975] dump_stack_lvl+0x8f/0xb7 [ 3020.386518] should_fail_ex.cold+0x5/0xa [ 3020.387076] should_failslab+0x9/0x20 [ 3020.387608] __kmem_cache_alloc_node+0x5b/0x400 [ 3020.388218] ? __register_sysctl_table+0x116/0x1150 [ 3020.388903] ? __register_sysctl_table+0x116/0x1150 [ 3020.389582] __kmalloc+0x46/0xc0 [ 3020.390049] __register_sysctl_table+0x116/0x1150 [ 3020.390702] ? lock_is_held_type+0xdb/0x130 [ 3020.391303] ? __pfx___register_sysctl_table+0x10/0x10 [ 3020.392000] ? is_module_address+0x8c/0xc0 [ 3020.392579] ? register_net_sysctl+0x219/0x2c0 [ 3020.393210] nf_log_net_init+0x105/0x370 [ 3020.393779] ? __pfx_nf_log_net_init+0x10/0x10 [ 3020.394382] ops_init+0xbb/0x680 [ 3020.394856] setup_net+0x40c/0x9d0 [ 3020.395334] ? down_read_killable+0x1af/0x4a0 [ 3020.395949] ? __pfx_setup_net+0x10/0x10 [ 3020.396521] copy_net_ns+0x31c/0x760 [ 3020.397046] create_new_namespaces+0x3f6/0xb30 [ 3020.397678] copy_namespaces+0x3b7/0x4a0 [ 3020.398231] copy_process+0x29e3/0x7220 [ 3020.398756] ? lock_is_held_type+0xdb/0x130 [ 3020.399322] ? find_held_lock+0x2c/0x110 [ 3020.399869] ? __pfx_copy_process+0x10/0x10 [ 3020.400450] ? _copy_from_user+0x169/0x1f0 [ 3020.401055] kernel_clone+0xeb/0x950 [ 3020.401554] ? lock_is_held_type+0xdb/0x130 [ 3020.402131] ? __pfx_kernel_clone+0x10/0x10 [ 3020.402719] ? lock_is_held_type+0xdb/0x130 [ 3020.403310] __do_sys_clone3+0x1d9/0x370 [ 3020.403849] ? __pfx___do_sys_clone3+0x10/0x10 [ 3020.404451] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3020.405150] ? fput+0x2f/0x1a0 [ 3020.405602] ? syscall_enter_from_user_mode+0x21/0x50 [ 3020.406283] ? syscall_enter_from_user_mode+0x21/0x50 [ 3020.406968] do_syscall_64+0x3f/0x90 [ 3020.407509] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3020.408184] RIP: 0033:0x7fbd5db53b19 [ 3020.408672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3020.410967] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3020.411952] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3020.412856] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3020.413775] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3020.414670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3020.415580] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3020.416505] [ 3020.435422] loop2: detected capacity change from 0 to 256 [ 3020.438537] loop5: detected capacity change from 0 to 256 09:00:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) [ 3020.454761] isofs_fill_super: get root inode failed [ 3020.455356] isofs_fill_super: get root inode failed 09:00:10 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 45) 09:00:10 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:10 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5a000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:10 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3020.545133] loop3: detected capacity change from 0 to 136 [ 3020.545732] FAULT_INJECTION: forcing a failure. [ 3020.545732] name failslab, interval 1, probability 0, space 0, times 0 [ 3020.546589] CPU: 0 PID: 12139 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3020.547153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3020.547703] Call Trace: [ 3020.547713] loop6: detected capacity change from 0 to 256 [ 3020.547878] [ 3020.547888] dump_stack_lvl+0x8f/0xb7 [ 3020.548711] should_fail_ex.cold+0x5/0xa [ 3020.549028] should_failslab+0x9/0x20 [ 3020.549302] kmem_cache_alloc_lru+0x6b/0x760 [ 3020.549634] ? __d_alloc+0x31/0x9c0 [ 3020.549914] __d_alloc+0x31/0x9c0 [ 3020.550177] d_alloc+0x4a/0x1d0 [ 3020.550440] __lookup_hash+0xcc/0x190 [ 3020.550713] filename_create+0x1d6/0x4a0 [ 3020.551005] ? __pfx_filename_create+0x10/0x10 [ 3020.551330] ? __pfx_lock_release+0x10/0x10 [ 3020.551660] ? __virt_addr_valid+0x102/0x340 [ 3020.551969] do_mkdirat+0x96/0x2d0 [ 3020.552237] ? __pfx_do_mkdirat+0x10/0x10 [ 3020.552545] ? getname_flags.part.0+0x1dd/0x4f0 [ 3020.552892] __x64_sys_mkdir+0xf6/0x150 [ 3020.553179] do_syscall_64+0x3f/0x90 [ 3020.553478] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3020.553848] RIP: 0033:0x7ff782649c27 [ 3020.554109] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3020.555294] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3020.555815] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3020.556288] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3020.556768] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3020.557273] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3020.557752] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3020.558246] [ 3020.562765] loop2: detected capacity change from 0 to 256 [ 3020.571537] loop5: detected capacity change from 0 to 256 [ 3020.577257] isofs_fill_super: get root inode failed [ 3020.579053] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 09:00:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) [ 3020.599040] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:00:10 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 09:00:10 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x66000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:10 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3020.695403] loop5: detected capacity change from 0 to 256 [ 3020.697856] FAULT_INJECTION: forcing a failure. [ 3020.697856] name failslab, interval 1, probability 0, space 0, times 0 [ 3020.698631] CPU: 1 PID: 12152 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3020.699177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3020.699712] Call Trace: [ 3020.699890] [ 3020.700050] dump_stack_lvl+0x8f/0xb7 [ 3020.700330] should_fail_ex.cold+0x5/0xa [ 3020.700616] ? nf_log_net_init+0xa0/0x370 [ 3020.700913] should_failslab+0x9/0x20 [ 3020.701186] __kmem_cache_alloc_node+0x5b/0x400 [ 3020.701504] ? nf_log_net_init+0xa0/0x370 [ 3020.701791] ? proc_create_net_data+0x151/0x1c0 [ 3020.702123] ? __pfx_nf_log_net_init+0x10/0x10 [ 3020.702435] ? nf_log_net_init+0xa0/0x370 [ 3020.702715] __kmalloc_node_track_caller+0x43/0xb0 [ 3020.703053] ? __pfx_nf_log_net_init+0x10/0x10 [ 3020.703364] kmemdup+0x2c/0x60 [ 3020.703602] nf_log_net_init+0xa0/0x370 [ 3020.703871] ? __pfx_nf_log_net_init+0x10/0x10 [ 3020.704181] ops_init+0xbb/0x680 [ 3020.704434] setup_net+0x40c/0x9d0 [ 3020.704678] ? down_read_killable+0x1af/0x4a0 [ 3020.705032] ? __pfx_setup_net+0x10/0x10 [ 3020.705312] copy_net_ns+0x31c/0x760 [ 3020.705578] create_new_namespaces+0x3f6/0xb30 [ 3020.705911] copy_namespaces+0x3b7/0x4a0 [ 3020.706199] copy_process+0x29e3/0x7220 [ 3020.706476] ? lock_is_held_type+0xdb/0x130 [ 3020.706773] ? find_held_lock+0x2c/0x110 [ 3020.707072] ? __pfx_copy_process+0x10/0x10 [ 3020.707375] ? _copy_from_user+0x169/0x1f0 [ 3020.707680] kernel_clone+0xeb/0x950 [ 3020.707942] ? lock_is_held_type+0xdb/0x130 [ 3020.708232] ? __pfx_kernel_clone+0x10/0x10 [ 3020.708535] ? lock_is_held_type+0xdb/0x130 [ 3020.708836] __do_sys_clone3+0x1d9/0x370 [ 3020.709119] ? __pfx___do_sys_clone3+0x10/0x10 [ 3020.709418] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3020.709780] ? fput+0x2f/0x1a0 [ 3020.710007] ? syscall_enter_from_user_mode+0x21/0x50 [ 3020.710359] ? syscall_enter_from_user_mode+0x21/0x50 [ 3020.710705] do_syscall_64+0x3f/0x90 [ 3020.710977] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3020.711321] RIP: 0033:0x7fbd5db53b19 [ 3020.711579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3020.712669] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3020.713147] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3020.713595] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3020.714040] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3020.714484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3020.714923] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3020.715385] [ 3020.725675] isofs_fill_super: get root inode failed 09:00:26 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:00:26 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) 09:00:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 46) 09:00:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="94e596ea777ea8624bb0f34c6b39394ca0f03c880b157c2ff4aba445889373e814f873788a516cf61f3da1f1ac0cb2eebc272ab43dde972ab5d2cdcb685a27d3cfc6bec09e32c8ce77a3ee4db30db25cc2a4d027c401d10ff8503fa15b035920d758aded9921c00ef1085fd0c06fd0defce70627f02f0cb0c925c0dcc0e303f081a9083aceedae1709d127ce", 0x8c, r1) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) keyctl$link(0x8, r2, r0) 09:00:26 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80040000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:26 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3036.928288] loop2: detected capacity change from 0 to 256 [ 3036.933177] loop3: detected capacity change from 0 to 136 [ 3036.936202] loop6: detected capacity change from 0 to 256 [ 3036.940778] FAULT_INJECTION: forcing a failure. [ 3036.940778] name failslab, interval 1, probability 0, space 0, times 0 [ 3036.941921] CPU: 1 PID: 12171 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3036.942614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3036.943370] Call Trace: [ 3036.943629] [ 3036.943858] dump_stack_lvl+0x8f/0xb7 [ 3036.944237] should_fail_ex.cold+0x5/0xa [ 3036.944589] loop5: detected capacity change from 0 to 256 [ 3036.945106] ? security_inode_alloc+0x38/0x160 [ 3036.945552] should_failslab+0x9/0x20 [ 3036.945886] kmem_cache_alloc+0x5a/0x410 [ 3036.946227] security_inode_alloc+0x38/0x160 [ 3036.946666] inode_init_always+0xbb2/0xea0 [ 3036.947072] alloc_inode+0x84/0x240 [ 3036.947422] new_inode+0x25/0x1f0 [ 3036.947765] __ext4_new_inode+0x32f/0x55f0 [ 3036.948144] ? __pfx_avc_has_perm_noaudit+0x10/0x10 [ 3036.948617] ? __pfx___ext4_new_inode+0x10/0x10 [ 3036.949089] ? selinux_determine_inode_label+0x1b6/0x350 [ 3036.949582] ext4_mkdir+0x33e/0xb20 [ 3036.949916] ? __pfx_ext4_mkdir+0x10/0x10 [ 3036.950312] vfs_mkdir+0x495/0x740 [ 3036.950646] do_mkdirat+0x16e/0x2d0 [ 3036.950978] ? __pfx_do_mkdirat+0x10/0x10 [ 3036.951369] ? getname_flags.part.0+0x1dd/0x4f0 [ 3036.951793] __x64_sys_mkdir+0xf6/0x150 [ 3036.952151] do_syscall_64+0x3f/0x90 [ 3036.952498] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3036.952913] RIP: 0033:0x7ff782649c27 [ 3036.953237] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3036.954731] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3036.955376] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3036.955929] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3036.956475] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3036.957051] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3036.957607] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3036.958207] [ 3036.963160] isofs_fill_super: get root inode failed [ 3036.994430] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3036.998842] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 09:00:26 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x81000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:26 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3037.177814] loop5: detected capacity change from 0 to 256 [ 3037.185500] isofs_fill_super: get root inode failed 09:00:42 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:00:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) keyctl$KEYCTL_MOVE(0x1e, r0, r2, r1, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="ac41026fb8d378a8def23877bee942f4d1e0a9584232af1b792e00a6780a1fb7a644f4e1d9159895f980b3c1745d1ffaf478a141ca22c63ee187f459fa6be5bd827dbc6a13731f795b1e663ac2fd2b8246a5924d299d55ad6d0d2036ddcb086437289547", 0x64, r1) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r0) 09:00:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 47) 09:00:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:42 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) 09:00:42 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3053.072970] loop5: detected capacity change from 0 to 256 [ 3053.094660] loop6: detected capacity change from 0 to 256 [ 3053.094906] loop2: detected capacity change from 0 to 256 [ 3053.099865] loop3: detected capacity change from 0 to 136 [ 3053.106703] isofs_fill_super: get root inode failed [ 3053.166507] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:00:42 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x92020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 48) 09:00:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:42 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3053.311261] loop6: detected capacity change from 0 to 256 [ 3053.319005] loop3: detected capacity change from 0 to 136 [ 3053.324614] FAULT_INJECTION: forcing a failure. [ 3053.324614] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.325685] CPU: 0 PID: 12213 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3053.326362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.327016] Call Trace: [ 3053.327292] [ 3053.327521] dump_stack_lvl+0x8f/0xb7 [ 3053.327865] should_fail_ex.cold+0x5/0xa [ 3053.328238] ? jbd2__journal_start+0x194/0x8d0 [ 3053.328666] should_failslab+0x9/0x20 [ 3053.329030] kmem_cache_alloc+0x5a/0x410 [ 3053.329459] ? lock_is_held_type+0xdb/0x130 [ 3053.329854] jbd2__journal_start+0x194/0x8d0 [ 3053.330269] __ext4_journal_start_sb+0x395/0x470 [ 3053.330714] __ext4_new_inode+0x2f34/0x55f0 [ 3053.331154] ? __pfx___ext4_new_inode+0x10/0x10 [ 3053.331592] ? selinux_determine_inode_label+0x1b6/0x350 [ 3053.332078] ext4_mkdir+0x33e/0xb20 [ 3053.332435] ? __pfx_ext4_mkdir+0x10/0x10 [ 3053.332838] vfs_mkdir+0x495/0x740 [ 3053.333175] do_mkdirat+0x16e/0x2d0 [ 3053.333565] ? __pfx_do_mkdirat+0x10/0x10 [ 3053.333935] ? getname_flags.part.0+0x1dd/0x4f0 [ 3053.334356] __x64_sys_mkdir+0xf6/0x150 [ 3053.334743] do_syscall_64+0x3f/0x90 [ 3053.335103] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3053.335566] RIP: 0033:0x7ff782649c27 [ 3053.335891] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.337372] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3053.337998] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3053.338586] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3053.339177] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3053.339798] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3053.340411] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3053.341013] [ 3053.341965] EXT4-fs error (device sda) in __ext4_new_inode:1084: Out of memory [ 3053.351572] loop5: detected capacity change from 0 to 256 [ 3053.357866] isofs_fill_super: get root inode failed 09:00:42 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 09:00:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3053.375102] loop2: detected capacity change from 0 to 256 [ 3053.391177] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3053.401783] FAULT_INJECTION: forcing a failure. [ 3053.401783] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.402914] CPU: 0 PID: 12219 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3053.403715] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.404511] Call Trace: [ 3053.404734] [ 3053.404935] dump_stack_lvl+0x8f/0xb7 [ 3053.405387] should_fail_ex.cold+0x5/0xa [ 3053.405774] should_failslab+0x9/0x20 [ 3053.406124] __kmem_cache_alloc_node+0x5b/0x400 [ 3053.406600] ? __register_sysctl_table+0x9f3/0x1150 [ 3053.407044] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3053.407475] ? __register_sysctl_table+0x9f3/0x1150 [ 3053.407924] __kmalloc+0x46/0xc0 [ 3053.408285] __register_sysctl_table+0x9f3/0x1150 [ 3053.408738] ? __pfx___register_sysctl_table+0x10/0x10 [ 3053.409258] ? is_module_address+0x8c/0xc0 [ 3053.409665] ? register_net_sysctl+0x219/0x2c0 [ 3053.410067] nf_log_net_init+0x105/0x370 [ 3053.410468] ? __pfx_nf_log_net_init+0x10/0x10 [ 3053.410921] ops_init+0xbb/0x680 [ 3053.411242] setup_net+0x40c/0x9d0 [ 3053.411579] ? down_read_killable+0x1af/0x4a0 [ 3053.411994] ? __pfx_setup_net+0x10/0x10 [ 3053.412407] copy_net_ns+0x31c/0x760 [ 3053.412818] create_new_namespaces+0x3f6/0xb30 [ 3053.413323] copy_namespaces+0x3b7/0x4a0 [ 3053.413737] copy_process+0x29e3/0x7220 [ 3053.414094] ? lock_is_held_type+0xdb/0x130 [ 3053.414533] ? __pfx_copy_process+0x10/0x10 [ 3053.414942] ? copy_clone_args_from_user+0x2fe/0x790 [ 3053.415453] kernel_clone+0xeb/0x950 [ 3053.415810] ? lock_is_held_type+0xdb/0x130 [ 3053.416213] ? __pfx_kernel_clone+0x10/0x10 [ 3053.416626] ? lock_is_held_type+0xdb/0x130 [ 3053.417028] __do_sys_clone3+0x1d9/0x370 [ 3053.417499] ? __pfx___do_sys_clone3+0x10/0x10 [ 3053.417921] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3053.418394] ? fput+0x2f/0x1a0 [ 3053.418705] ? syscall_enter_from_user_mode+0x21/0x50 [ 3053.419162] ? syscall_enter_from_user_mode+0x21/0x50 [ 3053.419639] do_syscall_64+0x3f/0x90 [ 3053.419992] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3053.420485] RIP: 0033:0x7fbd5db53b19 [ 3053.420831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.422434] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3053.423088] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3053.423761] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3053.424436] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.425033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.425676] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3053.426310] [ 3053.426629] sysctl could not get directory: /net/netfilter -12 [ 3053.428011] CPU: 0 PID: 12219 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3053.428709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.429421] Call Trace: [ 3053.429650] [ 3053.429869] dump_stack_lvl+0x8f/0xb7 [ 3053.430227] __register_sysctl_table+0xdf7/0x1150 [ 3053.430688] ? __pfx___register_sysctl_table+0x10/0x10 [ 3053.431156] ? is_module_address+0x8c/0xc0 [ 3053.431603] ? register_net_sysctl+0x219/0x2c0 [ 3053.432025] nf_log_net_init+0x105/0x370 [ 3053.432388] ? __pfx_nf_log_net_init+0x10/0x10 [ 3053.432791] ops_init+0xbb/0x680 [ 3053.433119] setup_net+0x40c/0x9d0 [ 3053.433494] ? down_read_killable+0x1af/0x4a0 [ 3053.433916] ? __pfx_setup_net+0x10/0x10 [ 3053.434311] copy_net_ns+0x31c/0x760 [ 3053.434670] create_new_namespaces+0x3f6/0xb30 [ 3053.435098] copy_namespaces+0x3b7/0x4a0 [ 3053.435514] copy_process+0x29e3/0x7220 [ 3053.435872] ? lock_is_held_type+0xdb/0x130 [ 3053.436254] ? __pfx_copy_process+0x10/0x10 [ 3053.436628] ? copy_clone_args_from_user+0x2fe/0x790 [ 3053.437092] kernel_clone+0xeb/0x950 [ 3053.437448] ? lock_is_held_type+0xdb/0x130 [ 3053.437822] ? __pfx_kernel_clone+0x10/0x10 [ 3053.438199] ? lock_is_held_type+0xdb/0x130 [ 3053.438613] __do_sys_clone3+0x1d9/0x370 [ 3053.438960] ? __pfx___do_sys_clone3+0x10/0x10 [ 3053.439325] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3053.439799] ? fput+0x2f/0x1a0 [ 3053.440100] ? syscall_enter_from_user_mode+0x21/0x50 [ 3053.440566] ? syscall_enter_from_user_mode+0x21/0x50 [ 3053.441053] do_syscall_64+0x3f/0x90 [ 3053.441440] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3053.441881] RIP: 0033:0x7fbd5db53b19 [ 3053.442167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.443537] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3053.444120] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3053.444705] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3053.445300] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3053.445842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3053.446392] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3053.447031] 09:00:43 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:43 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3053.559280] loop6: detected capacity change from 0 to 256 09:00:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x6}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:00:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 49) 09:00:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x61, 0x62, 0x32, 0x31, 0x63, 0x36, 0x36, 0x37, 0x62, 0x34, 0x36, 0x66, 0x32, 0x33, 0x37, 0x33]}, &(0x7f0000000240)={0x0, "d0c693f055b06e35defd6001304cee1400c206ad57abdec3ec12e9cb662f998ba007bb73049d7cba27570e2ef29132a719a03cd05b0854cb9a49ae5c4dbb1eec", 0x38}, 0x48, r0) keyctl$invalidate(0x15, r2) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r3) keyctl$invalidate(0x15, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r3, r2, r4, 0x1) keyctl$link(0x8, 0x0, r0) 09:00:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) [ 3069.786022] FAULT_INJECTION: forcing a failure. [ 3069.786022] name failslab, interval 1, probability 0, space 0, times 0 [ 3069.787269] CPU: 1 PID: 12239 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3069.787828] loop2: detected capacity change from 0 to 256 [ 3069.787971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3069.789181] Call Trace: [ 3069.789427] [ 3069.789684] dump_stack_lvl+0x8f/0xb7 [ 3069.790033] should_fail_ex.cold+0x5/0xa [ 3069.790407] loop6: detected capacity change from 0 to 256 [ 3069.790410] should_failslab+0x9/0x20 [ 3069.791274] __kmem_cache_alloc_node+0x5b/0x400 [ 3069.791701] ? __register_sysctl_table+0x9f3/0x1150 [ 3069.792162] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 3069.792603] ? __register_sysctl_table+0x9f3/0x1150 [ 3069.792719] loop5: detected capacity change from 0 to 256 [ 3069.793059] __kmalloc+0x46/0xc0 [ 3069.793876] __register_sysctl_table+0x9f3/0x1150 [ 3069.794376] ? __pfx___register_sysctl_table+0x10/0x10 [ 3069.794836] ? is_module_address+0x8c/0xc0 [ 3069.795233] ? register_net_sysctl+0x219/0x2c0 [ 3069.795671] nf_log_net_init+0x105/0x370 [ 3069.796027] ? __pfx_nf_log_net_init+0x10/0x10 [ 3069.796437] ops_init+0xbb/0x680 [ 3069.796784] setup_net+0x40c/0x9d0 [ 3069.797132] ? down_read_killable+0x1af/0x4a0 [ 3069.797567] ? __pfx_setup_net+0x10/0x10 [ 3069.797979] copy_net_ns+0x31c/0x760 [ 3069.798344] create_new_namespaces+0x3f6/0xb30 [ 3069.798749] copy_namespaces+0x3b7/0x4a0 [ 3069.799115] copy_process+0x29e3/0x7220 [ 3069.799506] ? lock_is_held_type+0xdb/0x130 [ 3069.799883] ? find_held_lock+0x2c/0x110 [ 3069.800273] ? __pfx_copy_process+0x10/0x10 [ 3069.800695] ? _copy_from_user+0x169/0x1f0 [ 3069.801077] kernel_clone+0xeb/0x950 [ 3069.801107] ? lock_is_held_type+0xdb/0x130 [ 3069.801872] ? __pfx_kernel_clone+0x10/0x10 [ 3069.802301] ? lock_is_held_type+0xdb/0x130 [ 3069.802713] __do_sys_clone3+0x1d9/0x370 [ 3069.803087] ? __pfx___do_sys_clone3+0x10/0x10 [ 3069.803537] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3069.804012] ? fput+0x2f/0x1a0 [ 3069.804326] ? syscall_enter_from_user_mode+0x21/0x50 [ 3069.804788] ? syscall_enter_from_user_mode+0x21/0x50 [ 3069.805245] do_syscall_64+0x3f/0x90 [ 3069.805633] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3069.806070] RIP: 0033:0x7fbd5db53b19 [ 3069.806412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3069.807947] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3069.808597] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3069.809211] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3069.809835] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3069.810426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3069.810997] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3069.811647] [ 3069.811991] sysctl could not get directory: /net/netfilter/nf_log -12 [ 3069.812790] CPU: 1 PID: 12239 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3069.813502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3069.814165] Call Trace: [ 3069.814391] [ 3069.814598] dump_stack_lvl+0x8f/0xb7 [ 3069.814942] __register_sysctl_table+0xdf7/0x1150 [ 3069.815398] ? __pfx___register_sysctl_table+0x10/0x10 [ 3069.815863] ? is_module_address+0x8c/0xc0 [ 3069.816252] ? register_net_sysctl+0x219/0x2c0 [ 3069.816698] nf_log_net_init+0x105/0x370 [ 3069.817068] ? __pfx_nf_log_net_init+0x10/0x10 [ 3069.817477] ops_init+0xbb/0x680 [ 3069.817553] isofs_fill_super: get root inode failed [ 3069.817786] setup_net+0x40c/0x9d0 [ 3069.818585] ? down_read_killable+0x1af/0x4a0 [ 3069.819000] ? __pfx_setup_net+0x10/0x10 [ 3069.819409] copy_net_ns+0x31c/0x760 [ 3069.819763] create_new_namespaces+0x3f6/0xb30 [ 3069.820177] copy_namespaces+0x3b7/0x4a0 [ 3069.820582] copy_process+0x29e3/0x7220 [ 3069.820934] ? lock_is_held_type+0xdb/0x130 [ 3069.821332] ? find_held_lock+0x2c/0x110 [ 3069.821756] ? __pfx_copy_process+0x10/0x10 [ 3069.822147] ? _copy_from_user+0x169/0x1f0 [ 3069.822548] kernel_clone+0xeb/0x950 [ 3069.822899] ? lock_is_held_type+0xdb/0x130 [ 3069.823294] ? __pfx_kernel_clone+0x10/0x10 [ 3069.823676] ? lock_is_held_type+0xdb/0x130 [ 3069.824086] __do_sys_clone3+0x1d9/0x370 [ 3069.824446] ? __pfx___do_sys_clone3+0x10/0x10 [ 3069.824835] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3069.825273] ? fput+0x2f/0x1a0 [ 3069.825589] ? syscall_enter_from_user_mode+0x21/0x50 [ 3069.826024] ? syscall_enter_from_user_mode+0x21/0x50 [ 3069.826488] do_syscall_64+0x3f/0x90 [ 3069.826826] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3069.827291] RIP: 0033:0x7fbd5db53b19 [ 3069.827604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3069.828566] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3069.829019] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3069.830287] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3069.830907] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3069.831527] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3069.832126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3069.832789] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3069.833384] [ 3069.834829] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3069.840897] loop3: detected capacity change from 0 to 136 [ 3069.844058] FAULT_INJECTION: forcing a failure. [ 3069.844058] name failslab, interval 1, probability 0, space 0, times 0 [ 3069.845146] CPU: 1 PID: 12242 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3069.845891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3069.846612] Call Trace: [ 3069.846840] [ 3069.847041] dump_stack_lvl+0x8f/0xb7 [ 3069.847450] should_fail_ex.cold+0x5/0xa [ 3069.847834] ? jbd2__journal_start+0x194/0x8d0 [ 3069.848247] should_failslab+0x9/0x20 [ 3069.848601] kmem_cache_alloc+0x5a/0x410 [ 3069.848978] ? lock_is_held_type+0xdb/0x130 [ 3069.849410] jbd2__journal_start+0x194/0x8d0 [ 3069.849843] __ext4_journal_start_sb+0x395/0x470 [ 3069.850319] __ext4_new_inode+0x2f34/0x55f0 [ 3069.850764] ? __pfx___ext4_new_inode+0x10/0x10 [ 3069.851216] ? selinux_determine_inode_label+0x1b6/0x350 [ 3069.851766] ext4_mkdir+0x33e/0xb20 [ 3069.852108] ? __pfx_ext4_mkdir+0x10/0x10 [ 3069.852498] vfs_mkdir+0x495/0x740 [ 3069.852836] do_mkdirat+0x16e/0x2d0 [ 3069.853181] ? __pfx_do_mkdirat+0x10/0x10 [ 3069.853619] ? getname_flags.part.0+0x1dd/0x4f0 [ 3069.854054] __x64_sys_mkdir+0xf6/0x150 [ 3069.854459] do_syscall_64+0x3f/0x90 [ 3069.854835] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3069.855284] RIP: 0033:0x7ff782649c27 [ 3069.855660] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3069.857150] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3069.857852] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3069.858443] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3069.859045] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3069.859695] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3069.860312] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3069.860991] [ 3069.861578] EXT4-fs error (device sda) in __ext4_new_inode:1084: Out of memory [ 3069.862432] isofs_fill_super: get root inode failed 09:00:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 50) 09:00:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {0x0, 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 0: r0 = getpid() sched_getparam(r0, &(0x7f0000000080)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000240)=r0) r1 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='syz', 0xfffffffffffffffc) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)={0x3, 0x0, @a}, 0x48, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, 0x0, r3) [ 3070.025096] loop5: detected capacity change from 0 to 256 [ 3070.046105] isofs_fill_super: get root inode failed [ 3070.054993] loop2: detected capacity change from 0 to 256 [ 3070.055622] loop3: detected capacity change from 0 to 136 [ 3070.056737] FAULT_INJECTION: forcing a failure. [ 3070.056737] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.058455] CPU: 1 PID: 12257 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3070.059188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3070.059843] Call Trace: [ 3070.060060] [ 3070.060260] dump_stack_lvl+0x8f/0xb7 [ 3070.060606] should_fail_ex.cold+0x5/0xa [ 3070.060976] ? lock_acquire+0x1b6/0x530 [ 3070.061345] ? sidtab_sid2str_get+0x180/0x650 [ 3070.061821] should_failslab+0x9/0x20 [ 3070.061973] loop6: detected capacity change from 0 to 256 [ 3070.062161] __kmem_cache_alloc_node+0x5b/0x400 [ 3070.063080] ? sidtab_sid2str_get+0x180/0x650 [ 3070.063502] ? sidtab_sid2str_get+0x180/0x650 [ 3070.063927] __kmalloc_node_track_caller+0x43/0xb0 [ 3070.064393] kmemdup+0x2c/0x60 [ 3070.064708] sidtab_sid2str_get+0x180/0x650 [ 3070.065108] sidtab_entry_to_string+0x33/0x110 [ 3070.065529] security_sid_to_context_core+0x33b/0x570 [ 3070.065983] selinux_inode_init_security+0x4c6/0x6b0 [ 3070.066443] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 3070.066974] ? __pfx_get_cached_acl+0x10/0x10 [ 3070.067389] ? lock_release+0x3b6/0x750 [ 3070.067755] ? get_random_u32+0x3c1/0x6e0 [ 3070.068165] security_inode_init_security+0x155/0x360 [ 3070.068626] ? __pfx_ext4_initxattrs+0x10/0x10 [ 3070.069038] ? __pfx_security_inode_init_security+0x10/0x10 [ 3070.069594] ? chksum_update+0x50/0xb0 [ 3070.069956] __ext4_new_inode+0x39a5/0x55f0 [ 3070.070387] ? __pfx___ext4_new_inode+0x10/0x10 [ 3070.070875] ext4_mkdir+0x33e/0xb20 [ 3070.071234] ? __pfx_ext4_mkdir+0x10/0x10 [ 3070.071600] vfs_mkdir+0x495/0x740 [ 3070.071909] do_mkdirat+0x16e/0x2d0 [ 3070.072236] ? __pfx_do_mkdirat+0x10/0x10 [ 3070.072593] ? getname_flags.part.0+0x1dd/0x4f0 [ 3070.072989] __x64_sys_mkdir+0xf6/0x150 [ 3070.073324] do_syscall_64+0x3f/0x90 [ 3070.073683] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3070.074121] RIP: 0033:0x7ff782649c27 [ 3070.074426] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3070.075968] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3070.076609] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3070.077183] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3070.077202] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3070.078433] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3070.079006] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3070.079622] [ 3070.097077] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:00:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:00:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 09:00:59 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:00:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:00:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3070.238865] loop5: detected capacity change from 0 to 256 [ 3070.277405] isofs_fill_super: get root inode failed [ 3070.306479] loop6: detected capacity change from 0 to 256 [ 3070.311606] loop2: detected capacity change from 0 to 256 [ 3070.377484] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:01:15 executing program 0: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/6, 0x6) 09:01:15 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:01:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 51) 09:01:15 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffff000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:15 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:15 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) [ 3086.324228] loop5: detected capacity change from 0 to 256 [ 3086.326108] loop3: detected capacity change from 0 to 136 [ 3086.329168] loop6: detected capacity change from 0 to 256 [ 3086.330986] loop2: detected capacity change from 0 to 256 [ 3086.343903] isofs_fill_super: get root inode failed [ 3086.378296] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:01:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:16 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:16 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 52) 09:01:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600), 0x0, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3086.520408] loop5: detected capacity change from 0 to 256 [ 3086.532897] loop3: detected capacity change from 0 to 136 [ 3086.534575] loop6: detected capacity change from 0 to 256 [ 3086.534741] isofs_fill_super: get root inode failed [ 3086.574560] loop2: detected capacity change from 0 to 256 [ 3086.577480] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 09:01:16 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) 09:01:16 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:16 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="760fe3e6ee73db5f102b1f829795e5743a20f6fc66dd5b9082d1342edcdce09b72ece4d725b2e978804d3cdee7dc38441e4825e72667764b0c1dacb307829c0c2bd7d7810be8f16f1a5513318d6b0eea3f399dfb281ce397c85b823b8d38e4ce", 0x60, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000640), &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, r3, 0x1) keyctl$chown(0x4, r2, 0xee00, 0xee01) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc1}, &(0x7f00000004c0)={0x0, "65c2e80bf65d8b553d07cff5c5def97d24203ac1b040b7bd646faf36f72ed160125375e673bb482387ff17a24c273d108afe17e32f3ecd7d5e3115e4573321ba", 0x1d}, 0x48, 0xfffffffffffffffe) r4 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f00000001c0)={0x0, "83f2b6ada00a5da9e315ff4dc53a3a185843c070c53a8e0890b547e0e8fa5a788d27605024b0294cf3e070a519ed73b72f390f51a329b680a2335e40a8f8cc8d", 0x32}, 0x48, r0) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "ae543248713057a161ff407b3ad5af82e5fb5fb5df261cb57dbe5c0bdf0fe4db1fb0eaba0eba70460b613a710d09ffdf19adacd356bd2cd0ddb96e8aef2164b0", 0x30}, 0x48, 0xfffffffffffffffb) keyctl$invalidate(0x15, r5) keyctl$invalidate(0x15, r5) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$invalidate(0x15, r6) keyctl$KEYCTL_MOVE(0x1e, r1, r5, r6, 0x0) keyctl$link(0x8, r1, r4) 09:01:16 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3086.697702] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3086.731850] loop5: detected capacity change from 0 to 256 [ 3086.744978] isofs_fill_super: get root inode failed 09:01:31 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) 09:01:31 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:31 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 53) 09:01:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:31 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:01:31 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='key\x80\xc7Z\xb4&\"\xad\xee?t\xae\x89\xb3\n\x00\x00\x00\x00\x00\x00\x8e\x14\x98\xe0\x8a\xe6\x14\xcdu$\x84\x8c,\xa3', r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$link(0x8, 0x0, r0) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r4, r3, r1, 0x0) r5 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="7a1f2819461c4de29c806c4c2fab0c374e8d6118f927e9a0a1925a0e3ae18fb4483ebfb100d144d44b8bc8b76ad30e567c67b5ad7265f4b8d86e0a83b51f233e3e86dc9ee85e48ef0e65001b553bd7b5358201705ba70ed65385b0396771fd355b30b98aa3f715331fd3704df713e837ac351559b5d9faa6c02c7b296a22dfd67e7738126735fb86ca87ac1c7dcb9277cd82650ae7cf8c55709589723547cb749ab0de06555191b4833a89114adac2944cee68281acd9448e5fb87da852d376793694384f4", 0xc5, r5) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r0) 09:01:31 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:31 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3102.278969] loop2: detected capacity change from 0 to 256 [ 3102.286162] loop5: detected capacity change from 0 to 256 [ 3102.291441] loop3: detected capacity change from 0 to 136 [ 3102.295257] FAULT_INJECTION: forcing a failure. [ 3102.295257] name failslab, interval 1, probability 0, space 0, times 0 [ 3102.296445] CPU: 1 PID: 12340 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3102.297126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3102.297799] Call Trace: [ 3102.298070] [ 3102.298285] dump_stack_lvl+0x8f/0xb7 [ 3102.298661] should_fail_ex.cold+0x5/0xa [ 3102.299030] ? __proc_create+0x2b3/0x8b0 [ 3102.299384] should_failslab+0x9/0x20 [ 3102.299703] kmem_cache_alloc+0x5a/0x410 [ 3102.300053] __proc_create+0x2b3/0x8b0 [ 3102.300395] ? __pfx___proc_create+0x10/0x10 [ 3102.300440] ? _raw_spin_unlock_irqrestore+0x2c/0x60 [ 3102.301318] proc_create_reg+0xb6/0x180 [ 3102.301730] proc_create_net_data+0x90/0x1c0 [ 3102.302178] ? __pfx_proc_create_net_data+0x10/0x10 [ 3102.302651] ? __pfx_netlink_net_init+0x10/0x10 [ 3102.303053] netlink_net_init+0x52/0x80 [ 3102.303402] ops_init+0xbb/0x680 [ 3102.303761] setup_net+0x40c/0x9d0 [ 3102.304071] ? down_read_killable+0x1af/0x4a0 [ 3102.304473] ? __pfx_setup_net+0x10/0x10 [ 3102.304838] copy_net_ns+0x31c/0x760 [ 3102.305179] create_new_namespaces+0x3f6/0xb30 [ 3102.305602] copy_namespaces+0x3b7/0x4a0 [ 3102.305977] copy_process+0x29e3/0x7220 [ 3102.306321] ? lock_is_held_type+0xdb/0x130 [ 3102.306702] ? find_held_lock+0x2c/0x110 [ 3102.306816] loop6: detected capacity change from 0 to 256 [ 3102.307125] ? __pfx_copy_process+0x10/0x10 [ 3102.307158] ? _copy_from_user+0x169/0x1f0 [ 3102.308380] kernel_clone+0xeb/0x950 [ 3102.308716] ? lock_is_held_type+0xdb/0x130 [ 3102.309087] ? __pfx_kernel_clone+0x10/0x10 [ 3102.309474] ? lock_is_held_type+0xdb/0x130 [ 3102.309863] __do_sys_clone3+0x1d9/0x370 [ 3102.310261] ? __pfx___do_sys_clone3+0x10/0x10 [ 3102.310645] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3102.311075] ? fput+0x2f/0x1a0 [ 3102.311354] ? syscall_enter_from_user_mode+0x21/0x50 [ 3102.311786] ? syscall_enter_from_user_mode+0x21/0x50 [ 3102.312205] do_syscall_64+0x3f/0x90 [ 3102.312522] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3102.312961] RIP: 0033:0x7fbd5db53b19 [ 3102.313275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3102.314801] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3102.315438] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3102.315997] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3102.316569] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3102.317109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3102.317708] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3102.318319] [ 3102.352525] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 3102.364485] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:01:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 54) 09:01:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) 09:01:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3102.477493] loop5: detected capacity change from 0 to 256 [ 3102.480636] loop2: detected capacity change from 0 to 256 09:01:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) [ 3102.529810] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3102.543390] loop3: detected capacity change from 0 to 136 [ 3102.553213] FAULT_INJECTION: forcing a failure. [ 3102.553213] name failslab, interval 1, probability 0, space 0, times 0 [ 3102.555083] CPU: 1 PID: 12358 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3102.555797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3102.556498] Call Trace: [ 3102.556737] [ 3102.556944] dump_stack_lvl+0x8f/0xb7 [ 3102.557305] should_fail_ex.cold+0x5/0xa [ 3102.557682] should_failslab+0x9/0x20 [ 3102.558060] __kmem_cache_alloc_node+0x5b/0x400 [ 3102.558479] ? ext4_find_extent+0xa41/0xd30 [ 3102.558867] ? __lock_acquire+0x164d/0x5e70 [ 3102.559292] ? ext4_find_extent+0xa41/0xd30 [ 3102.559693] __kmalloc+0x46/0xc0 [ 3102.560024] ext4_find_extent+0xa41/0xd30 [ 3102.560427] ext4_ext_map_blocks+0x1c7/0x5d40 [ 3102.560859] ? __pfx___lock_acquire+0x10/0x10 [ 3102.561279] ? perf_trace_lock+0xf0/0x560 [ 3102.561660] ? jbd2_journal_dirty_metadata+0x1bf/0xa10 [ 3102.562201] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3102.562662] ? lock_acquire+0x1b6/0x530 [ 3102.563027] ? __pfx_lock_acquire+0x10/0x10 [ 3102.563427] ? lock_is_held_type+0xdb/0x130 [ 3102.563840] ? down_read+0x1a0/0x450 [ 3102.564194] ? __pfx_down_read+0x10/0x10 [ 3102.564558] ? rcu_read_lock_sched_held+0x42/0x80 [ 3102.564973] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3102.565411] ext4_map_blocks+0xb15/0x19e0 [ 3102.565804] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3102.566257] ? __brelse+0x88/0xa0 [ 3102.566588] ? __ext4_new_inode+0x153/0x55f0 [ 3102.567010] ext4_append+0x1af/0x530 [ 3102.567379] ? __pfx_ext4_append+0x10/0x10 [ 3102.567778] ext4_init_new_dir+0x262/0x4c0 [ 3102.568181] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3102.568618] ext4_mkdir+0x3d3/0xb20 [ 3102.568975] ? __pfx_ext4_mkdir+0x10/0x10 [ 3102.569362] vfs_mkdir+0x495/0x740 [ 3102.569694] do_mkdirat+0x16e/0x2d0 [ 3102.570034] ? __pfx_do_mkdirat+0x10/0x10 [ 3102.570439] ? getname_flags.part.0+0x1dd/0x4f0 [ 3102.570880] __x64_sys_mkdir+0xf6/0x150 [ 3102.571248] do_syscall_64+0x3f/0x90 [ 3102.571614] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3102.572079] RIP: 0033:0x7ff782649c27 [ 3102.572425] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3102.573981] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3102.574635] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3102.575248] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3102.575517] loop6: detected capacity change from 0 to 256 [ 3102.575846] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3102.576984] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3102.577579] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3102.578243] 09:01:32 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3102.661274] isofs_fill_super: bread failed, dev=loop6, iso_blknum=64, block=128 [ 3102.677031] loop5: detected capacity change from 0 to 256 09:01:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052", 0x2e, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:01:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:32 executing program 0: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000000, 0x3010, 0xffffffffffffffff, 0xbd58d000) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/87, 0x57) add_key$keyring(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/198, 0xc6) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$read(0xb, r1, &(0x7f0000000280)=""/252, 0xfc) [ 3102.735589] loop2: detected capacity change from 0 to 256 [ 3102.789087] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:01:48 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 55) 09:01:48 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xc}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:01:48 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x483, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000480)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000d25000/0xb000)=nil, &(0x7f0000fd0000/0x1000)=nil, &(0x7f0000ccd000/0x3000)=nil, &(0x7f0000d13000/0x9000)=nil, &(0x7f0000d64000/0x3000)=nil, &(0x7f0000fe7000/0x4000)=nil, &(0x7f0000fb2000/0x3000)=nil, &(0x7f0000d55000/0x2000)=nil, &(0x7f0000d26000/0x1000)=nil, &(0x7f0000000400)="8da6a610ab91a837edfb0360c90b79026743aab9f443812dcf350486edf6c16a74a1021ed115bb337b81e279644a90f7f47094c5996fb4a12d29c9c6ed233c883c3445077f8cd0d7e47213b912d7ca372a3094270956209a6b5535b319c0a731b85a36fd65228d9804e32d", 0x6b, r0}, 0x68) ioctl$CDROM_NEXT_WRITABLE(r0, 0x5394, &(0x7f0000000000)) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) 09:01:48 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:01:48 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:01:48 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:01:48 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) 09:01:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3118.977639] loop6: detected capacity change from 0 to 256 [ 3118.981879] loop2: detected capacity change from 0 to 256 [ 3118.983891] loop5: detected capacity change from 0 to 256 [ 3118.990478] FAULT_INJECTION: forcing a failure. [ 3118.990478] name failslab, interval 1, probability 0, space 0, times 0 [ 3118.991501] CPU: 0 PID: 12392 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3118.992226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3118.992726] loop3: detected capacity change from 0 to 136 [ 3118.992913] Call Trace: [ 3118.992924] [ 3118.993939] dump_stack_lvl+0x8f/0xb7 [ 3118.994342] should_fail_ex.cold+0x5/0xa [ 3118.994740] should_failslab+0x9/0x20 [ 3118.995099] __kmem_cache_alloc_node+0x5b/0x400 [ 3118.995525] ? ops_init+0x247/0x680 [ 3118.995872] ? ops_init+0x247/0x680 [ 3118.996229] __kmalloc+0x46/0xc0 [ 3118.996536] ops_init+0x247/0x680 [ 3118.996863] setup_net+0x40c/0x9d0 [ 3118.997218] ? down_read_killable+0x1af/0x4a0 [ 3118.997653] ? __pfx_setup_net+0x10/0x10 [ 3118.998037] copy_net_ns+0x31c/0x760 [ 3118.998429] create_new_namespaces+0x3f6/0xb30 [ 3118.998866] copy_namespaces+0x3b7/0x4a0 [ 3118.999245] copy_process+0x29e3/0x7220 [ 3118.999605] ? lock_is_held_type+0xdb/0x130 [ 3119.000029] ? find_held_lock+0x2c/0x110 [ 3119.000426] ? __pfx_copy_process+0x10/0x10 [ 3119.000835] ? _copy_from_user+0x169/0x1f0 [ 3119.001229] kernel_clone+0xeb/0x950 [ 3119.001592] ? lock_is_held_type+0xdb/0x130 [ 3119.001987] ? __pfx_kernel_clone+0x10/0x10 [ 3119.002436] ? lock_is_held_type+0xdb/0x130 [ 3119.002842] __do_sys_clone3+0x1d9/0x370 [ 3119.003211] ? __pfx___do_sys_clone3+0x10/0x10 [ 3119.003660] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3119.004130] ? fput+0x2f/0x1a0 [ 3119.004430] ? syscall_enter_from_user_mode+0x21/0x50 [ 3119.004926] ? syscall_enter_from_user_mode+0x21/0x50 [ 3119.005390] do_syscall_64+0x3f/0x90 [ 3119.005732] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3119.006217] RIP: 0033:0x7fbd5db53b19 [ 3119.006536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3119.008019] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3119.008663] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3119.009245] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3119.009823] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3119.010502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3119.011101] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3119.011721] [ 3119.021623] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3119.071031] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:02:04 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:02:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:02:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x8, 0xfffff2ec}) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)={0x7, 0x6}) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) 09:02:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 56) 09:02:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) [ 3134.853522] loop2: detected capacity change from 0 to 256 [ 3134.853969] loop6: detected capacity change from 0 to 256 [ 3134.872841] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3134.875619] loop5: detected capacity change from 0 to 256 [ 3134.894751] loop3: detected capacity change from 0 to 136 [ 3134.899313] FAULT_INJECTION: forcing a failure. [ 3134.899313] name failslab, interval 1, probability 0, space 0, times 0 [ 3134.900963] CPU: 1 PID: 12423 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3134.901667] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3134.902387] Call Trace: [ 3134.902599] [ 3134.902800] dump_stack_lvl+0x8f/0xb7 [ 3134.903180] should_fail_ex.cold+0x5/0xa [ 3134.903560] should_failslab+0x9/0x20 [ 3134.903916] __kmem_cache_alloc_node+0x5b/0x400 [ 3134.904330] ? ext4_find_extent+0xa41/0xd30 [ 3134.904696] ? __pfx_perf_trace_lock+0x10/0x10 [ 3134.905123] ? ext4_find_extent+0xa41/0xd30 [ 3134.905517] __kmalloc+0x46/0xc0 [ 3134.905850] ext4_find_extent+0xa41/0xd30 [ 3134.906257] ext4_ext_map_blocks+0x1c7/0x5d40 [ 3134.906685] ? lockdep_hardirqs_on+0x7d/0x100 [ 3134.907081] ? __pfx___lock_acquire+0x10/0x10 [ 3134.907485] ? perf_trace_lock+0xf0/0x560 [ 3134.907865] ? lock_is_held_type+0xdb/0x130 [ 3134.908276] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3134.908718] ? lock_acquire+0x1b6/0x530 [ 3134.909089] ? __pfx_lock_acquire+0x10/0x10 [ 3134.909448] ? lock_release+0x3b6/0x750 [ 3134.909803] ? lock_is_held_type+0xdb/0x130 [ 3134.910195] ? down_write+0x157/0x220 [ 3134.910557] ? __pfx_down_write+0x10/0x10 [ 3134.911027] ext4_map_blocks+0x776/0x19e0 [ 3134.911398] ? __up_read+0x192/0x730 [ 3134.911734] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3134.912198] ? __pfx___up_read+0x10/0x10 [ 3134.912565] ? rcu_read_lock_sched_held+0x42/0x80 [ 3134.913037] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3134.913470] ext4_getblk+0x604/0x7b0 [ 3134.913797] ? __pfx_ext4_getblk+0x10/0x10 [ 3134.914223] ? __brelse+0x88/0xa0 [ 3134.914562] ? __ext4_new_inode+0x153/0x55f0 [ 3134.914962] ext4_bread+0x2e/0x1a0 [ 3134.915292] ext4_append+0x21d/0x530 [ 3134.915621] ? __pfx_ext4_append+0x10/0x10 [ 3134.916013] ext4_init_new_dir+0x262/0x4c0 [ 3134.916373] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3134.916785] ext4_mkdir+0x3d3/0xb20 [ 3134.917122] ? __pfx_ext4_mkdir+0x10/0x10 [ 3134.917487] vfs_mkdir+0x495/0x740 [ 3134.917792] do_mkdirat+0x16e/0x2d0 [ 3134.918121] ? __pfx_do_mkdirat+0x10/0x10 [ 3134.918500] ? getname_flags.part.0+0x1dd/0x4f0 [ 3134.918919] __x64_sys_mkdir+0xf6/0x150 [ 3134.919289] do_syscall_64+0x3f/0x90 [ 3134.919627] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3134.920053] RIP: 0033:0x7ff782649c27 [ 3134.920356] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3134.921757] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3134.922470] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3134.923059] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3134.923647] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3134.924264] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3134.925016] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3134.925742] [ 3134.939620] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:02:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000000540)=ANY=[@ANYBLOB="0200e0000000000061616161616161616161616161616161616161616161616161616161616161615841e82e31313131313131313131313131313131313131316e00de000000fecf598e6808098d6e5a0c3cb263784273e10334ab8b022d7e7db90cdd8f307f95ef335987cbf51e9da1547a3ce69b1b7336415c3faae25577b567ce0872334d262de4704561794ec2628392e1f8e5a0b01ed4e62236b17ab802c29c4e6ae65184dbac417f853648cc00c35c4098f4516fef544bdff5bf83693e8d1b827c8870cc2e71224c5f92fa9515fff30e338b895a4e467f"], 0x48, r0) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000300)=[{&(0x7f0000000100)="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", 0xfc}, {&(0x7f0000000200)="64e9277107495d54408e93", 0xb}, {&(0x7f0000000240)="1395f761ae66286f3d423b5283724c521e2a53b1f8aebae6d83de9c3c3cd6652f963d90a4fb2163efbc1bcfe8d0bc8f7bbf94d19120c146591b0e268a58a5f5963fd4850faef272ac052a0c8fc93d46f8bb25385debbc42b5ad039d18cd91c86b7a253406d9e2646252c4d516477ef1c8eb0be3f96243f9e54b1bc21a88a94393a2ba67684b6", 0x86}], 0x3, r2) keyctl$link(0x8, 0x0, r0) 09:02:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:02:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d00200020002000200020002000200020002000", 0x45, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3135.066163] loop6: detected capacity change from 0 to 256 [ 3135.090888] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3135.128563] loop5: detected capacity change from 0 to 256 09:02:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 57) 09:02:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) [ 3135.138688] loop2: detected capacity change from 0 to 256 09:02:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='[\x00', r0) r2 = add_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="990032a1d22757b6fb4597a67fab689bf9caff30572adca47a983eb0ca35a3b72c1c0e92b050576cb7928158539c7ed4c6bf3045b8d43f191f75b5752b12b6e43b9cf90fe779e55c636e1eb1121a13694977f95fec9fcb82c7976ddf93a7e92b1b4ec6be134bacce7c718ecf128c9acd3ed0f06fbb89cc0f5be9fe092a9c8c6d8729eafc76a6b427d7829ab493f59ccbdb07ab2d236f503206a7d61af5480b60a43c17102f434e06f2d35f725743dfe7f57087ea6fc20b1c96eeb484b743c14061be843c3549850ffb", 0xc9, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x1) keyctl$link(0x8, 0x0, r0) [ 3135.249426] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3135.267039] loop3: detected capacity change from 0 to 136 [ 3135.270599] FAULT_INJECTION: forcing a failure. [ 3135.270599] name failslab, interval 1, probability 0, space 0, times 0 [ 3135.271534] CPU: 0 PID: 12441 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3135.272133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3135.272786] Call Trace: [ 3135.272990] [ 3135.273170] dump_stack_lvl+0x8f/0xb7 [ 3135.273483] should_fail_ex.cold+0x5/0xa [ 3135.273852] should_failslab+0x9/0x20 [ 3135.274183] kmem_cache_alloc_lru+0x6b/0x760 [ 3135.274574] ? sock_alloc_inode+0x27/0x1d0 [ 3135.274934] ? __pfx_selinux_socket_create+0x10/0x10 [ 3135.275355] sock_alloc_inode+0x27/0x1d0 [ 3135.275715] ? __pfx_sock_alloc_inode+0x10/0x10 [ 3135.276124] alloc_inode+0x63/0x240 [ 3135.276461] new_inode_pseudo+0x17/0x80 [ 3135.276830] sock_alloc+0x40/0x260 [ 3135.277132] sock_create_lite+0x83/0x120 [ 3135.277462] __netlink_kernel_create+0xe2/0x870 [ 3135.277862] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3135.278312] ? lock_is_held_type+0xdb/0x130 [ 3135.278719] ? find_held_lock+0x2c/0x110 [ 3135.279078] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3135.279496] rtnetlink_net_init+0xbc/0x150 [ 3135.279922] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3135.280358] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3135.280775] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3135.281158] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3135.281606] ? debug_mutex_init+0x37/0x70 [ 3135.282031] ops_init+0xbb/0x680 [ 3135.282430] setup_net+0x40c/0x9d0 [ 3135.282781] ? down_read_killable+0x1af/0x4a0 [ 3135.283173] ? __pfx_setup_net+0x10/0x10 [ 3135.283529] copy_net_ns+0x31c/0x760 [ 3135.283898] create_new_namespaces+0x3f6/0xb30 [ 3135.284319] copy_namespaces+0x3b7/0x4a0 [ 3135.284696] copy_process+0x29e3/0x7220 [ 3135.285047] ? lock_is_held_type+0xdb/0x130 [ 3135.285416] ? find_held_lock+0x2c/0x110 [ 3135.285844] ? __pfx_copy_process+0x10/0x10 [ 3135.286284] ? _copy_from_user+0x169/0x1f0 [ 3135.286697] kernel_clone+0xeb/0x950 [ 3135.287031] ? lock_is_held_type+0xdb/0x130 [ 3135.287399] ? __pfx_kernel_clone+0x10/0x10 [ 3135.287775] ? lock_is_held_type+0xdb/0x130 [ 3135.288156] __do_sys_clone3+0x1d9/0x370 [ 3135.288510] ? __pfx___do_sys_clone3+0x10/0x10 [ 3135.288967] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3135.289461] ? fput+0x2f/0x1a0 [ 3135.289752] ? syscall_enter_from_user_mode+0x21/0x50 [ 3135.290189] ? syscall_enter_from_user_mode+0x21/0x50 [ 3135.290681] do_syscall_64+0x3f/0x90 [ 3135.291036] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3135.291474] RIP: 0033:0x7fbd5db53b19 [ 3135.291809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3135.293316] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3135.293924] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3135.294540] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3135.295152] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3135.295742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3135.296346] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3135.296979] 09:02:04 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:02:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 58) [ 3135.356598] loop6: detected capacity change from 0 to 256 [ 3135.367667] loop5: detected capacity change from 0 to 256 09:02:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "03852d43e30c1407d1acd1537f4db62919f529ce35538df4b0e7bde492d698bc0d2b924ea355260b6a03dc7ec8074ad4855d2b8d720bf9e38f17cb4e48d3ecd6", 0x27}, 0x48, 0xfffffffffffffffd) [ 3135.374170] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3135.449660] loop3: detected capacity change from 0 to 136 [ 3135.454107] FAULT_INJECTION: forcing a failure. [ 3135.454107] name failslab, interval 1, probability 0, space 0, times 0 [ 3135.455194] CPU: 1 PID: 12456 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3135.455828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3135.456506] Call Trace: [ 3135.456748] [ 3135.456979] dump_stack_lvl+0x8f/0xb7 [ 3135.457362] should_fail_ex.cold+0x5/0xa [ 3135.457799] ? ext4_mb_new_blocks+0x64a/0x4bf0 [ 3135.458284] should_failslab+0x9/0x20 [ 3135.458658] kmem_cache_alloc+0x5a/0x410 [ 3135.459025] ? __mark_inode_dirty+0x530/0xe70 [ 3135.459425] ext4_mb_new_blocks+0x64a/0x4bf0 [ 3135.459830] ? lock_is_held_type+0xdb/0x130 [ 3135.460244] ? ext4_find_extent+0xa41/0xd30 [ 3135.460634] ? ext4_cache_extents+0x68/0x2d0 [ 3135.461051] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 3135.461489] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3135.461912] ? ext4_inode_to_goal_block+0x324/0x430 [ 3135.462425] ext4_ext_map_blocks+0x1fca/0x5d40 [ 3135.462827] ? lockdep_hardirqs_on+0x7d/0x100 [ 3135.463267] ? __pfx___lock_acquire+0x10/0x10 [ 3135.463669] ? perf_trace_lock+0xf0/0x560 [ 3135.464061] ? lock_is_held_type+0xdb/0x130 [ 3135.464458] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3135.464929] ? __pfx_lock_acquire+0x10/0x10 [ 3135.465334] ? lock_release+0x3b6/0x750 [ 3135.465701] ? lock_is_held_type+0xdb/0x130 [ 3135.466150] ? __pfx_down_write+0x10/0x10 [ 3135.466570] ext4_map_blocks+0x776/0x19e0 [ 3135.466970] ? __up_read+0x192/0x730 [ 3135.467332] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3135.467750] ? __pfx___up_read+0x10/0x10 [ 3135.468138] ? rcu_read_lock_sched_held+0x42/0x80 [ 3135.468566] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3135.469019] ext4_getblk+0x604/0x7b0 [ 3135.469407] ? __pfx_ext4_getblk+0x10/0x10 [ 3135.469799] ? __brelse+0x88/0xa0 [ 3135.470132] ? __ext4_new_inode+0x153/0x55f0 [ 3135.470563] ext4_bread+0x2e/0x1a0 [ 3135.470901] ext4_append+0x21d/0x530 [ 3135.471269] ? __pfx_ext4_append+0x10/0x10 [ 3135.471679] ext4_init_new_dir+0x262/0x4c0 [ 3135.472066] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3135.472510] ext4_mkdir+0x3d3/0xb20 [ 3135.472859] ? __pfx_ext4_mkdir+0x10/0x10 [ 3135.473252] vfs_mkdir+0x495/0x740 [ 3135.473592] do_mkdirat+0x16e/0x2d0 [ 3135.473932] ? __pfx_do_mkdirat+0x10/0x10 [ 3135.474321] ? getname_flags.part.0+0x1dd/0x4f0 [ 3135.474784] __x64_sys_mkdir+0xf6/0x150 [ 3135.475158] do_syscall_64+0x3f/0x90 [ 3135.475503] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3135.475964] RIP: 0033:0x7ff782649c27 [ 3135.476295] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3135.477806] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3135.478474] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3135.479084] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3135.479701] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3135.480309] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3135.480924] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3135.481546] 09:02:21 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:02:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 59) 09:02:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3151.621281] loop6: detected capacity change from 0 to 256 09:02:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf0ffffffffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 09:02:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x1) 09:02:21 executing program 5: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000000, 0x3010, 0xffffffffffffffff, 0xbd58d000) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/87, 0x57) add_key$keyring(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/198, 0xc6) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$read(0xb, r1, &(0x7f0000000280)=""/252, 0xfc) [ 3151.650658] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3151.657140] loop2: detected capacity change from 0 to 256 [ 3151.662526] loop3: detected capacity change from 0 to 136 [ 3151.691378] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:02:37 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x14}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:02:37 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="b588f0afc8c15c8441a5e0140704da14e8c483a3d15520350ec320e05020ca912f8081fcd9832af57590b7585683e2678b4fc50e9697294856dd352aaadc7c2dc237276c0a29a2932c9a5bb5b183be8bec8eefd2a898a01f91d7c5fea0d791138ec93bdbb29cb407a1e4fa", 0x6b, r0) add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="14c939cefa43a76854a026f8b1493ed11f67a611ab4abdc35a222109094424d12ed10d1fa0822fde8159b1828de364b27e3239d2dadf4800c16081b0ffd93d245bc68242613bd76b5f1bb3efb56a", 0x4e, r0) keyctl$negate(0xd, r1, 0x5, r0) 09:02:37 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) 09:02:37 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:37 executing program 5: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000000, 0x3010, 0xffffffffffffffff, 0xbd58d000) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/87, 0x57) add_key$keyring(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/198, 0xc6) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$read(0xb, r1, &(0x7f0000000280)=""/252, 0xfc) 09:02:37 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 60) 09:02:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3167.728833] loop6: detected capacity change from 0 to 256 [ 3167.732846] loop2: detected capacity change from 0 to 256 [ 3167.737664] FAULT_INJECTION: forcing a failure. [ 3167.737664] name failslab, interval 1, probability 0, space 0, times 0 [ 3167.738646] CPU: 1 PID: 12503 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3167.739356] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3167.740061] Call Trace: [ 3167.740300] [ 3167.740495] dump_stack_lvl+0x8f/0xb7 [ 3167.740853] should_fail_ex.cold+0x5/0xa [ 3167.741204] ? security_inode_alloc+0x38/0x160 [ 3167.741614] should_failslab+0x9/0x20 [ 3167.741979] kmem_cache_alloc+0x5a/0x410 [ 3167.742354] security_inode_alloc+0x38/0x160 [ 3167.742756] inode_init_always+0xbb2/0xea0 [ 3167.743160] alloc_inode+0x84/0x240 [ 3167.743495] new_inode_pseudo+0x17/0x80 [ 3167.743863] sock_alloc+0x40/0x260 [ 3167.744196] sock_create_lite+0x83/0x120 [ 3167.744574] __netlink_kernel_create+0xe2/0x870 [ 3167.745038] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3167.745499] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3167.745491] ? lock_is_held_type+0xdb/0x130 [ 3167.746464] ? find_held_lock+0x2c/0x110 [ 3167.746877] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3167.747301] rtnetlink_net_init+0xbc/0x150 [ 3167.747680] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3167.748114] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3167.748508] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3167.748930] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3167.749371] ? debug_mutex_init+0x37/0x70 [ 3167.749752] ops_init+0xbb/0x680 [ 3167.750120] setup_net+0x40c/0x9d0 [ 3167.750454] ? down_read_killable+0x1af/0x4a0 [ 3167.750877] ? __pfx_setup_net+0x10/0x10 [ 3167.751266] copy_net_ns+0x31c/0x760 [ 3167.751620] create_new_namespaces+0x3f6/0xb30 [ 3167.752057] copy_namespaces+0x3b7/0x4a0 [ 3167.752434] copy_process+0x29e3/0x7220 [ 3167.752789] ? lock_is_held_type+0xdb/0x130 [ 3167.753155] ? find_held_lock+0x2c/0x110 [ 3167.753542] ? __pfx_copy_process+0x10/0x10 [ 3167.753949] ? _copy_from_user+0x169/0x1f0 [ 3167.754347] kernel_clone+0xeb/0x950 [ 3167.754712] ? lock_is_held_type+0xdb/0x130 [ 3167.755189] ? __pfx_kernel_clone+0x10/0x10 [ 3167.755574] ? lock_is_held_type+0xdb/0x130 [ 3167.755973] __do_sys_clone3+0x1d9/0x370 [ 3167.756365] ? __pfx___do_sys_clone3+0x10/0x10 [ 3167.756814] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3167.757283] ? fput+0x2f/0x1a0 [ 3167.757586] ? syscall_enter_from_user_mode+0x21/0x50 [ 3167.758065] ? syscall_enter_from_user_mode+0x21/0x50 [ 3167.758534] do_syscall_64+0x3f/0x90 [ 3167.758906] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3167.759402] RIP: 0033:0x7fbd5db53b19 [ 3167.759755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3167.761271] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3167.761945] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3167.762577] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3167.763193] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3167.763822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3167.764424] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3167.765073] [ 3167.774973] loop3: detected capacity change from 0 to 136 [ 3167.782971] FAULT_INJECTION: forcing a failure. [ 3167.782971] name failslab, interval 1, probability 0, space 0, times 0 [ 3167.783981] CPU: 0 PID: 12505 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3167.784652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3167.785270] Call Trace: [ 3167.785487] [ 3167.785677] dump_stack_lvl+0x8f/0xb7 [ 3167.786024] should_fail_ex.cold+0x5/0xa [ 3167.786398] ? ext4_mb_new_blocks+0x21a7/0x4bf0 [ 3167.786830] should_failslab+0x9/0x20 [ 3167.787160] kmem_cache_alloc+0x5a/0x410 [ 3167.787504] ext4_mb_new_blocks+0x21a7/0x4bf0 [ 3167.787909] ? lock_is_held_type+0xdb/0x130 [ 3167.788252] ? ext4_find_extent+0xa41/0xd30 [ 3167.788610] ? ext4_cache_extents+0x68/0x2d0 [ 3167.788957] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 3167.789371] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3167.789770] ? ext4_inode_to_goal_block+0x324/0x430 [ 3167.790195] ext4_ext_map_blocks+0x1fca/0x5d40 [ 3167.790596] ? lockdep_hardirqs_on+0x7d/0x100 [ 3167.791004] ? __pfx___lock_acquire+0x10/0x10 [ 3167.791395] ? perf_trace_lock+0xf0/0x560 [ 3167.791747] ? lock_is_held_type+0xdb/0x130 [ 3167.792113] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3167.792524] ? __pfx_lock_acquire+0x10/0x10 [ 3167.792901] ? lock_release+0x3b6/0x750 [ 3167.793271] ? lock_is_held_type+0xdb/0x130 [ 3167.793734] ? __pfx_down_write+0x10/0x10 [ 3167.794141] ext4_map_blocks+0x776/0x19e0 [ 3167.794519] ? __up_read+0x192/0x730 [ 3167.794895] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3167.795342] ? __pfx___up_read+0x10/0x10 [ 3167.795716] ? rcu_read_lock_sched_held+0x42/0x80 [ 3167.796148] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3167.796649] ext4_getblk+0x604/0x7b0 [ 3167.797026] ? __pfx_ext4_getblk+0x10/0x10 [ 3167.797420] ? __brelse+0x88/0xa0 [ 3167.797745] ? __ext4_new_inode+0x153/0x55f0 [ 3167.798228] ext4_bread+0x2e/0x1a0 [ 3167.798572] ext4_append+0x21d/0x530 [ 3167.798933] ? __pfx_ext4_append+0x10/0x10 [ 3167.799361] ext4_init_new_dir+0x262/0x4c0 [ 3167.799805] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3167.800239] ext4_mkdir+0x3d3/0xb20 [ 3167.800586] ? __pfx_ext4_mkdir+0x10/0x10 [ 3167.800998] vfs_mkdir+0x495/0x740 [ 3167.801358] do_mkdirat+0x16e/0x2d0 [ 3167.801701] ? __pfx_do_mkdirat+0x10/0x10 [ 3167.802115] ? getname_flags.part.0+0x1dd/0x4f0 [ 3167.802531] __x64_sys_mkdir+0xf6/0x150 [ 3167.802942] do_syscall_64+0x3f/0x90 [ 3167.803303] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3167.803764] RIP: 0033:0x7ff782649c27 [ 3167.804112] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3167.805642] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3167.806292] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3167.806928] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3167.807546] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3167.808166] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3167.808780] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3167.809419] [ 3167.827664] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:02:37 executing program 0: fcntl$setsig(0xffffffffffffffff, 0xa, 0x29) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 09:02:37 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:02:37 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:02:37 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:37 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) 09:02:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf", 0x51, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:02:37 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 61) 09:02:37 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3168.009243] loop6: detected capacity change from 0 to 256 [ 3168.013917] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3168.028683] loop2: detected capacity change from 0 to 256 [ 3168.033714] loop3: detected capacity change from 0 to 136 [ 3168.038109] FAULT_INJECTION: forcing a failure. [ 3168.038109] name failslab, interval 1, probability 0, space 0, times 0 [ 3168.039163] CPU: 1 PID: 12524 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3168.039854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3168.040585] Call Trace: [ 3168.040811] [ 3168.041015] dump_stack_lvl+0x8f/0xb7 [ 3168.041364] should_fail_ex.cold+0x5/0xa [ 3168.041742] ? ext4_mb_new_blocks+0x21a7/0x4bf0 [ 3168.042147] should_failslab+0x9/0x20 [ 3168.042487] kmem_cache_alloc+0x5a/0x410 [ 3168.042873] ext4_mb_new_blocks+0x21a7/0x4bf0 [ 3168.043301] ? lock_is_held_type+0xdb/0x130 [ 3168.043699] ? ext4_find_extent+0xa41/0xd30 [ 3168.044079] ? ext4_cache_extents+0x68/0x2d0 [ 3168.044470] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 3168.044934] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3168.045371] ? ext4_inode_to_goal_block+0x324/0x430 [ 3168.045831] ext4_ext_map_blocks+0x1fca/0x5d40 [ 3168.046228] ? lockdep_hardirqs_on+0x7d/0x100 [ 3168.046669] ? __pfx___lock_acquire+0x10/0x10 [ 3168.047093] ? perf_trace_lock+0xf0/0x560 [ 3168.047463] ? lock_is_held_type+0xdb/0x130 [ 3168.047849] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3168.048278] ? __pfx_lock_acquire+0x10/0x10 [ 3168.048653] ? lock_release+0x3b6/0x750 [ 3168.049019] ? lock_is_held_type+0xdb/0x130 [ 3168.049437] ? __pfx_down_write+0x10/0x10 [ 3168.049819] ext4_map_blocks+0x776/0x19e0 [ 3168.050196] ? __up_read+0x192/0x730 [ 3168.050536] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3168.050980] ? __pfx___up_read+0x10/0x10 [ 3168.051327] ? rcu_read_lock_sched_held+0x42/0x80 [ 3168.051746] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3168.052183] ext4_getblk+0x604/0x7b0 [ 3168.052529] ? __pfx_ext4_getblk+0x10/0x10 [ 3168.052900] ? __brelse+0x88/0xa0 [ 3168.053210] ? __ext4_new_inode+0x153/0x55f0 [ 3168.053630] ext4_bread+0x2e/0x1a0 [ 3168.053977] ext4_append+0x21d/0x530 [ 3168.054304] ? __pfx_ext4_append+0x10/0x10 [ 3168.054714] ext4_init_new_dir+0x262/0x4c0 [ 3168.055090] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3168.055493] ext4_mkdir+0x3d3/0xb20 [ 3168.055825] ? __pfx_ext4_mkdir+0x10/0x10 [ 3168.056191] vfs_mkdir+0x495/0x740 [ 3168.056526] do_mkdirat+0x16e/0x2d0 [ 3168.056860] ? __pfx_do_mkdirat+0x10/0x10 [ 3168.057211] ? getname_flags.part.0+0x1dd/0x4f0 [ 3168.057637] __x64_sys_mkdir+0xf6/0x150 [ 3168.057970] do_syscall_64+0x3f/0x90 [ 3168.058298] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3168.058803] RIP: 0033:0x7ff782649c27 [ 3168.059119] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3168.060581] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3168.061209] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3168.061809] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3168.062380] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3168.062997] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3168.063588] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3168.064216] [ 3168.093934] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:03:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 62) 09:03:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="1d406fd8c2e47f96edb41ad29a2949daf758a23cc021be69f51552bb98e72a073bfff447b2e3f056b7003b1c37c264790ac90acbdade5de8f2aa401541666fb5c0f36b8a51e2947b59fcb8a4f0c80a3d1347b177036c33dbaee4bcceaab97237f7aeb88debb324dcabc4e3f5fe8cdba654afffa6492926dd87f00176c42cdd979f4a096f5fc2ff89ead6b89c75a1a29a2524c3af57fcbfb59173f1a8468750b774895e4bbd86fa924565bda4c975ca3e9ea9d2c9d6a558fa9f7667b2a8450a38dc769a7dfefe370036aeb8c90c4d6fb2", 0xd0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffff8) keyctl$invalidate(0x15, r2) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r4 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)={0x2, 0x0, @a}, 0x48, r3) keyctl$update(0x2, r4, &(0x7f0000000600)="2454dba4e41950a7a9985a8fd11e79d63f3c7bce3b3aa146f4cb4083b63647e4d99ab503bda845ab9d24f3f682f3bfc418fa595eb6601c8b215f77954d0fbb5c46bc0fa584246a1e0b067df71e89663f1be276a1ee15e4302507224a46ce279eb3aad2fba50135e324a4eb77a1eff6475dab98743d21f342eda74a202ac99167cf179ea05861afa62058eaa25faf992eb7", 0x91) keyctl$invalidate(0x15, r2) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc20700f4b8188e000000000000f6b5830b6a36cb74fe0fd62f8aea6000"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) keyctl$invalidate(0x15, r5) keyctl$read(0xb, r5, &(0x7f00000002c0)=""/130, 0x82) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$invalidate(0x15, r6) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$set_timeout(0xf, r1, 0x100000000) 09:03:03 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:03:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='key\x80\xc7Z\xb4&\"\xad\xee?t\xae\x89\xb3\n\x00\x00\x00\x00\x00\x00\x8e\x14\x98\xe0\x8a\xe6\x14\xcdu$\x84\x8c,\xa3', r0) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$link(0x8, 0x0, r0) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r4, r3, r1, 0x0) r5 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="7a1f2819461c4de29c806c4c2fab0c374e8d6118f927e9a0a1925a0e3ae18fb4483ebfb100d144d44b8bc8b76ad30e567c67b5ad7265f4b8d86e0a83b51f233e3e86dc9ee85e48ef0e65001b553bd7b5358201705ba70ed65385b0396771fd355b30b98aa3f715331fd3704df713e837ac351559b5d9faa6c02c7b296a22dfd67e7738126735fb86ca87ac1c7dcb9277cd82650ae7cf8c55709589723547cb749ab0de06555191b4833a89114adac2944cee68281acd9448e5fb87da852d376793694384f4", 0xc5, r5) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r0) 09:03:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:03 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 09:03:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3193.596073] loop6: detected capacity change from 0 to 256 [ 3193.600504] loop3: detected capacity change from 0 to 136 [ 3193.601925] FAULT_INJECTION: forcing a failure. [ 3193.601925] name failslab, interval 1, probability 0, space 0, times 0 [ 3193.602951] CPU: 0 PID: 12539 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3193.603664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.604403] Call Trace: [ 3193.604659] [ 3193.604778] loop2: detected capacity change from 0 to 256 [ 3193.604877] dump_stack_lvl+0x8f/0xb7 [ 3193.605741] should_fail_ex.cold+0x5/0xa [ 3193.606118] ? ext4_mb_new_blocks+0x64a/0x4bf0 [ 3193.606521] should_failslab+0x9/0x20 [ 3193.606863] kmem_cache_alloc+0x5a/0x410 [ 3193.607276] ? __mark_inode_dirty+0x530/0xe70 [ 3193.607739] ext4_mb_new_blocks+0x64a/0x4bf0 [ 3193.608206] ? lock_is_held_type+0xdb/0x130 [ 3193.608618] ? ext4_find_extent+0xa41/0xd30 [ 3193.609003] ? ext4_cache_extents+0x68/0x2d0 [ 3193.609400] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 3193.609824] ? ext4_ext_search_right+0x2e3/0xbd0 [ 3193.610262] ? ext4_inode_to_goal_block+0x324/0x430 [ 3193.610752] ext4_ext_map_blocks+0x1fca/0x5d40 [ 3193.611199] ? lockdep_hardirqs_on+0x7d/0x100 [ 3193.611631] ? __pfx___lock_acquire+0x10/0x10 [ 3193.612049] ? perf_trace_lock+0xf0/0x560 [ 3193.612423] ? lock_is_held_type+0xdb/0x130 [ 3193.612827] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 3193.613293] ? __pfx_lock_acquire+0x10/0x10 [ 3193.613691] ? lock_release+0x3b6/0x750 [ 3193.614057] ? lock_is_held_type+0xdb/0x130 [ 3193.614456] ? __pfx_down_write+0x10/0x10 [ 3193.614865] ext4_map_blocks+0x776/0x19e0 [ 3193.615304] ? __up_read+0x192/0x730 [ 3193.615699] ? __pfx_ext4_map_blocks+0x10/0x10 [ 3193.616128] ? __pfx___up_read+0x10/0x10 [ 3193.616540] ? rcu_read_lock_sched_held+0x42/0x80 [ 3193.616974] ? ext4_es_lookup_extent+0xc8/0xc60 [ 3193.617404] ext4_getblk+0x604/0x7b0 [ 3193.617767] ? __pfx_ext4_getblk+0x10/0x10 [ 3193.618061] FAULT_INJECTION: forcing a failure. [ 3193.618061] name failslab, interval 1, probability 0, space 0, times 0 [ 3193.618131] ? __brelse+0x88/0xa0 [ 3193.619507] ? __ext4_new_inode+0x153/0x55f0 [ 3193.619962] ext4_bread+0x2e/0x1a0 [ 3193.620312] ext4_append+0x21d/0x530 [ 3193.620666] ? __pfx_ext4_append+0x10/0x10 [ 3193.621050] ext4_init_new_dir+0x262/0x4c0 [ 3193.621426] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3193.621868] ext4_mkdir+0x3d3/0xb20 [ 3193.622215] ? __pfx_ext4_mkdir+0x10/0x10 [ 3193.622614] vfs_mkdir+0x495/0x740 [ 3193.622951] do_mkdirat+0x16e/0x2d0 [ 3193.623346] ? __pfx_do_mkdirat+0x10/0x10 [ 3193.623720] ? getname_flags.part.0+0x1dd/0x4f0 [ 3193.624134] __x64_sys_mkdir+0xf6/0x150 [ 3193.624487] do_syscall_64+0x3f/0x90 [ 3193.624840] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.625293] RIP: 0033:0x7ff782649c27 [ 3193.625632] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3193.627148] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3193.627786] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3193.628388] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3193.628988] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3193.629583] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3193.630214] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3193.630802] [ 3193.631007] CPU: 1 PID: 12547 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3193.631804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3193.632475] Call Trace: [ 3193.632732] [ 3193.632960] dump_stack_lvl+0x8f/0xb7 [ 3193.633328] should_fail_ex.cold+0x5/0xa [ 3193.633710] should_failslab+0x9/0x20 [ 3193.634060] __kmem_cache_alloc_node+0x5b/0x400 [ 3193.634487] ? sk_prot_alloc+0x157/0x280 [ 3193.634873] ? sk_prot_alloc+0x157/0x280 [ 3193.635280] __kmalloc+0x46/0xc0 [ 3193.635603] sk_prot_alloc+0x157/0x280 [ 3193.635992] sk_alloc+0x38/0x760 [ 3193.636300] __netlink_create+0x63/0x340 [ 3193.636702] ? sock_create_lite+0x49/0x120 [ 3193.637098] __netlink_kernel_create+0x114/0x870 [ 3193.637538] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3193.638063] ? find_held_lock+0x2c/0x110 [ 3193.638448] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3193.638871] rtnetlink_net_init+0xbc/0x150 [ 3193.639268] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3193.639714] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3193.640088] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3193.640471] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3193.640957] ? debug_mutex_init+0x37/0x70 [ 3193.641336] ops_init+0xbb/0x680 [ 3193.641670] setup_net+0x40c/0x9d0 [ 3193.642005] ? down_read_killable+0x1af/0x4a0 [ 3193.642401] ? __pfx_setup_net+0x10/0x10 [ 3193.642809] copy_net_ns+0x31c/0x760 [ 3193.643200] create_new_namespaces+0x3f6/0xb30 [ 3193.643622] copy_namespaces+0x3b7/0x4a0 [ 3193.644014] copy_process+0x29e3/0x7220 [ 3193.644342] ? lock_is_held_type+0xdb/0x130 [ 3193.644709] ? find_held_lock+0x2c/0x110 [ 3193.645075] ? __pfx_copy_process+0x10/0x10 [ 3193.645450] ? _copy_from_user+0x169/0x1f0 [ 3193.645858] kernel_clone+0xeb/0x950 [ 3193.646190] ? lock_is_held_type+0xdb/0x130 [ 3193.646578] ? __pfx_kernel_clone+0x10/0x10 [ 3193.647024] ? lock_is_held_type+0xdb/0x130 [ 3193.647482] __do_sys_clone3+0x1d9/0x370 [ 3193.647874] ? __pfx___do_sys_clone3+0x10/0x10 [ 3193.648270] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3193.648784] ? fput+0x2f/0x1a0 [ 3193.649108] ? syscall_enter_from_user_mode+0x21/0x50 [ 3193.649566] ? syscall_enter_from_user_mode+0x21/0x50 [ 3193.650019] do_syscall_64+0x3f/0x90 [ 3193.650360] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3193.650805] RIP: 0033:0x7fbd5db53b19 [ 3193.651161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3193.652676] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3193.653316] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3193.653938] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3193.654535] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3193.655193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3193.655791] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3193.656414] [ 3193.657726] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3193.695822] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:03:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r2) 09:03:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="1d406fd8c2e47f96edb41ad29a2949daf758a23cc021be69f51552bb98e72a073bfff447b2e3f056b7003b1c37c264790ac90acbdade5de8f2aa401541666fb5c0f36b8a51e2947b59fcb8a4f0c80a3d1347b177036c33dbaee4bcceaab97237f7aeb88debb324dcabc4e3f5fe8cdba654afffa6492926dd87f00176c42cdd979f4a096f5fc2ff89ead6b89c75a1a29a2524c3af57fcbfb59173f1a8468750b774895e4bbd86fa924565bda4c975ca3e9ea9d2c9d6a558fa9f7667b2a8450a38dc769a7dfefe370036aeb8c90c4d6fb2", 0xd0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000380), &(0x7f0000000480)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffff8) keyctl$invalidate(0x15, r2) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r4 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)={0x2, 0x0, @a}, 0x48, r3) keyctl$update(0x2, r4, &(0x7f0000000600)="2454dba4e41950a7a9985a8fd11e79d63f3c7bce3b3aa146f4cb4083b63647e4d99ab503bda845ab9d24f3f682f3bfc418fa595eb6601c8b215f77954d0fbb5c46bc0fa584246a1e0b067df71e89663f1be276a1ee15e4302507224a46ce279eb3aad2fba50135e324a4eb77a1eff6475dab98743d21f342eda74a202ac99167cf179ea05861afa62058eaa25faf992eb7", 0x91) keyctl$invalidate(0x15, r2) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc20700f4b8188e000000000000f6b5830b6a36cb74fe0fd62f8aea6000"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r5) keyctl$invalidate(0x15, r5) keyctl$read(0xb, r5, &(0x7f00000002c0)=""/130, 0x82) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r6) keyctl$invalidate(0x15, r6) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r6) keyctl$set_timeout(0xf, r1, 0x100000000) 09:03:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:03 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) [ 3193.838658] loop6: detected capacity change from 0 to 256 [ 3193.861805] ISOFS: Logical zone size(0) < hardware blocksize(1024) 09:03:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:03 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 63) [ 3193.890248] loop2: detected capacity change from 0 to 256 09:03:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='keyring\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r0) [ 3193.921148] loop3: detected capacity change from 0 to 136 09:03:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3193.967097] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:03:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r0, 0x1) keyctl$link(0x8, 0x0, r0) 09:03:23 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) 09:03:23 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:23 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:03:23 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 64) 09:03:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000", 0x57, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:23 executing program 0: r0 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7, 0x2, &(0x7f0000001280)=[{&(0x7f00000001c0)="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", 0x1000, 0x20}, {&(0x7f00000011c0)="e2995b619d0f4184fdb6d640da39453587c2912d854aabc7bac64418e8e60a320d23de53b6244a2d2eed21cb39181b3a9029a34f4bc2b5312c7df24baac6d81ad435807aba00745f1adb045686639b0f01cd814cdf7d39b5ceac5a042c26199399bd3029d08958778ab337f620058e7f134f7055fd2ae37edd17600f0beff4a2b3804b5dfd6345f6de8ec6231c7891807222ef3d2411a2136f08a68d23c2b5787821b90fd2ec94ae7ff053028afecd2913edb5d44a", 0xb5, 0x9}], 0x42002, &(0x7f00000012c0)=ANY=[@ANYBLOB='codepage=860,nodots,nodots,dmask=00000000000000000000126,check=strict,codepage=866,allow_utime=00000000000000000000002,dots,hash,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2e556f778c65723e", @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) execveat(r0, &(0x7f0000001380)='./file0\x00', &(0x7f0000001440)=[&(0x7f00000013c0)='\xce\x00', &(0x7f0000001400)='keyring\x00'], &(0x7f0000001540)=[&(0x7f0000001480)='&\x00', &(0x7f00000014c0)='/.-*\x00', &(0x7f0000001500)='blacklist\x00'], 0x1000) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="2dbe8a540e1a0a2b7d898217bc91edce6110634db09b6e65f6033257105a037a60b6", 0x22, 0xfffffffffffffff8) syz_mount_image$vfat(&(0x7f0000001580), &(0x7f00000015c0)='./file0\x00', 0x0, 0x1, &(0x7f00000016c0)=[{&(0x7f0000001600)="4164246e5fd5a73b9d31d190c1f7720a4ff8452bd69aa8438937b722507e240bfe58df094c5bc7ac4d8a6914fb06f4758ccbbd7302c26c3f97b171b2e822dc4591aed433fdfa574eac769ad8a728a5355e89b68a1e5fd2cb55b6efae6c2a1efa088198a9f4ff0e984d3cdcb1ac2ef652ec52494851cd689dbfb840cc227939fea0b7367b9c97059a7cf4f2f7e11abb9e0a998829634b1927cc29ed2162777b3ddf615869beb8fac7a0f2d5c6e9af658b4731a18ccb6aadc804a4990a15b6a6", 0xbf, 0x100}], 0x10002, &(0x7f0000001700)={[{@uni_xlateno}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@seclabel}]}) keyctl$link(0x8, 0x0, r1) 09:03:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r0, 0x1) keyctl$link(0x8, 0x0, r0) 09:03:23 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3213.461020] loop6: detected capacity change from 0 to 256 [ 3213.464299] loop2: detected capacity change from 0 to 256 [ 3213.479974] loop3: detected capacity change from 0 to 136 [ 3213.483129] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3213.487252] FAULT_INJECTION: forcing a failure. [ 3213.487252] name failslab, interval 1, probability 0, space 0, times 0 [ 3213.488848] CPU: 1 PID: 12591 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3213.489533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3213.490206] Call Trace: [ 3213.490434] [ 3213.490639] dump_stack_lvl+0x8f/0xb7 [ 3213.490997] should_fail_ex.cold+0x5/0xa [ 3213.491353] ? jbd2_journal_add_journal_head+0x374/0x5d0 [ 3213.491850] should_failslab+0x9/0x20 [ 3213.492181] kmem_cache_alloc+0x5a/0x410 [ 3213.492538] ? mark_held_locks+0x9e/0xe0 [ 3213.492902] jbd2_journal_add_journal_head+0x374/0x5d0 [ 3213.493368] jbd2_journal_get_create_access+0x44/0x560 [ 3213.493826] __ext4_journal_get_create_access+0x54/0x1f0 [ 3213.494293] ext4_getblk+0x374/0x7b0 [ 3213.494629] ? __pfx_ext4_getblk+0x10/0x10 [ 3213.495002] ? __brelse+0x88/0xa0 [ 3213.495328] ? __ext4_new_inode+0x153/0x55f0 [ 3213.495760] ext4_bread+0x2e/0x1a0 [ 3213.496092] ext4_append+0x21d/0x530 [ 3213.496432] ? __pfx_ext4_append+0x10/0x10 [ 3213.496825] ext4_init_new_dir+0x262/0x4c0 [ 3213.497189] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3213.497601] ext4_mkdir+0x3d3/0xb20 [ 3213.497927] ? __pfx_ext4_mkdir+0x10/0x10 [ 3213.498295] vfs_mkdir+0x495/0x740 [ 3213.498615] do_mkdirat+0x16e/0x2d0 [ 3213.498636] FAULT_INJECTION: forcing a failure. [ 3213.498636] name failslab, interval 1, probability 0, space 0, times 0 [ 3213.498940] ? __pfx_do_mkdirat+0x10/0x10 [ 3213.500299] ? getname_flags.part.0+0x1dd/0x4f0 [ 3213.500706] __x64_sys_mkdir+0xf6/0x150 [ 3213.501062] do_syscall_64+0x3f/0x90 [ 3213.501414] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3213.501871] RIP: 0033:0x7ff782649c27 [ 3213.502191] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3213.503654] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3213.504273] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3213.504862] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3213.505451] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3213.506041] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3213.506650] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3213.507285] [ 3213.507521] CPU: 0 PID: 12597 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3213.507716] ENOMEM in journal_alloc_journal_head, retrying. [ 3213.508233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3213.509382] Call Trace: [ 3213.509620] [ 3213.509836] dump_stack_lvl+0x8f/0xb7 [ 3213.510203] should_fail_ex.cold+0x5/0xa [ 3213.510583] should_failslab+0x9/0x20 [ 3213.510937] __kmem_cache_alloc_node+0x5b/0x400 [ 3213.511354] ? selinux_sk_alloc_security+0x94/0x210 [ 3213.511811] ? _raw_spin_unlock_irqrestore+0x2c/0x60 [ 3213.512280] kmalloc_trace+0x26/0x60 [ 3213.512644] selinux_sk_alloc_security+0x94/0x210 [ 3213.513078] security_sk_alloc+0x5a/0xb0 [ 3213.513464] sk_prot_alloc+0x20b/0x280 [ 3213.513834] sk_alloc+0x38/0x760 [ 3213.514156] __netlink_create+0x63/0x340 [ 3213.514533] ? sock_create_lite+0x49/0x120 [ 3213.514928] __netlink_kernel_create+0x114/0x870 [ 3213.515390] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3213.515873] ? find_held_lock+0x2c/0x110 [ 3213.516247] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3213.516686] rtnetlink_net_init+0xbc/0x150 [ 3213.517074] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3213.517518] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3213.517924] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3213.518334] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3213.518793] ? debug_mutex_init+0x37/0x70 [ 3213.519181] ops_init+0xbb/0x680 [ 3213.519534] setup_net+0x40c/0x9d0 [ 3213.519873] ? down_read_killable+0x1af/0x4a0 [ 3213.520288] ? __pfx_setup_net+0x10/0x10 [ 3213.520685] copy_net_ns+0x31c/0x760 [ 3213.521040] create_new_namespaces+0x3f6/0xb30 [ 3213.521479] copy_namespaces+0x3b7/0x4a0 [ 3213.521859] copy_process+0x29e3/0x7220 [ 3213.522225] ? lock_is_held_type+0xdb/0x130 [ 3213.522619] ? find_held_lock+0x2c/0x110 [ 3213.523024] ? __pfx_copy_process+0x10/0x10 [ 3213.523440] ? _copy_from_user+0x169/0x1f0 [ 3213.523840] kernel_clone+0xeb/0x950 [ 3213.524186] ? lock_is_held_type+0xdb/0x130 [ 3213.524573] ? __pfx_kernel_clone+0x10/0x10 [ 3213.524974] ? lock_is_held_type+0xdb/0x130 [ 3213.525381] __do_sys_clone3+0x1d9/0x370 [ 3213.525749] ? __pfx___do_sys_clone3+0x10/0x10 [ 3213.526172] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3213.526645] ? fput+0x2f/0x1a0 [ 3213.526959] ? syscall_enter_from_user_mode+0x21/0x50 [ 3213.527444] ? syscall_enter_from_user_mode+0x21/0x50 [ 3213.527921] do_syscall_64+0x3f/0x90 [ 3213.528269] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3213.528742] RIP: 0033:0x7fbd5db53b19 [ 3213.529085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3213.530603] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3213.531263] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3213.531892] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3213.532503] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3213.533104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3213.533715] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3213.534357] [ 3213.552850] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:03:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r0, 0x1) keyctl$link(0x8, 0x0, r0) 09:03:23 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:23 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f0000000080)=""/227, 0xe3) 09:03:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:23 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3213.720745] loop2: detected capacity change from 0 to 256 09:03:23 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 65) 09:03:23 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r0, 0x1) [ 3213.777053] loop6: detected capacity change from 0 to 256 09:03:23 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) [ 3213.825042] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3213.858286] loop3: detected capacity change from 0 to 136 [ 3213.889121] FAULT_INJECTION: forcing a failure. [ 3213.889121] name failslab, interval 1, probability 0, space 0, times 0 [ 3213.890196] CPU: 0 PID: 12618 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3213.890929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3213.891642] Call Trace: [ 3213.891886] [ 3213.892102] dump_stack_lvl+0x8f/0xb7 [ 3213.892474] should_fail_ex.cold+0x5/0xa [ 3213.892853] should_failslab+0x9/0x20 [ 3213.893206] __kmem_cache_alloc_node+0x5b/0x400 [ 3213.893622] ? sk_prot_alloc+0x157/0x280 [ 3213.894021] ? sk_prot_alloc+0x157/0x280 [ 3213.894404] __kmalloc+0x46/0xc0 [ 3213.894737] sk_prot_alloc+0x157/0x280 [ 3213.895287] sk_alloc+0x38/0x760 [ 3213.895623] __netlink_create+0x63/0x340 [ 3213.896024] ? sock_create_lite+0x49/0x120 [ 3213.896426] __netlink_kernel_create+0x114/0x870 [ 3213.896887] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3213.897392] ? find_held_lock+0x2c/0x110 [ 3213.897791] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3213.898248] rtnetlink_net_init+0xbc/0x150 [ 3213.898654] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3213.899119] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3213.899591] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3213.900023] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3213.900506] ? debug_mutex_init+0x37/0x70 [ 3213.900905] ops_init+0xbb/0x680 [ 3213.901255] setup_net+0x40c/0x9d0 [ 3213.901594] ? down_read_killable+0x1af/0x4a0 [ 3213.902034] ? __pfx_setup_net+0x10/0x10 [ 3213.902447] copy_net_ns+0x31c/0x760 [ 3213.902823] create_new_namespaces+0x3f6/0xb30 [ 3213.903272] copy_namespaces+0x3b7/0x4a0 [ 3213.903690] copy_process+0x29e3/0x7220 [ 3213.904066] ? lock_is_held_type+0xdb/0x130 [ 3213.904472] ? find_held_lock+0x2c/0x110 [ 3213.904875] ? __pfx_copy_process+0x10/0x10 [ 3213.905295] ? _copy_from_user+0x169/0x1f0 [ 3213.905711] kernel_clone+0xeb/0x950 [ 3213.906061] ? lock_is_held_type+0xdb/0x130 [ 3213.906469] ? __pfx_kernel_clone+0x10/0x10 [ 3213.906871] ? lock_is_held_type+0xdb/0x130 [ 3213.907296] __do_sys_clone3+0x1d9/0x370 [ 3213.907705] ? __pfx___do_sys_clone3+0x10/0x10 [ 3213.908134] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3213.908616] ? fput+0x2f/0x1a0 [ 3213.908932] ? syscall_enter_from_user_mode+0x21/0x50 [ 3213.909412] ? syscall_enter_from_user_mode+0x21/0x50 [ 3213.909920] do_syscall_64+0x3f/0x90 [ 3213.910301] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3213.910785] RIP: 0033:0x7fbd5db53b19 [ 3213.911134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3213.912614] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3213.913306] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3213.913941] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3213.914590] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3213.915218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3213.915868] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3213.916527] 09:03:40 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) 09:03:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$link(0x8, r0, r1) 09:03:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:40 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) 09:03:40 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:03:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 66) [ 3230.841025] loop6: detected capacity change from 0 to 256 [ 3230.862799] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3230.864433] loop2: detected capacity change from 0 to 256 [ 3230.867306] loop3: detected capacity change from 0 to 136 [ 3230.872656] FAULT_INJECTION: forcing a failure. [ 3230.872656] name failslab, interval 1, probability 0, space 0, times 0 [ 3230.873706] CPU: 0 PID: 12635 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3230.874471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3230.874571] FAULT_INJECTION: forcing a failure. [ 3230.874571] name failslab, interval 1, probability 0, space 0, times 0 [ 3230.875185] Call Trace: [ 3230.875196] [ 3230.876680] dump_stack_lvl+0x8f/0xb7 [ 3230.877057] should_fail_ex.cold+0x5/0xa [ 3230.877447] ? jbd2_journal_add_journal_head+0x374/0x5d0 [ 3230.877952] should_failslab+0x9/0x20 [ 3230.878312] kmem_cache_alloc+0x5a/0x410 [ 3230.878700] ? mark_held_locks+0x9e/0xe0 [ 3230.879103] jbd2_journal_add_journal_head+0x374/0x5d0 [ 3230.879619] jbd2_journal_get_create_access+0x44/0x560 [ 3230.880127] __ext4_journal_get_create_access+0x54/0x1f0 [ 3230.880623] ext4_getblk+0x374/0x7b0 [ 3230.880986] ? __pfx_ext4_getblk+0x10/0x10 [ 3230.881391] ? __brelse+0x88/0xa0 [ 3230.881733] ? __ext4_new_inode+0x153/0x55f0 [ 3230.882164] ext4_bread+0x2e/0x1a0 [ 3230.882521] ext4_append+0x21d/0x530 [ 3230.882893] ? __pfx_ext4_append+0x10/0x10 [ 3230.883314] ext4_init_new_dir+0x262/0x4c0 [ 3230.883721] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 3230.884163] ext4_mkdir+0x3d3/0xb20 [ 3230.884513] ? __pfx_ext4_mkdir+0x10/0x10 [ 3230.884925] vfs_mkdir+0x495/0x740 [ 3230.885295] do_mkdirat+0x16e/0x2d0 [ 3230.885660] ? __pfx_do_mkdirat+0x10/0x10 [ 3230.886080] ? getname_flags.part.0+0x1dd/0x4f0 [ 3230.886541] __x64_sys_mkdir+0xf6/0x150 [ 3230.886958] do_syscall_64+0x3f/0x90 [ 3230.887341] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3230.887863] RIP: 0033:0x7ff782649c27 [ 3230.888227] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3230.889802] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 3230.890508] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff782649c27 [ 3230.891162] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 3230.891820] RBP: 00007ff77fbc0040 R08: 0000000000000000 R09: ffffffffffffffff [ 3230.892456] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 3230.893090] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3230.893750] [ 3230.893980] CPU: 1 PID: 12634 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3230.894109] ENOMEM in journal_alloc_journal_head, retrying. [ 3230.894744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3230.894760] Call Trace: [ 3230.894770] [ 3230.896433] dump_stack_lvl+0x8f/0xb7 [ 3230.896805] should_fail_ex.cold+0x5/0xa [ 3230.897191] should_failslab+0x9/0x20 [ 3230.897542] __kmem_cache_alloc_node+0x5b/0x400 [ 3230.897973] ? __netlink_kernel_create+0x1ad/0x870 [ 3230.898423] ? __init_waitqueue_head+0xca/0x150 [ 3230.898854] ? __netlink_kernel_create+0x1ad/0x870 [ 3230.899262] __kmalloc+0x46/0xc0 [ 3230.899555] __netlink_kernel_create+0x1ad/0x870 [ 3230.899984] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3230.900441] ? find_held_lock+0x2c/0x110 [ 3230.900839] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3230.901277] rtnetlink_net_init+0xbc/0x150 [ 3230.901643] ? __pfx_rtnetlink_net_init+0x10/0x10 [ 3230.902106] ? __pfx_rtnetlink_rcv+0x10/0x10 [ 3230.902506] ? __pfx_rtnetlink_bind+0x10/0x10 [ 3230.902929] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3230.903365] ? debug_mutex_init+0x37/0x70 [ 3230.903757] ops_init+0xbb/0x680 [ 3230.904089] setup_net+0x40c/0x9d0 [ 3230.904428] ? down_read_killable+0x1af/0x4a0 [ 3230.904840] ? __pfx_setup_net+0x10/0x10 [ 3230.905244] copy_net_ns+0x31c/0x760 [ 3230.905611] create_new_namespaces+0x3f6/0xb30 [ 3230.906075] copy_namespaces+0x3b7/0x4a0 [ 3230.906468] copy_process+0x29e3/0x7220 [ 3230.906839] ? lock_is_held_type+0xdb/0x130 [ 3230.907245] ? find_held_lock+0x2c/0x110 [ 3230.907662] ? __pfx_copy_process+0x10/0x10 [ 3230.908078] ? _copy_from_user+0x169/0x1f0 [ 3230.908481] kernel_clone+0xeb/0x950 [ 3230.908830] ? lock_is_held_type+0xdb/0x130 [ 3230.909232] ? __pfx_kernel_clone+0x10/0x10 [ 3230.909638] ? lock_is_held_type+0xdb/0x130 [ 3230.910050] __do_sys_clone3+0x1d9/0x370 [ 3230.910423] ? __pfx___do_sys_clone3+0x10/0x10 [ 3230.910836] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3230.911310] ? fput+0x2f/0x1a0 [ 3230.911628] ? syscall_enter_from_user_mode+0x21/0x50 [ 3230.912090] ? syscall_enter_from_user_mode+0x21/0x50 [ 3230.912628] do_syscall_64+0x3f/0x90 [ 3230.913019] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3230.913509] RIP: 0033:0x7fbd5db53b19 [ 3230.913877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3230.915476] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3230.916148] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3230.916791] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3230.917437] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3230.918048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3230.918663] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3230.919300] 09:03:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="e84d76c389b24061191a13f0daf4a19ce1c49cc68e22ae10e6ac79a06b4644fd539b2103bf2dc4c7dd6398b1705f86bd53ce84f406efd593167b38161b98750008", 0x41, r0) keyctl$link(0x8, 0x0, r0) r2 = add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="706bfb5084666bef15046d49f9dec37c6a13b739ad03a97463bc6c32a1a94fabbcccc19e804e574c178ec107fd098bafc966ea9f3f78e441428dbd7f2f278679db7b4a8a85e6a9613ee5fc59b4bc", 0x4e, r1) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r2) r4 = getuid() keyctl$chown(0x4, r3, r4, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r5, 0x1) 09:03:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) 09:03:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:40 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 67) [ 3231.092472] loop2: detected capacity change from 0 to 256 [ 3231.134026] loop6: detected capacity change from 0 to 256 [ 3231.148512] ISOFS: Logical zone size(0) < hardware blocksize(1024) 09:03:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:03:40 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)={0x3, 0x0, @c}, 0x29, r0) keyctl$link(0x8, r1, r0) 09:03:40 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) [ 3231.225889] loop3: detected capacity change from 0 to 136 09:03:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:40 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x38}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:03:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:03:58 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:03:58 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1c00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:58 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:58 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 68) 09:03:58 executing program 0: fchmod(0xffffffffffffffff, 0x80) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r0) 09:03:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) [ 3248.445639] loop6: detected capacity change from 0 to 256 [ 3248.447475] loop2: detected capacity change from 0 to 256 [ 3248.456109] FAULT_INJECTION: forcing a failure. [ 3248.456109] name failslab, interval 1, probability 0, space 0, times 0 [ 3248.457287] CPU: 1 PID: 12678 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3248.457959] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3248.458613] Call Trace: [ 3248.458842] [ 3248.459063] dump_stack_lvl+0x8f/0xb7 [ 3248.459435] should_fail_ex.cold+0x5/0xa [ 3248.459809] should_failslab+0x9/0x20 [ 3248.460163] kmem_cache_alloc_lru+0x6b/0x760 [ 3248.460555] ? sock_alloc_inode+0x27/0x1d0 [ 3248.460929] ? __pfx_selinux_socket_create+0x10/0x10 [ 3248.461418] ? __wake_up_common_lock+0xe5/0x140 [ 3248.461827] sock_alloc_inode+0x27/0x1d0 [ 3248.462222] ? __pfx_sock_alloc_inode+0x10/0x10 [ 3248.462686] alloc_inode+0x63/0x240 [ 3248.463048] new_inode_pseudo+0x17/0x80 [ 3248.463411] sock_alloc+0x40/0x260 [ 3248.463727] sock_create_lite+0x83/0x120 [ 3248.464102] __netlink_kernel_create+0xe2/0x870 [ 3248.464535] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3248.465000] ? find_held_lock+0x2c/0x110 [ 3248.465352] ? __pfx_genl_pernet_init+0x10/0x10 [ 3248.465743] genl_pernet_init+0xad/0x150 [ 3248.466102] ? __pfx_genl_pernet_init+0x10/0x10 [ 3248.466132] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3248.466520] ? __pfx_genl_rcv+0x10/0x10 [ 3248.466546] ? __pfx_genl_bind+0x10/0x10 [ 3248.466576] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3248.468286] ? debug_mutex_init+0x37/0x70 [ 3248.468655] ops_init+0xbb/0x680 [ 3248.468961] setup_net+0x40c/0x9d0 [ 3248.469324] ? down_read_killable+0x1af/0x4a0 [ 3248.469710] ? __pfx_setup_net+0x10/0x10 [ 3248.470142] copy_net_ns+0x31c/0x760 [ 3248.470496] create_new_namespaces+0x3f6/0xb30 [ 3248.470919] copy_namespaces+0x3b7/0x4a0 [ 3248.471306] copy_process+0x29e3/0x7220 [ 3248.471654] ? lock_is_held_type+0xdb/0x130 [ 3248.472037] ? find_held_lock+0x2c/0x110 [ 3248.472161] loop3: detected capacity change from 0 to 136 [ 3248.472407] ? __pfx_copy_process+0x10/0x10 [ 3248.473355] ? _copy_from_user+0x169/0x1f0 [ 3248.473741] kernel_clone+0xeb/0x950 [ 3248.474072] ? lock_is_held_type+0xdb/0x130 [ 3248.474445] ? __pfx_kernel_clone+0x10/0x10 [ 3248.474824] ? lock_is_held_type+0xdb/0x130 [ 3248.475267] __do_sys_clone3+0x1d9/0x370 [ 3248.475613] ? __pfx___do_sys_clone3+0x10/0x10 [ 3248.476040] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3248.476517] ? fput+0x2f/0x1a0 [ 3248.476811] ? syscall_enter_from_user_mode+0x21/0x50 [ 3248.477258] ? syscall_enter_from_user_mode+0x21/0x50 [ 3248.477718] do_syscall_64+0x3f/0x90 [ 3248.478082] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3248.478594] RIP: 0033:0x7fbd5db53b19 [ 3248.478917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3248.479764] FAULT_INJECTION: forcing a failure. [ 3248.479764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3248.480392] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3248.480419] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3248.482839] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3248.483481] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3248.484162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3248.484816] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3248.485498] [ 3248.485725] CPU: 0 PID: 12686 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3248.486514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3248.487257] Call Trace: [ 3248.487627] [ 3248.487842] dump_stack_lvl+0x8f/0xb7 [ 3248.488210] should_fail_ex.cold+0x5/0xa [ 3248.488581] _copy_from_user+0x30/0x1f0 [ 3248.488959] memdup_user+0x72/0xd0 [ 3248.489288] strndup_user+0x78/0xe0 [ 3248.489628] __x64_sys_mount+0x137/0x310 [ 3248.490000] ? __pfx___x64_sys_mount+0x10/0x10 [ 3248.490414] ? syscall_enter_from_user_mode+0x21/0x50 [ 3248.490875] ? syscall_enter_from_user_mode+0x21/0x50 [ 3248.491376] do_syscall_64+0x3f/0x90 [ 3248.491725] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3248.492208] RIP: 0033:0x7ff78264c04a [ 3248.492539] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3248.494032] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3248.494722] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3248.495341] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3248.495964] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3248.496561] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3248.497181] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3248.497833] [ 3248.502870] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3248.506709] isofs_fill_super: get root inode failed 09:03:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:03:58 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:03:58 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:03:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r3) keyctl$invalidate(0x15, r3) r4 = add_key$fscrypt_provisioning(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)={0x1, 0x0, @a}, 0x48, r3) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000440)={r4, 0x70}, 0x0, &(0x7f0000000480)="5e36ca8a1ba8bd462c34f7d1e2bc79f897f6296c04d34da968b84a37f78a163a1a2120afc257deb76cdb304debc3e93534286f53b2ef3d22550217f4a3b7f1679d39bc1a7981324096f906c624ad487d16c0e7fde2a4090be39eeb2b422faf5466e42d7a81830cb2e91c28df88af9613", &(0x7f0000000500)) r5 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "5a8475bb1996fdd8922d2ca8fc39dfca149c67e8b7b8f151d6de47a496eac48de75936bca9a38d5d59cf87d4d297953bc54824d929ec6c6d3b45185464a063a9", 0x1b}, 0x48, r5) keyctl$KEYCTL_MOVE(0x1e, r0, r2, r3, 0x0) keyctl$invalidate(0x15, r1) keyctl$unlink(0x9, r0, r1) [ 3248.661856] loop2: detected capacity change from 0 to 256 09:03:58 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 69) 09:03:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) [ 3248.729943] loop6: detected capacity change from 0 to 256 09:03:58 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5a00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3248.757403] isofs_fill_super: get root inode failed 09:03:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3248.829598] loop3: detected capacity change from 0 to 136 [ 3248.895027] loop2: detected capacity change from 0 to 256 09:04:15 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 09:04:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:15 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x3e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) keyctl$read(0xb, r0, &(0x7f00000000c0)=""/130, 0x82) 09:04:15 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:15 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 70) 09:04:15 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6600000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:04:15 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r0) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) [ 3265.455952] loop3: detected capacity change from 0 to 136 [ 3265.465108] loop6: detected capacity change from 0 to 256 [ 3265.486413] isofs_fill_super: get root inode failed [ 3265.489525] loop2: detected capacity change from 0 to 256 [ 3265.495112] FAULT_INJECTION: forcing a failure. [ 3265.495112] name failslab, interval 1, probability 0, space 0, times 0 [ 3265.496199] CPU: 1 PID: 12735 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3265.496952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3265.497712] Call Trace: [ 3265.497952] [ 3265.498209] dump_stack_lvl+0x8f/0xb7 [ 3265.498611] should_fail_ex.cold+0x5/0xa [ 3265.499016] ? security_inode_alloc+0x38/0x160 [ 3265.499489] should_failslab+0x9/0x20 [ 3265.499871] kmem_cache_alloc+0x5a/0x410 [ 3265.500339] security_inode_alloc+0x38/0x160 [ 3265.500803] inode_init_always+0xbb2/0xea0 [ 3265.501227] alloc_inode+0x84/0x240 [ 3265.501604] new_inode_pseudo+0x17/0x80 [ 3265.501994] sock_alloc+0x40/0x260 [ 3265.502356] sock_create_lite+0x83/0x120 [ 3265.502755] __netlink_kernel_create+0xe2/0x870 [ 3265.503224] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3265.503745] ? find_held_lock+0x2c/0x110 [ 3265.504162] ? __pfx_genl_pernet_init+0x10/0x10 [ 3265.504625] genl_pernet_init+0xad/0x150 [ 3265.505028] ? __pfx_genl_pernet_init+0x10/0x10 [ 3265.505466] ? __pfx_genl_rcv+0x10/0x10 [ 3265.505851] ? __pfx_genl_bind+0x10/0x10 [ 3265.506261] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3265.506725] ? debug_mutex_init+0x37/0x70 [ 3265.507135] ops_init+0xbb/0x680 [ 3265.507507] setup_net+0x40c/0x9d0 [ 3265.507863] ? down_read_killable+0x1af/0x4a0 [ 3265.508324] ? __pfx_setup_net+0x10/0x10 [ 3265.508732] copy_net_ns+0x31c/0x760 [ 3265.509113] create_new_namespaces+0x3f6/0xb30 [ 3265.509599] copy_namespaces+0x3b7/0x4a0 [ 3265.509999] copy_process+0x29e3/0x7220 [ 3265.510378] ? lock_is_held_type+0xdb/0x130 [ 3265.510776] ? find_held_lock+0x2c/0x110 [ 3265.511203] ? __pfx_copy_process+0x10/0x10 [ 3265.511627] ? _copy_from_user+0x169/0x1f0 [ 3265.512098] kernel_clone+0xeb/0x950 [ 3265.512486] ? lock_is_held_type+0xdb/0x130 [ 3265.512891] ? __pfx_kernel_clone+0x10/0x10 [ 3265.513316] ? lock_is_held_type+0xdb/0x130 [ 3265.513745] __do_sys_clone3+0x1d9/0x370 [ 3265.514156] ? __pfx___do_sys_clone3+0x10/0x10 [ 3265.514637] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3265.515152] ? fput+0x2f/0x1a0 [ 3265.515482] ? syscall_enter_from_user_mode+0x21/0x50 [ 3265.515983] ? syscall_enter_from_user_mode+0x21/0x50 [ 3265.516503] do_syscall_64+0x3f/0x90 [ 3265.516876] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3265.517389] RIP: 0033:0x7fbd5db53b19 [ 3265.517749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3265.519369] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3265.520053] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3265.520738] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3265.521393] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3265.522014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3265.522641] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3265.523317] 09:04:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:32 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:04:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) 09:04:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8004000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:04:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 71) 09:04:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3282.555882] loop3: detected capacity change from 0 to 136 09:04:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:32 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000580), &(0x7f00000005c0)={'fscrypt:', @desc3}, &(0x7f0000000600)={0x0, "360530ac3e6828e9ad72b8888af4a1168b44768611a5c930ebec5862a32473234aaf97349ff16e06c0cb4921470d38e9c90851cab45d65340e61d9b10fef3ac7", 0x3e}, 0x48, 0x0) keyctl$negate(0xd, r0, 0x619, 0xfffffffffffffff9) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008090}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x1) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="43d5c335b82d44cd9845e4f7f44e45fb79c4ed099e666969d9f643a555a7f917d64e710e5e6f534e9bdf0feaf15b60539ee7b39553894154ad8276683e66f7e590607ec6f38ec38280c28b7eba7686a2f8741cbbd89db3adc1c2ce16743ac1f0c32ed9ed74d194d714b2197ac6ca895ca632b65a4bd3a3afb01597ecd4b8d3999775e4390ed967a40d28955a913c8682453269f6fb2ea2", 0x97, r2) keyctl$link(0x8, 0x0, r1) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='@@})\x00', r1) add_key(&(0x7f0000000440)='rxrpc\x00', &(0x7f0000000480)={'syz', 0x1}, 0xfffffffffffffffc, 0x0, r3) [ 3282.581871] loop6: detected capacity change from 0 to 256 [ 3282.584825] loop2: detected capacity change from 0 to 256 [ 3282.597667] isofs_fill_super: get root inode failed [ 3282.630413] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:04:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8100000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:04:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 72) 09:04:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f0000000140)='./file2\x00', r1, r2) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x4}], {}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) ioctl$HIDIOCGUCODE(r0, 0xc018480d, &(0x7f0000000100)={0x1, 0x1, 0x7fff, 0x0, 0x2, 0x9}) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$link(0x8, 0x0, r3) 09:04:32 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:04:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x48}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3282.779511] loop3: detected capacity change from 0 to 136 09:04:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:32 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) [ 3282.801172] FAULT_INJECTION: forcing a failure. [ 3282.801172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3282.802443] CPU: 1 PID: 12767 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3282.803180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3282.803917] Call Trace: [ 3282.804162] [ 3282.804393] dump_stack_lvl+0x8f/0xb7 [ 3282.804763] should_fail_ex.cold+0x5/0xa [ 3282.805142] _copy_from_user+0x30/0x1f0 [ 3282.805520] memdup_user+0x72/0xd0 [ 3282.805867] strndup_user+0x78/0xe0 [ 3282.806223] __x64_sys_mount+0x137/0x310 [ 3282.806628] ? __pfx___x64_sys_mount+0x10/0x10 [ 3282.807052] ? syscall_enter_from_user_mode+0x21/0x50 [ 3282.807521] ? syscall_enter_from_user_mode+0x21/0x50 [ 3282.808019] do_syscall_64+0x3f/0x90 [ 3282.808423] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3282.808914] RIP: 0033:0x7ff78264c04a [ 3282.809255] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3282.810826] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3282.811492] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3282.812127] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3282.812784] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3282.813401] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3282.814088] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3282.814745] [ 3282.838492] loop6: detected capacity change from 0 to 256 [ 3282.856758] isofs_fill_super: get root inode failed 09:04:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3282.888367] loop2: detected capacity change from 0 to 256 09:04:32 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) [ 3282.942923] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 09:04:32 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x4a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r0, 0x1) keyctl$link(0x8, 0x0, r0) 09:04:32 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 73) 09:04:32 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:32 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9202000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3283.059851] loop3: detected capacity change from 0 to 136 [ 3283.082709] loop6: detected capacity change from 0 to 256 [ 3283.096649] isofs_fill_super: get root inode failed 09:04:49 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) 09:04:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="5a55970b8e2686076ca782d2c763840f17aba400df18fc5b7b324b3a895f094cf3e786bceada66d1a42c89085c94647cb9d04242ff36a7e8f32b256a4cbf2f04d93797d4f990660ce9bb0bfcf309d99dcb5df0fffe38264fc4e2895c1636c732e4f618704507da554ca913ad9446df0ae56f6d8ec2de2c291c0f8316cf5260ed109881e9d966befba29e7bf3a5460684d7571a3b1f7a53c5758cf879e99001335a3bcbf817aea794b55c7a68e5e108afbfc3", 0xb2, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, r0) 09:04:49 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:49 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9f00000000000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:04:49 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x4c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:49 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:04:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 74) 09:04:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3300.051811] loop6: detected capacity change from 0 to 256 [ 3300.057956] loop2: detected capacity change from 0 to 256 [ 3300.063557] loop3: detected capacity change from 0 to 136 [ 3300.069563] FAULT_INJECTION: forcing a failure. [ 3300.069563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3300.070581] CPU: 1 PID: 12814 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3300.071276] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3300.071964] Call Trace: [ 3300.072196] [ 3300.072414] dump_stack_lvl+0x8f/0xb7 [ 3300.072792] should_fail_ex.cold+0x5/0xa [ 3300.073165] _copy_from_user+0x30/0x1f0 [ 3300.073542] copy_mount_options+0x7a/0x240 [ 3300.073929] ? memdup_user+0x89/0xd0 [ 3300.074286] __x64_sys_mount+0x1ac/0x310 [ 3300.074662] ? __pfx___x64_sys_mount+0x10/0x10 [ 3300.075073] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.075533] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.075994] do_syscall_64+0x3f/0x90 [ 3300.076346] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3300.076828] RIP: 0033:0x7ff78264c04a [ 3300.077163] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3300.078694] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3300.079345] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3300.079950] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3300.080568] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3300.081171] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3300.081761] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3300.082385] [ 3300.116683] isofs_fill_super: bread failed, dev=loop2, iso_blknum=64, block=128 [ 3300.129160] isofs_fill_super: get root inode failed 09:04:49 executing program 5: keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) 09:04:49 executing program 0: perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0x94, 0x1f, 0x95, 0x0, 0x40, 0x43800, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xac23, 0xa12}, 0x1, 0xfffffffffffffffe, 0x1, 0x0, 0x2, 0x6, 0x4, 0x0, 0x9, 0x0, 0xffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "39195746a1d71c9b2ea021391ccd0bd0429f585656286fd3423cba7a6bcdd8b377d16051cd01e7a6c03bb3bb353101e7c5d695f5596c747ff245ebbf6b52f53d", 0x19}, 0x48, r0) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="ee1c236a99daf90b3a668fb1fd49d3e53d8ca5bf3e50c5c38c9a4306a443ec9622bdeee54a063b7c2ff92fd0a3ddfd836a83ec4e2358e6a11bc8071099f8f0b2af8effef9c4e5ef5d8f5b8e5a9e8ba3b2610d08585a7fc820e77545a9bff532750e55f0024a84c3534bb564f7da7f1d1238bbf1c7b8d6bb8f10d871c5aed41e01b6407a2baaba3af3895c218432ecf5118c987b2c61cec902539e2462004c98dd3052a68b47c64098a2d09155bac1c16ce24ed", 0xb3, r1) keyctl$link(0x8, 0x0, r0) 09:04:49 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:04:49 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x5e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:04:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:49 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:04:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 75) 09:04:49 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) [ 3300.327833] loop2: detected capacity change from 0 to 256 [ 3300.343613] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3300.351297] loop6: detected capacity change from 0 to 256 [ 3300.366483] isofs_fill_super: get root inode failed [ 3300.389997] loop3: detected capacity change from 0 to 136 [ 3300.402178] FAULT_INJECTION: forcing a failure. [ 3300.402178] name failslab, interval 1, probability 0, space 0, times 0 [ 3300.403226] CPU: 0 PID: 12838 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3300.403933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3300.404285] FAULT_INJECTION: forcing a failure. [ 3300.404285] name failslab, interval 1, probability 0, space 0, times 0 [ 3300.404646] Call Trace: [ 3300.404655] [ 3300.404664] dump_stack_lvl+0x8f/0xb7 [ 3300.406320] should_fail_ex.cold+0x5/0xa [ 3300.406702] should_failslab+0x9/0x20 [ 3300.407047] __kmem_cache_alloc_node+0x5b/0x400 [ 3300.407466] ? selinux_sk_alloc_security+0x94/0x210 [ 3300.407910] ? _raw_spin_unlock_irqrestore+0x2c/0x60 [ 3300.408357] kmalloc_trace+0x26/0x60 [ 3300.408715] selinux_sk_alloc_security+0x94/0x210 [ 3300.409141] security_sk_alloc+0x5a/0xb0 [ 3300.409521] sk_prot_alloc+0x20b/0x280 [ 3300.409882] sk_alloc+0x38/0x760 [ 3300.410201] __netlink_create+0x63/0x340 [ 3300.410574] ? sock_create_lite+0x49/0x120 [ 3300.410959] __netlink_kernel_create+0x114/0x870 [ 3300.411398] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3300.411869] ? find_held_lock+0x2c/0x110 [ 3300.412232] ? __pfx_genl_pernet_init+0x10/0x10 [ 3300.412658] genl_pernet_init+0xad/0x150 [ 3300.413016] ? __pfx_genl_pernet_init+0x10/0x10 [ 3300.413419] ? __pfx_genl_rcv+0x10/0x10 [ 3300.413769] ? __pfx_genl_bind+0x10/0x10 [ 3300.414137] ? __pfx_netlink_tap_init_net+0x10/0x10 [ 3300.414598] ? debug_mutex_init+0x37/0x70 [ 3300.414982] ops_init+0xbb/0x680 [ 3300.415310] setup_net+0x40c/0x9d0 [ 3300.415647] ? down_read_killable+0x1af/0x4a0 [ 3300.416068] ? __pfx_setup_net+0x10/0x10 [ 3300.416450] copy_net_ns+0x31c/0x760 [ 3300.416841] create_new_namespaces+0x3f6/0xb30 [ 3300.417276] copy_namespaces+0x3b7/0x4a0 [ 3300.417662] copy_process+0x29e3/0x7220 [ 3300.418017] ? lock_is_held_type+0xdb/0x130 [ 3300.418409] ? find_held_lock+0x2c/0x110 [ 3300.418794] ? __pfx_copy_process+0x10/0x10 [ 3300.419191] ? _copy_from_user+0x169/0x1f0 [ 3300.419586] kernel_clone+0xeb/0x950 [ 3300.419921] ? lock_is_held_type+0xdb/0x130 [ 3300.420302] ? __pfx_kernel_clone+0x10/0x10 [ 3300.420702] ? lock_is_held_type+0xdb/0x130 [ 3300.421101] __do_sys_clone3+0x1d9/0x370 [ 3300.421468] ? __pfx___do_sys_clone3+0x10/0x10 [ 3300.421873] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3300.422330] ? fput+0x2f/0x1a0 [ 3300.422655] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.423134] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.423605] do_syscall_64+0x3f/0x90 [ 3300.423966] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3300.424429] RIP: 0033:0x7fbd5db53b19 [ 3300.424800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3300.426336] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3300.427007] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3300.427643] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3300.428267] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3300.428910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3300.429521] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3300.430172] [ 3300.430395] CPU: 1 PID: 12837 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3300.431179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3300.431901] Call Trace: [ 3300.432143] [ 3300.432366] dump_stack_lvl+0x8f/0xb7 [ 3300.432750] should_fail_ex.cold+0x5/0xa [ 3300.433132] ? getname_flags.part.0+0x50/0x4f0 [ 3300.433559] should_failslab+0x9/0x20 [ 3300.433922] kmem_cache_alloc+0x5a/0x410 [ 3300.434303] getname_flags.part.0+0x50/0x4f0 [ 3300.434724] getname_flags+0x9e/0xf0 [ 3300.435082] user_path_at_empty+0x2f/0x70 [ 3300.435473] __x64_sys_mount+0x1ed/0x310 [ 3300.435845] ? __pfx___x64_sys_mount+0x10/0x10 [ 3300.436265] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.436754] ? syscall_enter_from_user_mode+0x21/0x50 [ 3300.437240] do_syscall_64+0x3f/0x90 [ 3300.437598] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3300.438071] RIP: 0033:0x7ff78264c04a [ 3300.438412] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3300.439964] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3300.440667] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3300.441328] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3300.441943] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3300.442567] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3300.443196] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3300.443842] 09:05:06 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) 09:05:06 executing program 5: keyctl$join(0x1, 0x0) 09:05:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 76) 09:05:06 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$read(0xb, r1, &(0x7f0000000100)=""/100, 0x64) 09:05:06 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:05:06 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x60}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:05:06 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3317.267451] loop2: detected capacity change from 0 to 256 [ 3317.274737] loop6: detected capacity change from 0 to 256 [ 3317.281118] loop3: detected capacity change from 0 to 136 [ 3317.283995] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3317.297904] isofs_fill_super: get root inode failed 09:05:06 executing program 5: keyctl$join(0x1, 0x0) 09:05:07 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) 09:05:07 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x68}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:05:07 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:07 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 77) 09:05:07 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:07 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:05:07 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) [ 3317.518169] loop6: detected capacity change from 0 to 256 [ 3317.540137] loop3: detected capacity change from 0 to 136 [ 3317.540987] isofs_fill_super: get root inode failed [ 3317.548997] FAULT_INJECTION: forcing a failure. [ 3317.548997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3317.549917] CPU: 1 PID: 12877 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3317.550422] loop2: detected capacity change from 0 to 256 [ 3317.550495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3317.551657] Call Trace: [ 3317.551846] [ 3317.552016] dump_stack_lvl+0x8f/0xb7 [ 3317.552315] should_fail_ex.cold+0x5/0xa [ 3317.552625] strncpy_from_user+0x38/0x500 [ 3317.553086] getname_flags.part.0+0x95/0x4f0 [ 3317.553570] getname_flags+0x9e/0xf0 [ 3317.553956] user_path_at_empty+0x2f/0x70 [ 3317.554368] __x64_sys_mount+0x1ed/0x310 [ 3317.554771] ? __pfx___x64_sys_mount+0x10/0x10 [ 3317.555199] ? syscall_enter_from_user_mode+0x21/0x50 [ 3317.555711] ? syscall_enter_from_user_mode+0x21/0x50 [ 3317.556264] do_syscall_64+0x3f/0x90 [ 3317.556655] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3317.557163] RIP: 0033:0x7ff78264c04a [ 3317.557514] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3317.559173] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3317.559881] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3317.560519] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3317.561184] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3317.561816] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3317.562467] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3317.563128] [ 3317.566685] ISOFS: Logical zone size(0) < hardware blocksize(1024) 09:05:24 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) 09:05:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 78) 09:05:24 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffffffffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:05:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="cc33f4a24e4f40bc5ab63ef7c25a9eb79939ad1b50bc0661695ce3e9d3bdf27e8f90df4a6696750ecf72b1b133f8cec1d05f27f19e4c0ee4b8d28cbc57bb2d0b1e75f3c19de1a74dd53257ea4dc948053d165e47bbf69d07ee5b01d3edf73a9e64e3558973d67f910d5754b5c1cd9e52eeef6aa0e9178336ed7be68ac00e23ebfa3fca1c8a7576c9ef2d3769ca5bbb685ebd56a642fb60eed83790878bd38d91", 0xa0, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, 0x0, r0) 09:05:24 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x6c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:05:24 executing program 5: keyctl$join(0x1, 0x0) 09:05:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3334.441889] loop3: detected capacity change from 0 to 136 [ 3334.448804] FAULT_INJECTION: forcing a failure. [ 3334.448804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3334.449937] CPU: 1 PID: 12897 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3334.450136] loop6: detected capacity change from 0 to 256 [ 3334.450647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.450663] Call Trace: [ 3334.450670] [ 3334.450680] dump_stack_lvl+0x8f/0xb7 [ 3334.452691] should_fail_ex.cold+0x5/0xa [ 3334.452936] loop2: detected capacity change from 0 to 256 [ 3334.453103] _copy_from_user+0x30/0x1f0 [ 3334.453898] copy_mount_options+0x7a/0x240 [ 3334.454303] ? memdup_user+0x89/0xd0 [ 3334.454666] __x64_sys_mount+0x1ac/0x310 [ 3334.455056] ? __pfx___x64_sys_mount+0x10/0x10 [ 3334.455485] ? syscall_enter_from_user_mode+0x21/0x50 [ 3334.455963] ? syscall_enter_from_user_mode+0x21/0x50 [ 3334.456454] do_syscall_64+0x3f/0x90 [ 3334.456813] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3334.457316] RIP: 0033:0x7ff78264c04a [ 3334.457658] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.459229] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3334.459941] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3334.460578] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3334.461221] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3334.461843] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3334.462507] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3334.463120] [ 3334.467208] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3334.467993] isofs_fill_super: get root inode failed 09:05:24 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:05:24 executing program 5: keyctl$join(0x1, 0x0) 09:05:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:24 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:24 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x74}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3334.660225] loop6: detected capacity change from 0 to 256 [ 3334.662874] loop2: detected capacity change from 0 to 256 [ 3334.676401] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3334.677195] isofs_fill_super: get root inode failed 09:05:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r2) 09:05:24 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) 09:05:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 79) 09:05:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="8f99856cea34e0c94db3ced03af8f19ca1953c162e878d6ef8d16351a0ab0646512114ee6e96afdd9f", 0x29, r1) r3 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', '\'+U,'}, 0x1a, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x3}) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) [ 3334.785073] loop3: detected capacity change from 0 to 136 [ 3334.805954] FAULT_INJECTION: forcing a failure. [ 3334.805954] name failslab, interval 1, probability 0, space 0, times 0 [ 3334.806969] CPU: 0 PID: 12925 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3334.807645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3334.808302] Call Trace: [ 3334.808530] [ 3334.808740] dump_stack_lvl+0x8f/0xb7 [ 3334.809099] should_fail_ex.cold+0x5/0xa [ 3334.809462] should_failslab+0x9/0x20 [ 3334.809796] __kmem_cache_alloc_node+0x5b/0x400 [ 3334.810196] ? ops_init+0x247/0x680 [ 3334.810517] ? __pfx_genl_bind+0x10/0x10 [ 3334.810893] ? ops_init+0x247/0x680 [ 3334.811234] __kmalloc+0x46/0xc0 [ 3334.811560] ops_init+0x247/0x680 [ 3334.811899] setup_net+0x40c/0x9d0 [ 3334.812233] ? down_read_killable+0x1af/0x4a0 [ 3334.812640] ? __pfx_setup_net+0x10/0x10 [ 3334.813051] copy_net_ns+0x31c/0x760 [ 3334.813406] create_new_namespaces+0x3f6/0xb30 [ 3334.813838] copy_namespaces+0x3b7/0x4a0 [ 3334.814216] copy_process+0x29e3/0x7220 [ 3334.814567] ? lock_is_held_type+0xdb/0x130 [ 3334.814957] ? find_held_lock+0x2c/0x110 [ 3334.815354] ? __pfx_copy_process+0x10/0x10 [ 3334.815755] ? _copy_from_user+0x169/0x1f0 [ 3334.816141] kernel_clone+0xeb/0x950 [ 3334.816476] ? lock_is_held_type+0xdb/0x130 [ 3334.816879] ? __pfx_kernel_clone+0x10/0x10 [ 3334.817274] ? lock_is_held_type+0xdb/0x130 [ 3334.817665] __do_sys_clone3+0x1d9/0x370 [ 3334.818023] ? __pfx___do_sys_clone3+0x10/0x10 [ 3334.818425] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3334.818893] ? fput+0x2f/0x1a0 [ 3334.819198] ? syscall_enter_from_user_mode+0x21/0x50 [ 3334.819650] ? syscall_enter_from_user_mode+0x21/0x50 [ 3334.820111] do_syscall_64+0x3f/0x90 [ 3334.820459] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3334.820905] RIP: 0033:0x7fbd5db53b19 [ 3334.821243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3334.822761] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3334.823433] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3334.824189] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3334.824817] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3334.825457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3334.826041] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3334.826687] 09:05:41 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) 09:05:41 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffff000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:05:41 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:41 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x7a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:05:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 09:05:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 80) [ 3351.814538] loop6: detected capacity change from 0 to 256 [ 3351.829147] loop5: detected capacity change from 0 to 256 [ 3351.833008] loop2: detected capacity change from 0 to 256 [ 3351.841274] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3351.850978] isofs_fill_super: get root inode failed [ 3351.857933] loop3: detected capacity change from 0 to 136 09:05:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, r0) 09:05:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:05:41 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:05:41 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) 09:05:41 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3352.032482] loop2: detected capacity change from 0 to 256 [ 3352.053826] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3352.097196] FAULT_INJECTION: forcing a failure. [ 3352.097196] name failslab, interval 1, probability 0, space 0, times 0 [ 3352.098279] CPU: 1 PID: 12958 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3352.098965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3352.099630] Call Trace: [ 3352.099857] [ 3352.100061] dump_stack_lvl+0x8f/0xb7 [ 3352.100416] should_fail_ex.cold+0x5/0xa [ 3352.100791] should_failslab+0x9/0x20 [ 3352.101148] kmem_cache_alloc_lru+0x6b/0x760 [ 3352.101588] ? sock_alloc_inode+0x27/0x1d0 [ 3352.101954] ? __pfx_selinux_socket_create+0x10/0x10 [ 3352.102394] ? kasan_set_track+0x25/0x30 [ 3352.102774] sock_alloc_inode+0x27/0x1d0 [ 3352.103150] ? __pfx_sock_alloc_inode+0x10/0x10 [ 3352.103621] alloc_inode+0x63/0x240 [ 3352.103962] new_inode_pseudo+0x17/0x80 [ 3352.104371] sock_alloc+0x40/0x260 [ 3352.104731] sock_create_lite+0x83/0x120 [ 3352.105095] __netlink_kernel_create+0xe2/0x870 [ 3352.105551] ? __pfx_lock_release+0x10/0x10 [ 3352.105938] ? lock_release+0x3b6/0x750 [ 3352.106308] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3352.106782] audit_net_init+0x1b8/0x3f0 [ 3352.107144] ? __pfx_audit_net_init+0x10/0x10 [ 3352.107613] ? __pfx_audit_receive+0x10/0x10 [ 3352.108022] ? __pfx_audit_multicast_bind+0x10/0x10 [ 3352.108459] ? __pfx_audit_multicast_unbind+0x10/0x10 [ 3352.108930] ? lock_is_held_type+0xdb/0x130 [ 3352.109328] ? __pfx_audit_net_init+0x10/0x10 [ 3352.109737] ops_init+0xbb/0x680 [ 3352.110066] setup_net+0x40c/0x9d0 [ 3352.110399] ? down_read_killable+0x1af/0x4a0 [ 3352.110832] ? __pfx_setup_net+0x10/0x10 [ 3352.111208] copy_net_ns+0x31c/0x760 [ 3352.111554] create_new_namespaces+0x3f6/0xb30 [ 3352.111992] copy_namespaces+0x3b7/0x4a0 [ 3352.112368] copy_process+0x29e3/0x7220 [ 3352.112730] ? lock_is_held_type+0xdb/0x130 [ 3352.113120] ? find_held_lock+0x2c/0x110 [ 3352.113520] ? __pfx_copy_process+0x10/0x10 [ 3352.113915] ? _copy_from_user+0x169/0x1f0 [ 3352.114321] kernel_clone+0xeb/0x950 [ 3352.114686] ? lock_is_held_type+0xdb/0x130 [ 3352.115096] ? __pfx_kernel_clone+0x10/0x10 [ 3352.115493] ? lock_is_held_type+0xdb/0x130 [ 3352.115909] __do_sys_clone3+0x1d9/0x370 [ 3352.116283] ? __pfx___do_sys_clone3+0x10/0x10 [ 3352.116710] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3352.117194] ? fput+0x2f/0x1a0 [ 3352.117540] ? syscall_enter_from_user_mode+0x21/0x50 [ 3352.118015] ? syscall_enter_from_user_mode+0x21/0x50 [ 3352.118498] do_syscall_64+0x3f/0x90 [ 3352.118850] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3352.119332] RIP: 0033:0x7fbd5db53b19 [ 3352.119686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3352.121242] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3352.121914] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3352.122549] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3352.123166] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3352.123794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3352.124418] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3352.125065] [ 3352.125404] audit: cannot initialize netlink socket in namespace 09:06:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 81) 09:06:01 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:01 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) 09:06:01 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:01 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:01 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x9b}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "acb0669c98a660403560f768de2c9369f9ce538b351622c6baeaff11cf0440d892c9a30ae9e0c79c282f7a567412d4577cef5deb5d5884a1675506e6307ee87d", 0x11}, 0x48, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r3, 0x1) 09:06:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3371.894891] loop3: detected capacity change from 0 to 136 [ 3371.912771] loop2: detected capacity change from 0 to 256 [ 3371.921187] FAULT_INJECTION: forcing a failure. [ 3371.921187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3371.921755] loop6: detected capacity change from 0 to 256 [ 3371.922347] CPU: 1 PID: 12975 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3371.923658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3371.924420] Call Trace: [ 3371.924667] [ 3371.924930] dump_stack_lvl+0x8f/0xb7 [ 3371.925321] should_fail_ex.cold+0x5/0xa [ 3371.925823] strncpy_from_user+0x38/0x500 [ 3371.926257] getname_flags.part.0+0x95/0x4f0 [ 3371.926703] getname_flags+0x9e/0xf0 [ 3371.927095] user_path_at_empty+0x2f/0x70 [ 3371.927511] __x64_sys_mount+0x1ed/0x310 [ 3371.927920] ? __pfx___x64_sys_mount+0x10/0x10 [ 3371.928364] ? syscall_enter_from_user_mode+0x21/0x50 [ 3371.928853] ? syscall_enter_from_user_mode+0x21/0x50 [ 3371.929350] do_syscall_64+0x3f/0x90 [ 3371.929739] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3371.930242] RIP: 0033:0x7ff78264c04a [ 3371.930598] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3371.932267] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3371.932980] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3371.933659] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3371.934309] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3371.934944] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3371.935598] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3371.936273] [ 3371.937743] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3371.940537] isofs_fill_super: get root inode failed 09:06:01 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:01 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xa8}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:01 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:01 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) 09:06:01 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 82) [ 3372.158596] loop2: detected capacity change from 0 to 256 [ 3372.172920] loop6: detected capacity change from 0 to 256 [ 3372.179840] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3372.187416] isofs_fill_super: get root inode failed 09:06:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc3}, &(0x7f00000004c0)={0x0, "4edbd9bcb6d955adc2acdd3640cca838bafcda4598ba2a665c1b33f734b4a1c36bf5ae44d28bfd3157645241ad5dd2b7ec4d36710694aed81906e338f206cd8f", 0x40}, 0x48, 0xfffffffffffffffa) keyctl$invalidate(0x15, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) keyctl$invalidate(0x15, r4) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r4) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000340)={0x0, "8a25684ff158d9dbe5783202c22047a32fa395b83aa302a7006ba573d1fbef83203ced5773af70fe0549ec9229db37d1326a674f6e292a2334dd41c3a06e866c", 0x15}, 0x48, r3) keyctl$read(0xb, r1, &(0x7f00000001c0)=""/211, 0xd3) [ 3372.222910] loop3: detected capacity change from 0 to 136 [ 3372.232673] FAULT_INJECTION: forcing a failure. [ 3372.232673] name failslab, interval 1, probability 0, space 0, times 0 [ 3372.233723] CPU: 0 PID: 12998 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3372.234425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.235130] Call Trace: [ 3372.235364] [ 3372.235575] dump_stack_lvl+0x8f/0xb7 [ 3372.235939] should_fail_ex.cold+0x5/0xa [ 3372.236313] ? vfs_parse_fs_string+0xc4/0x150 [ 3372.236726] should_failslab+0x9/0x20 [ 3372.237081] __kmem_cache_alloc_node+0x5b/0x400 [ 3372.237510] ? vfs_parse_fs_string+0xc4/0x150 [ 3372.237935] ? vfs_parse_fs_string+0xc4/0x150 [ 3372.238346] __kmalloc_node_track_caller+0x43/0xb0 [ 3372.238790] kmemdup_nul+0x36/0xb0 [ 3372.239118] vfs_parse_fs_string+0xc4/0x150 [ 3372.239510] ? __pfx_vfs_parse_fs_string+0x10/0x10 [ 3372.239955] ? __kasan_kmalloc+0x82/0x90 [ 3372.240331] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 3372.240794] ? alloc_fs_context+0x5ac/0x9d0 [ 3372.241191] path_mount+0x612/0x1e30 [ 3372.241558] ? kasan_quarantine_put+0x8f/0x1f0 [ 3372.241973] ? __pfx_path_mount+0x10/0x10 [ 3372.242355] ? putname+0x102/0x140 [ 3372.242701] __x64_sys_mount+0x286/0x310 [ 3372.243073] ? __pfx___x64_sys_mount+0x10/0x10 [ 3372.243501] ? syscall_enter_from_user_mode+0x21/0x50 [ 3372.243970] do_syscall_64+0x3f/0x90 [ 3372.244312] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3372.244772] RIP: 0033:0x7ff78264c04a [ 3372.245099] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3372.246600] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3372.247246] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3372.247867] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3372.248477] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3372.249092] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3372.249743] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3372.250411] [ 3372.258478] FAULT_INJECTION: forcing a failure. [ 3372.258478] name failslab, interval 1, probability 0, space 0, times 0 [ 3372.260415] CPU: 1 PID: 12999 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3372.261141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.261893] Call Trace: [ 3372.262148] [ 3372.262381] dump_stack_lvl+0x8f/0xb7 [ 3372.262764] should_fail_ex.cold+0x5/0xa [ 3372.263147] ? security_inode_alloc+0x38/0x160 [ 3372.263590] should_failslab+0x9/0x20 [ 3372.263974] kmem_cache_alloc+0x5a/0x410 [ 3372.264354] security_inode_alloc+0x38/0x160 [ 3372.264765] inode_init_always+0xbb2/0xea0 [ 3372.265182] alloc_inode+0x84/0x240 [ 3372.265553] new_inode_pseudo+0x17/0x80 [ 3372.265931] sock_alloc+0x40/0x260 [ 3372.266284] sock_create_lite+0x83/0x120 [ 3372.266683] __netlink_kernel_create+0xe2/0x870 [ 3372.267140] ? __pfx_lock_release+0x10/0x10 [ 3372.267565] ? lock_release+0x3b6/0x750 [ 3372.267957] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3372.268473] audit_net_init+0x1b8/0x3f0 [ 3372.268848] ? __pfx_audit_net_init+0x10/0x10 [ 3372.269276] ? __pfx_audit_receive+0x10/0x10 [ 3372.269738] ? __pfx_audit_multicast_bind+0x10/0x10 [ 3372.270208] ? __pfx_audit_multicast_unbind+0x10/0x10 [ 3372.270705] ? lock_is_held_type+0xdb/0x130 [ 3372.271133] ? __pfx_audit_net_init+0x10/0x10 [ 3372.271566] ops_init+0xbb/0x680 [ 3372.271920] setup_net+0x40c/0x9d0 [ 3372.272273] ? down_read_killable+0x1af/0x4a0 [ 3372.272703] ? __pfx_setup_net+0x10/0x10 [ 3372.273098] copy_net_ns+0x31c/0x760 [ 3372.273492] create_new_namespaces+0x3f6/0xb30 [ 3372.273951] copy_namespaces+0x3b7/0x4a0 [ 3372.274364] copy_process+0x29e3/0x7220 [ 3372.274740] ? lock_is_held_type+0xdb/0x130 [ 3372.275138] ? find_held_lock+0x2c/0x110 [ 3372.275545] ? __pfx_copy_process+0x10/0x10 [ 3372.275957] ? _copy_from_user+0x169/0x1f0 [ 3372.276373] kernel_clone+0xeb/0x950 [ 3372.276734] ? lock_is_held_type+0xdb/0x130 [ 3372.277161] ? __pfx_kernel_clone+0x10/0x10 [ 3372.277633] ? lock_is_held_type+0xdb/0x130 [ 3372.278072] __do_sys_clone3+0x1d9/0x370 [ 3372.278486] ? __pfx___do_sys_clone3+0x10/0x10 [ 3372.278923] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3372.279429] ? fput+0x2f/0x1a0 [ 3372.279746] ? syscall_enter_from_user_mode+0x21/0x50 [ 3372.280242] ? syscall_enter_from_user_mode+0x21/0x50 [ 3372.280745] do_syscall_64+0x3f/0x90 [ 3372.281135] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3372.281656] RIP: 0033:0x7fbd5db53b19 [ 3372.282013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3372.283665] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3372.284361] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3372.285011] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3372.285685] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3372.286317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3372.286962] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3372.287644] [ 3372.288039] audit: cannot initialize netlink socket in namespace 09:06:01 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xb2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:01 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:21 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) 09:06:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:21 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xf0}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 83) 09:06:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="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", 0x1000, r0) [ 3391.795585] loop6: detected capacity change from 0 to 256 [ 3391.800395] loop2: detected capacity change from 0 to 256 [ 3391.804008] loop3: detected capacity change from 0 to 136 [ 3391.811991] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3391.812488] isofs_fill_super: get root inode failed 09:06:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:21 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xfc}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r0) 09:06:21 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 84) 09:06:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:21 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3392.003975] loop2: detected capacity change from 0 to 256 [ 3392.006388] loop3: detected capacity change from 0 to 136 [ 3392.019885] FAULT_INJECTION: forcing a failure. [ 3392.019885] name failslab, interval 1, probability 0, space 0, times 0 [ 3392.021008] CPU: 0 PID: 13038 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3392.021716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3392.021979] loop6: detected capacity change from 0 to 256 [ 3392.022413] Call Trace: [ 3392.022423] [ 3392.022432] dump_stack_lvl+0x8f/0xb7 [ 3392.023739] should_fail_ex.cold+0x5/0xa [ 3392.024113] should_failslab+0x9/0x20 [ 3392.024474] __kmem_cache_alloc_node+0x5b/0x400 [ 3392.024899] ? legacy_init_fs_context+0x44/0xe0 [ 3392.025329] kmalloc_trace+0x26/0x60 [ 3392.025683] legacy_init_fs_context+0x44/0xe0 09:06:21 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 81) [ 3392.026117] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 3392.026675] alloc_fs_context+0x563/0x9d0 [ 3392.027078] path_mount+0xa49/0x1e30 [ 3392.027420] ? kasan_quarantine_put+0x8f/0x1f0 [ 3392.027842] ? __pfx_path_mount+0x10/0x10 [ 3392.028225] ? putname+0x102/0x140 [ 3392.028559] __x64_sys_mount+0x286/0x310 [ 3392.028933] ? __pfx___x64_sys_mount+0x10/0x10 [ 3392.029347] ? syscall_enter_from_user_mode+0x21/0x50 [ 3392.029825] do_syscall_64+0x3f/0x90 [ 3392.030169] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3392.030622] RIP: 0033:0x7ff78264c04a [ 3392.030972] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3392.032500] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3392.033147] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3392.033773] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3392.034385] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3392.034999] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3392.035593] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3392.035634] [ 3392.036267] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3392.039423] ISOFS: Logical zone size(0) < hardware blocksize(1024) 09:06:21 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3411.922428] loop2: detected capacity change from 0 to 256 09:06:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='keyring\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r0) 09:06:41 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0xfe}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:41 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 82) 09:06:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 85) 09:06:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000", 0x50, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:41 executing program 0: waitid(0x1, 0x0, &(0x7f00000000c0), 0x4, &(0x7f0000000140)) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ptrace$getsig(0x4202, 0x0, 0x7, &(0x7f0000000200)) keyctl$link(0x8, 0x0, r0) r1 = getpgid(0x0) ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x101, 0x0, 0x1}, &(0x7f0000000300)=[{}]) r2 = getpgid(0xffffffffffffffff) ptrace$getsig(0x4202, r2, 0x9, &(0x7f0000000280)) 09:06:41 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3411.938961] loop3: detected capacity change from 0 to 136 [ 3411.945858] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3411.950033] FAULT_INJECTION: forcing a failure. [ 3411.950033] name failslab, interval 1, probability 0, space 0, times 0 [ 3411.951083] CPU: 0 PID: 13059 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3411.951794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3411.952500] Call Trace: [ 3411.952740] [ 3411.952952] dump_stack_lvl+0x8f/0xb7 [ 3411.953320] should_fail_ex.cold+0x5/0xa [ 3411.953696] ? getname_kernel+0x52/0x370 [ 3411.954101] should_failslab+0x9/0x20 [ 3411.954460] kmem_cache_alloc+0x5a/0x410 [ 3411.954840] getname_kernel+0x52/0x370 [ 3411.955233] kern_path+0x1f/0x50 [ 3411.955558] lookup_bdev+0xc7/0x270 [ 3411.955893] ? __pfx_lookup_bdev+0x10/0x10 [ 3411.956267] ? cred_has_capability.isra.0+0x143/0x2b0 [ 3411.956710] ? cred_has_capability.isra.0+0x152/0x2b0 [ 3411.957216] blkdev_get_by_path+0x75/0x2f0 [ 3411.957621] ? __pfx_blkdev_get_by_path+0x10/0x10 [ 3411.958088] ? rcu_read_lock_sched_held+0x42/0x80 [ 3411.958561] ? kfree+0x114/0x190 [ 3411.958887] mount_bdev+0x5f/0x400 [ 3411.959227] ? __pfx_isofs_fill_super+0x10/0x10 [ 3411.959659] ? __pfx_isofs_mount+0x10/0x10 [ 3411.960048] legacy_get_tree+0x109/0x220 [ 3411.960490] vfs_get_tree+0x92/0x300 [ 3411.960852] path_mount+0x1314/0x1e30 [ 3411.961213] ? kasan_quarantine_put+0x8f/0x1f0 [ 3411.961640] ? __pfx_path_mount+0x10/0x10 [ 3411.962049] ? putname+0x102/0x140 [ 3411.962412] __x64_sys_mount+0x286/0x310 [ 3411.962785] ? __pfx___x64_sys_mount+0x10/0x10 [ 3411.963209] ? syscall_enter_from_user_mode+0x21/0x50 [ 3411.963688] do_syscall_64+0x3f/0x90 [ 3411.964045] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3411.964522] RIP: 0033:0x7ff78264c04a [ 3411.964866] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3411.966425] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3411.967087] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3411.967702] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3411.968318] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3411.968928] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3411.969576] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3411.970251] [ 3411.978634] loop6: detected capacity change from 0 to 256 [ 3411.991535] ISOFS: Logical zone size(0) < hardware blocksize(1024) 09:06:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$read(0xb, 0x0, &(0x7f0000000200)=""/4096, 0x1000) 09:06:41 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:41 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:41 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x104}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 86) [ 3412.203225] loop2: detected capacity change from 0 to 256 09:06:41 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 83) [ 3412.222058] loop6: detected capacity change from 0 to 256 [ 3412.233982] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3412.240166] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3412.283001] loop3: detected capacity change from 0 to 136 09:06:41 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 09:06:41 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x105}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:41 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:06:42 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 87) [ 3412.449085] loop6: detected capacity change from 0 to 256 09:06:42 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x106}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:42 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x4]}, 0x8, 0x80000) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$link(0x8, r1, r0) [ 3412.539403] loop3: detected capacity change from 0 to 136 09:06:42 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:06:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00"/120, 0x78, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3412.674856] loop6: detected capacity change from 0 to 256 09:06:59 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 88) 09:06:59 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 84) 09:06:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, 0x0) 09:06:59 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) 09:06:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x107}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3430.096933] loop3: detected capacity change from 0 to 136 [ 3430.099938] FAULT_INJECTION: forcing a failure. [ 3430.099938] name failslab, interval 1, probability 0, space 0, times 0 [ 3430.101052] CPU: 0 PID: 13123 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3430.101806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3430.102551] Call Trace: [ 3430.102797] [ 3430.103028] dump_stack_lvl+0x8f/0xb7 [ 3430.103402] should_fail_ex.cold+0x5/0xa [ 3430.103787] ? vfs_parse_fs_string+0xc4/0x150 [ 3430.104205] should_failslab+0x9/0x20 [ 3430.104569] __kmem_cache_alloc_node+0x5b/0x400 [ 3430.105012] ? vfs_parse_fs_string+0xc4/0x150 [ 3430.105467] ? vfs_parse_fs_string+0xc4/0x150 [ 3430.105900] __kmalloc_node_track_caller+0x43/0xb0 [ 3430.106401] kmemdup_nul+0x36/0xb0 [ 3430.106758] vfs_parse_fs_string+0xc4/0x150 [ 3430.107167] ? __pfx_vfs_parse_fs_string+0x10/0x10 [ 3430.107637] ? __kasan_kmalloc+0x82/0x90 [ 3430.108037] ? __pfx_legacy_init_fs_context+0x10/0x10 [ 3430.108527] ? alloc_fs_context+0x5ac/0x9d0 [ 3430.108941] path_mount+0x612/0x1e30 [ 3430.109316] ? kasan_quarantine_put+0x8f/0x1f0 [ 3430.109751] ? __pfx_path_mount+0x10/0x10 [ 3430.110156] ? putname+0x102/0x140 [ 3430.110549] __x64_sys_mount+0x286/0x310 [ 3430.110949] ? __pfx___x64_sys_mount+0x10/0x10 [ 3430.111405] ? syscall_enter_from_user_mode+0x21/0x50 [ 3430.111901] do_syscall_64+0x3f/0x90 [ 3430.112267] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3430.112751] RIP: 0033:0x7ff78264c04a [ 3430.113126] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3430.114711] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3430.115406] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3430.116048] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3430.116682] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3430.117327] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3430.117983] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3430.118676] [ 3430.139812] loop6: detected capacity change from 0 to 256 [ 3430.145383] loop2: detected capacity change from 0 to 256 [ 3430.164423] isofs_fill_super: get root inode failed 09:06:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x114}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:06:59 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:06:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:06:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='syz', r0) keyctl$read(0xb, r1, &(0x7f0000000140)=""/2, 0x2) 09:06:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 85) [ 3430.381939] loop6: detected capacity change from 0 to 256 [ 3430.392122] loop2: detected capacity change from 0 to 256 [ 3430.406463] isofs_fill_super: get root inode failed [ 3430.416361] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3430.421723] isofs_fill_super: get root inode failed 09:07:17 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 89) 09:07:17 executing program 6: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x12, 0x0, r0) 09:07:17 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018", 0x8c, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:07:17 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x134}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:17 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x48b, 0x80001) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x2, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008084}, 0x44044) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) 09:07:17 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:17 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 86) [ 3447.992265] loop2: detected capacity change from 0 to 256 [ 3447.996015] loop3: detected capacity change from 0 to 136 [ 3448.008132] isofs_fill_super: get root inode failed 09:07:17 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 1) 09:07:17 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x148}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3448.155082] FAULT_INJECTION: forcing a failure. [ 3448.155082] name failslab, interval 1, probability 0, space 0, times 0 [ 3448.156184] CPU: 1 PID: 13182 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3448.156900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3448.157641] Call Trace: [ 3448.157878] [ 3448.158088] dump_stack_lvl+0x8f/0xb7 [ 3448.158451] should_fail_ex.cold+0x5/0xa [ 3448.158846] should_failslab+0x9/0x20 [ 3448.159206] __kmem_cache_alloc_node+0x5b/0x400 [ 3448.159675] ? __do_sys_memfd_create+0xac/0x4e0 [ 3448.160109] ? __do_sys_memfd_create+0xac/0x4e0 [ 3448.160577] __kmalloc+0x46/0xc0 [ 3448.160903] __do_sys_memfd_create+0xac/0x4e0 [ 3448.161322] do_syscall_64+0x3f/0x90 [ 3448.161683] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3448.162147] RIP: 0033:0x7f106c5aab19 [ 3448.162515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3448.164084] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3448.164749] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3448.165369] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3448.165993] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3448.166685] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3448.167316] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3448.167989] 09:07:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:07:35 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="02434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:35 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:35 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 87) 09:07:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 90) 09:07:35 executing program 0: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r2) keyctl$invalidate(0x15, r2) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="69d138f6a91081e7937fbcdf7761344fa294e371741abc502482a869e4706d3198d8ba48302a679b13819006b87a51bf92193f3a435abe37bfd3ed96ea64967a5633b1dc908a880f551a232eb10fdc7947e72001345b5b8ca133594a24e0b491ee31dcfa438713c2873c3c545e3b059cd6455ff50cbecae044130a4c032e996a4825d7db511affcc1cd6f8a84ff5957d10dd16e13b9b40dbeeefe6bbe369f508ec34a818eb98388b4dcaab7c7ddbd32f0a466419fc286eb0083a008d7e0b8d344aca917381e4335502efcaab36c97a0c01e96f3204d179b5759e38a9c561377258bb35247b21d4c8a6dd0bbe8aee00f836aa17382c21ff87", 0xf8, 0xfffffffffffffffb) keyctl$search(0xa, r3, &(0x7f0000000000)='.request_key_auth\x00', &(0x7f00000002c0)={'syz', 0x3}, r0) 09:07:35 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x150}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 2) [ 3466.105029] loop6: detected capacity change from 0 to 256 [ 3466.105640] loop2: detected capacity change from 0 to 256 [ 3466.112111] loop3: detected capacity change from 0 to 136 [ 3466.116855] FAULT_INJECTION: forcing a failure. [ 3466.116855] name failslab, interval 1, probability 0, space 0, times 0 [ 3466.117865] CPU: 0 PID: 13203 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3466.118585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3466.119323] Call Trace: [ 3466.119565] [ 3466.119782] dump_stack_lvl+0x8f/0xb7 [ 3466.120157] should_fail_ex.cold+0x5/0xa [ 3466.120559] should_failslab+0x9/0x20 [ 3466.120933] __kmem_cache_alloc_node+0x5b/0x400 [ 3466.121365] ? uevent_net_init+0xd6/0x300 [ 3466.121770] ? __pfx_uevent_net_init+0x10/0x10 [ 3466.122208] kmalloc_trace+0x26/0x60 [ 3466.122566] ? __pfx_uevent_net_init+0x10/0x10 [ 3466.123015] uevent_net_init+0xd6/0x300 [ 3466.123393] ? __pfx_uevent_net_init+0x10/0x10 [ 3466.123834] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3466.124268] ? lock_is_held_type+0xdb/0x130 [ 3466.124681] ops_init+0xbb/0x680 [ 3466.125006] setup_net+0x40c/0x9d0 [ 3466.125356] ? down_read_killable+0x1af/0x4a0 [ 3466.125781] ? __pfx_setup_net+0x10/0x10 [ 3466.126175] copy_net_ns+0x31c/0x760 [ 3466.126533] create_new_namespaces+0x3f6/0xb30 [ 3466.126987] copy_namespaces+0x3b7/0x4a0 [ 3466.127373] copy_process+0x29e3/0x7220 [ 3466.127742] ? lock_is_held_type+0xdb/0x130 [ 3466.128143] ? find_held_lock+0x2c/0x110 [ 3466.128549] ? __pfx_copy_process+0x10/0x10 [ 3466.128956] ? _copy_from_user+0x169/0x1f0 [ 3466.129367] kernel_clone+0xeb/0x950 [ 3466.129721] ? lock_is_held_type+0xdb/0x130 [ 3466.130109] ? __pfx_kernel_clone+0x10/0x10 [ 3466.130518] ? lock_is_held_type+0xdb/0x130 [ 3466.130950] __do_sys_clone3+0x1d9/0x370 [ 3466.131327] ? __pfx___do_sys_clone3+0x10/0x10 [ 3466.131744] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3466.132228] ? fput+0x2f/0x1a0 [ 3466.132546] ? syscall_enter_from_user_mode+0x21/0x50 [ 3466.133016] ? syscall_enter_from_user_mode+0x21/0x50 [ 3466.133498] do_syscall_64+0x3f/0x90 [ 3466.133865] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3466.134351] RIP: 0033:0x7fbd5db53b19 [ 3466.134691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3466.136255] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3466.136917] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3466.137547] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3466.138169] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3466.138827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3466.139444] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3466.140087] [ 3466.158368] isofs_fill_super: get root inode failed [ 3466.190431] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3466.194852] isofs_fill_super: get root inode failed 09:07:35 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="03434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:35 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 91) 09:07:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, 0x0, r0) 09:07:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:07:35 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 88) [ 3466.316647] loop3: detected capacity change from 0 to 136 [ 3466.318762] FAULT_INJECTION: forcing a failure. [ 3466.318762] name failslab, interval 1, probability 0, space 0, times 0 [ 3466.320391] CPU: 0 PID: 13214 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3466.321149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3466.321895] Call Trace: [ 3466.322148] [ 3466.322380] dump_stack_lvl+0x8f/0xb7 [ 3466.322814] should_fail_ex.cold+0x5/0xa [ 3466.323215] should_failslab+0x9/0x20 [ 3466.323587] __kmem_cache_alloc_node+0x5b/0x400 [ 3466.324037] ? security_sb_alloc+0x10f/0x250 [ 3466.324473] ? security_sb_alloc+0x10f/0x250 [ 3466.324905] __kmalloc+0x46/0xc0 [ 3466.325246] security_sb_alloc+0x10f/0x250 [ 3466.325677] alloc_super+0x236/0xb00 [ 3466.326044] ? __pfx_test_bdev_super+0x10/0x10 [ 3466.326484] sget+0x10f/0x560 [ 3466.326816] ? __pfx_set_bdev_super+0x10/0x10 [ 3466.327248] mount_bdev+0xfc/0x400 [ 3466.327596] ? __pfx_isofs_fill_super+0x10/0x10 [ 3466.328034] ? __pfx_isofs_mount+0x10/0x10 [ 3466.328434] legacy_get_tree+0x109/0x220 [ 3466.328830] vfs_get_tree+0x92/0x300 [ 3466.329190] path_mount+0x1314/0x1e30 [ 3466.329558] ? kasan_quarantine_put+0x8f/0x1f0 [ 3466.329995] ? __pfx_path_mount+0x10/0x10 [ 3466.330394] ? putname+0x102/0x140 [ 3466.330799] __x64_sys_mount+0x286/0x310 [ 3466.331214] ? __pfx___x64_sys_mount+0x10/0x10 [ 3466.331634] ? syscall_enter_from_user_mode+0x21/0x50 [ 3466.332130] do_syscall_64+0x3f/0x90 [ 3466.332501] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3466.332985] RIP: 0033:0x7ff78264c04a [ 3466.333327] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3466.334902] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3466.335577] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3466.336204] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3466.336825] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3466.337473] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3466.338123] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3466.338827] 09:07:35 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 3) [ 3466.358644] loop2: detected capacity change from 0 to 256 [ 3466.410683] isofs_fill_super: get root inode failed 09:07:36 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x54, 0x1, 0x4, 0x101, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x6}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x5}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xffffffff}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x4}, @NFULA_CFG_MODE={0xa, 0x2, {0x8000}}, @NFULA_CFG_MODE={0xa, 0x2, {0x8001, 0x1}}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x54}}, 0xc000) r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r0, 0x2, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x2004c011}, 0x20008004) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) r2 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, r1) keyctl$unlink(0x9, r2, r1) [ 3466.450525] FAULT_INJECTION: forcing a failure. [ 3466.450525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3466.451785] CPU: 1 PID: 13226 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3466.452547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3466.453296] Call Trace: [ 3466.453542] [ 3466.453761] dump_stack_lvl+0x8f/0xb7 [ 3466.454146] should_fail_ex.cold+0x5/0xa [ 3466.454561] _copy_from_user+0x30/0x1f0 [ 3466.454992] __do_sys_memfd_create+0x103/0x4e0 [ 3466.455464] do_syscall_64+0x3f/0x90 [ 3466.455850] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3466.456340] RIP: 0033:0x7f106c5aab19 [ 3466.456698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3466.458290] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3466.458997] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3466.459653] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3466.460299] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3466.460945] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3466.461580] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3466.462232] 09:07:36 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="04434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:53 executing program 0: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r0, @ANYBLOB="00042cbd7000fddbdf250400000014000300ff020000000000534536b600000000012400070073797374656d5f753a6f626a6563745f723a6574635f6d61696c5f743a7330001400030000000000000000000000ffff6401010008000500ac1414bb14000200fe80000000000000000000000000002014000300ff01000000000000000000000000000114000600766574000000006f5f687372000000001400060076657468315f746f5f627269646765002700070073797374656d5f753a6f626a6563745f723a64686370635f73746174655f743a73300000"], 0xe0}, 0x1, 0x0, 0x0, 0x2000000}, 0x8000) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x90) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x2c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0xffffffffffffffe6, 0x2b, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0x0, 0x2d, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) 09:07:53 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x15f}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:53 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="05434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 92) 09:07:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf0000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001814000000000000000000", 0x96, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:07:53 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:53 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 4) 09:07:53 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 89) [ 3483.839647] loop2: detected capacity change from 0 to 256 [ 3483.843628] loop3: detected capacity change from 0 to 136 [ 3483.847042] FAULT_INJECTION: forcing a failure. [ 3483.847042] name failslab, interval 1, probability 0, space 0, times 0 [ 3483.848271] CPU: 1 PID: 13254 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3483.848369] FAULT_INJECTION: forcing a failure. [ 3483.848369] name failslab, interval 1, probability 0, space 0, times 0 [ 3483.849006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3483.850821] Call Trace: [ 3483.851133] [ 3483.851361] dump_stack_lvl+0x8f/0xb7 [ 3483.851759] should_fail_ex.cold+0x5/0xa [ 3483.852181] should_failslab+0x9/0x20 [ 3483.852566] kmem_cache_alloc_lru+0x6b/0x760 [ 3483.853001] ? shmem_alloc_inode+0x27/0x50 [ 3483.853432] ? lock_release+0x3b6/0x750 [ 3483.853836] ? alloc_fd+0x2d8/0x6e0 [ 3483.854220] shmem_alloc_inode+0x27/0x50 [ 3483.854616] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 3483.855088] alloc_inode+0x63/0x240 [ 3483.855461] new_inode+0x25/0x1f0 [ 3483.855813] shmem_get_inode+0x191/0xdb0 [ 3483.856245] __shmem_file_setup+0xb8/0x320 [ 3483.856681] __do_sys_memfd_create+0x1ca/0x4e0 [ 3483.857152] do_syscall_64+0x3f/0x90 [ 3483.857538] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3483.858042] RIP: 0033:0x7f106c5aab19 [ 3483.858422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3483.860040] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3483.860743] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3483.861375] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3483.862003] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3483.862637] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3483.863311] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3483.863970] [ 3483.864198] CPU: 0 PID: 13252 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3483.865021] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3483.865771] Call Trace: [ 3483.866012] [ 3483.866230] dump_stack_lvl+0x8f/0xb7 [ 3483.866631] should_fail_ex.cold+0x5/0xa [ 3483.867049] should_failslab+0x9/0x20 [ 3483.867431] kmem_cache_alloc_lru+0x6b/0x760 [ 3483.867843] ? sock_alloc_inode+0x27/0x1d0 [ 3483.868243] ? __pfx_selinux_socket_create+0x10/0x10 [ 3483.868717] sock_alloc_inode+0x27/0x1d0 [ 3483.869118] ? __pfx_sock_alloc_inode+0x10/0x10 [ 3483.869567] alloc_inode+0x63/0x240 [ 3483.869945] new_inode_pseudo+0x17/0x80 [ 3483.870348] sock_alloc+0x40/0x260 [ 3483.870709] sock_create_lite+0x83/0x120 [ 3483.871123] __netlink_kernel_create+0xe2/0x870 [ 3483.871587] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3483.872094] ? __pfx_uevent_net_init+0x10/0x10 [ 3483.872541] uevent_net_init+0xfb/0x300 [ 3483.872925] ? __pfx_uevent_net_init+0x10/0x10 [ 3483.873380] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3483.873834] ? lock_is_held_type+0xdb/0x130 [ 3483.874252] ops_init+0xbb/0x680 [ 3483.874607] setup_net+0x40c/0x9d0 [ 3483.874975] ? down_read_killable+0x1af/0x4a0 [ 3483.875425] ? __pfx_setup_net+0x10/0x10 [ 3483.875835] copy_net_ns+0x31c/0x760 [ 3483.876201] create_new_namespaces+0x3f6/0xb30 [ 3483.876657] copy_namespaces+0x3b7/0x4a0 [ 3483.877054] copy_process+0x29e3/0x7220 [ 3483.877437] ? lock_is_held_type+0xdb/0x130 [ 3483.877846] ? find_held_lock+0x2c/0x110 [ 3483.878248] ? __pfx_copy_process+0x10/0x10 [ 3483.878663] ? _copy_from_user+0x169/0x1f0 [ 3483.879102] kernel_clone+0xeb/0x950 [ 3483.879453] ? lock_is_held_type+0xdb/0x130 [ 3483.879854] ? __pfx_kernel_clone+0x10/0x10 [ 3483.880283] ? lock_is_held_type+0xdb/0x130 [ 3483.880729] __do_sys_clone3+0x1d9/0x370 [ 3483.881117] ? __pfx___do_sys_clone3+0x10/0x10 [ 3483.881560] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3483.882049] ? fput+0x2f/0x1a0 [ 3483.882375] ? syscall_enter_from_user_mode+0x21/0x50 [ 3483.882868] ? syscall_enter_from_user_mode+0x21/0x50 [ 3483.883377] do_syscall_64+0x3f/0x90 [ 3483.883742] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3483.884223] RIP: 0033:0x7fbd5db53b19 [ 3483.884576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3483.886157] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3483.886832] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3483.887502] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3483.888129] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3483.888771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3483.889434] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3483.890111] [ 3483.890484] kobject_uevent: unable to create netlink socket! [ 3483.892783] isofs_fill_super: get root inode failed 09:07:53 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="06434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:07:53 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x1d6}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) 09:07:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:07:53 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 93) 09:07:53 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:07:53 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 5) 09:07:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$get_keyring_id(0x0, r1, 0x6) 09:07:53 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 90) [ 3484.140574] loop2: detected capacity change from 0 to 256 [ 3484.166232] isofs_fill_super: get root inode failed [ 3484.179683] loop6: detected capacity change from 0 to 256 [ 3484.202518] loop3: detected capacity change from 0 to 136 [ 3484.205193] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3484.210706] isofs_fill_super: get root inode failed 09:08:11 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 91) 09:08:11 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="07434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:11 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 94) 09:08:11 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x1e2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:08:11 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$link(0x8, 0x0, r0) 09:08:11 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 6) [ 3501.479846] loop2: detected capacity change from 0 to 256 [ 3501.493282] FAULT_INJECTION: forcing a failure. [ 3501.493282] name failslab, interval 1, probability 0, space 0, times 0 [ 3501.494447] CPU: 1 PID: 13298 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3501.495114] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3501.495794] Call Trace: [ 3501.496019] [ 3501.496216] dump_stack_lvl+0x8f/0xb7 [ 3501.496568] should_fail_ex.cold+0x5/0xa [ 3501.496964] ? security_inode_alloc+0x38/0x160 [ 3501.497409] should_failslab+0x9/0x20 [ 3501.497775] kmem_cache_alloc+0x5a/0x410 [ 3501.497775] FAULT_INJECTION: forcing a failure. [ 3501.497775] name failslab, interval 1, probability 0, space 0, times 0 [ 3501.498160] security_inode_alloc+0x38/0x160 [ 3501.499490] inode_init_always+0xbb2/0xea0 [ 3501.499861] alloc_inode+0x84/0x240 [ 3501.500208] new_inode+0x25/0x1f0 [ 3501.500530] shmem_get_inode+0x191/0xdb0 [ 3501.500928] __shmem_file_setup+0xb8/0x320 [ 3501.501339] __do_sys_memfd_create+0x1ca/0x4e0 [ 3501.501780] do_syscall_64+0x3f/0x90 [ 3501.502156] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3501.502622] RIP: 0033:0x7f106c5aab19 [ 3501.502966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3501.504414] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3501.505094] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3501.505689] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3501.506294] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3501.506875] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3501.507478] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3501.508108] [ 3501.508330] CPU: 0 PID: 13301 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3501.509101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3501.509817] Call Trace: [ 3501.510055] [ 3501.510265] dump_stack_lvl+0x8f/0xb7 [ 3501.510628] should_fail_ex.cold+0x5/0xa [ 3501.511008] ? security_inode_alloc+0x38/0x160 [ 3501.511456] should_failslab+0x9/0x20 [ 3501.511804] kmem_cache_alloc+0x5a/0x410 [ 3501.512180] security_inode_alloc+0x38/0x160 [ 3501.512590] inode_init_always+0xbb2/0xea0 [ 3501.512975] alloc_inode+0x84/0x240 [ 3501.513326] new_inode_pseudo+0x17/0x80 [ 3501.513695] sock_alloc+0x40/0x260 [ 3501.514042] sock_create_lite+0x83/0x120 [ 3501.514428] __netlink_kernel_create+0xe2/0x870 [ 3501.514873] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3501.515433] ? __pfx_uevent_net_init+0x10/0x10 [ 3501.515856] uevent_net_init+0xfb/0x300 [ 3501.516233] ? __pfx_uevent_net_init+0x10/0x10 [ 3501.516664] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3501.517093] ? lock_is_held_type+0xdb/0x130 [ 3501.517493] ops_init+0xbb/0x680 [ 3501.517825] setup_net+0x40c/0x9d0 [ 3501.518164] ? down_read_killable+0x1af/0x4a0 [ 3501.518590] ? __pfx_setup_net+0x10/0x10 [ 3501.518987] copy_net_ns+0x31c/0x760 [ 3501.519357] create_new_namespaces+0x3f6/0xb30 [ 3501.519789] copy_namespaces+0x3b7/0x4a0 [ 3501.520162] copy_process+0x29e3/0x7220 [ 3501.520525] ? lock_is_held_type+0xdb/0x130 [ 3501.520912] ? find_held_lock+0x2c/0x110 [ 3501.521307] ? __pfx_copy_process+0x10/0x10 [ 3501.521710] ? _copy_from_user+0x169/0x1f0 [ 3501.522144] kernel_clone+0xeb/0x950 [ 3501.522513] ? lock_is_held_type+0xdb/0x130 [ 3501.522909] ? __pfx_kernel_clone+0x10/0x10 [ 3501.523354] ? lock_is_held_type+0xdb/0x130 [ 3501.523761] __do_sys_clone3+0x1d9/0x370 [ 3501.524125] ? __pfx___do_sys_clone3+0x10/0x10 [ 3501.524534] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3501.525004] ? fput+0x2f/0x1a0 [ 3501.525321] ? syscall_enter_from_user_mode+0x21/0x50 [ 3501.525781] ? syscall_enter_from_user_mode+0x21/0x50 [ 3501.526294] do_syscall_64+0x3f/0x90 [ 3501.526649] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3501.527155] RIP: 0033:0x7fbd5db53b19 [ 3501.527507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3501.528993] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3501.529644] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3501.530295] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3501.530890] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3501.531521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3501.532105] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3501.532725] [ 3501.533121] kobject_uevent: unable to create netlink socket! [ 3501.535247] isofs_fill_super: get root inode failed [ 3501.536121] loop3: detected capacity change from 0 to 136 09:08:11 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x258}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:11 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0f434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 95) 09:08:11 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f0000000100)={'fscrypt:', @auto=[0x66, 0x34, 0x33, 0x66, 0x9, 0x61, 0x62, 0x30, 0x7, 0x30, 0x33, 0x34, 0x66, 0x38, 0x66, 0x37]}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60", 0x16}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$invalidate(0x15, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) 09:08:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000", 0x9b, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3501.709712] loop3: detected capacity change from 0 to 136 [ 3501.731766] loop2: detected capacity change from 0 to 256 [ 3501.752239] isofs_fill_super: get root inode failed 09:08:28 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 7) 09:08:28 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 96) 09:08:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 92) 09:08:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:08:28 executing program 5: clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:28 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="1b434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:28 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x260}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:28 executing program 0: open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x80000) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$read(0xb, r1, &(0x7f00000000c0)=""/87, 0x57) [ 3519.046035] loop3: detected capacity change from 0 to 136 [ 3519.070121] loop2: detected capacity change from 0 to 256 [ 3519.076707] loop6: detected capacity change from 0 to 256 [ 3519.108553] isofs_fill_super: get root inode failed [ 3519.113788] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3519.122385] isofs_fill_super: get root inode failed 09:08:28 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="27434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:28 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 97) 09:08:28 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x28d}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$read(0xb, r1, &(0x7f00000000c0)=""/71, 0x47) 09:08:28 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 8) 09:08:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:08:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 93) 09:08:28 executing program 5: clone3(0x0, 0x0) [ 3519.308933] loop3: detected capacity change from 0 to 136 [ 3519.319726] loop2: detected capacity change from 0 to 256 [ 3519.350410] isofs_fill_super: get root inode failed [ 3519.363035] FAULT_INJECTION: forcing a failure. [ 3519.363035] name failslab, interval 1, probability 0, space 0, times 0 [ 3519.364331] CPU: 1 PID: 13356 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3519.365045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3519.365767] Call Trace: [ 3519.366005] [ 3519.366223] dump_stack_lvl+0x8f/0xb7 [ 3519.366598] should_fail_ex.cold+0x5/0xa [ 3519.366982] should_failslab+0x9/0x20 [ 3519.367339] kmem_cache_alloc_lru+0x6b/0x760 [ 3519.367759] ? __d_alloc+0x31/0x9c0 [ 3519.368108] __d_alloc+0x31/0x9c0 [ 3519.368445] ? get_random_u32+0x406/0x6e0 [ 3519.368829] d_alloc_pseudo+0x1d/0x70 [ 3519.369180] alloc_file_pseudo+0xd2/0x260 [ 3519.369568] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3519.370037] ? shmem_get_inode+0x6b2/0xdb0 [ 3519.370443] __shmem_file_setup+0x144/0x320 [ 3519.370874] __do_sys_memfd_create+0x1ca/0x4e0 [ 3519.371308] do_syscall_64+0x3f/0x90 [ 3519.371684] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3519.372147] RIP: 0033:0x7f106c5aab19 [ 3519.372480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.374045] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3519.374731] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3519.375348] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3519.375963] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3519.376575] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3519.377225] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3519.377892] [ 3519.403229] FAULT_INJECTION: forcing a failure. [ 3519.403229] name failslab, interval 1, probability 0, space 0, times 0 [ 3519.404379] CPU: 0 PID: 13359 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3519.405082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3519.405797] Call Trace: [ 3519.406040] [ 3519.406256] dump_stack_lvl+0x8f/0xb7 [ 3519.406630] should_fail_ex.cold+0x5/0xa [ 3519.407017] should_failslab+0x9/0x20 [ 3519.407376] __kmem_cache_alloc_node+0x5b/0x400 [ 3519.407815] ? sk_prot_alloc+0x157/0x280 [ 3519.408215] ? sk_prot_alloc+0x157/0x280 [ 3519.408605] __kmalloc+0x46/0xc0 [ 3519.408941] sk_prot_alloc+0x157/0x280 [ 3519.409315] sk_alloc+0x38/0x760 [ 3519.409653] __netlink_create+0x63/0x340 [ 3519.410074] ? sock_create_lite+0x49/0x120 [ 3519.410475] __netlink_kernel_create+0x114/0x870 [ 3519.410956] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3519.411477] ? __pfx_uevent_net_init+0x10/0x10 [ 3519.411908] uevent_net_init+0xfb/0x300 [ 3519.412281] ? __pfx_uevent_net_init+0x10/0x10 [ 3519.412726] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3519.413181] ? lock_is_held_type+0xdb/0x130 [ 3519.413599] ops_init+0xbb/0x680 [ 3519.413963] setup_net+0x40c/0x9d0 [ 3519.414307] ? down_read_killable+0x1af/0x4a0 [ 3519.414732] ? __pfx_setup_net+0x10/0x10 [ 3519.415126] copy_net_ns+0x31c/0x760 [ 3519.415501] create_new_namespaces+0x3f6/0xb30 [ 3519.415954] copy_namespaces+0x3b7/0x4a0 [ 3519.416349] copy_process+0x29e3/0x7220 [ 3519.416750] ? lock_is_held_type+0xdb/0x130 [ 3519.417146] ? find_held_lock+0x2c/0x110 [ 3519.417553] ? __pfx_copy_process+0x10/0x10 [ 3519.417959] ? _copy_from_user+0x169/0x1f0 [ 3519.418358] kernel_clone+0xeb/0x950 [ 3519.418733] ? lock_is_held_type+0xdb/0x130 [ 3519.419141] ? __pfx_kernel_clone+0x10/0x10 [ 3519.419577] ? lock_is_held_type+0xdb/0x130 [ 3519.419995] __do_sys_clone3+0x1d9/0x370 [ 3519.420373] ? __pfx___do_sys_clone3+0x10/0x10 [ 3519.420820] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3519.421296] ? fput+0x2f/0x1a0 [ 3519.421617] ? syscall_enter_from_user_mode+0x21/0x50 [ 3519.422083] ? syscall_enter_from_user_mode+0x21/0x50 [ 3519.422562] do_syscall_64+0x3f/0x90 [ 3519.422935] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3519.423434] RIP: 0033:0x7fbd5db53b19 [ 3519.423796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.425332] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3519.426009] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3519.426633] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3519.427293] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3519.427974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3519.428586] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3519.429238] [ 3519.429691] kobject_uevent: unable to create netlink socket! 09:08:29 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 98) 09:08:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022", 0x9d, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:08:29 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="fe434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:29 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="e92440d39d5845667edcf496c31fa10dfd704ec254deacfdac1214b931accdfb720731b1a657f03a23dba36184ad041db5c341a1f2d5f21410edbd5f8abf781b02abb7ea01e20caba3d28af4407f24a99b5076a6cbcfd999cd8bcf05782006a0c93336f2", 0x64, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$read(0xb, r2, &(0x7f0000000200)=""/45, 0x2d) keyctl$link(0x8, 0x0, r0) 09:08:29 executing program 5: clone3(0x0, 0x0) [ 3519.549603] loop3: detected capacity change from 0 to 136 [ 3519.558669] FAULT_INJECTION: forcing a failure. [ 3519.558669] name failslab, interval 1, probability 0, space 0, times 0 [ 3519.559877] CPU: 0 PID: 13364 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3519.560620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3519.561335] Call Trace: [ 3519.561584] [ 3519.561810] dump_stack_lvl+0x8f/0xb7 [ 3519.562199] should_fail_ex.cold+0x5/0xa [ 3519.562590] should_failslab+0x9/0x20 [ 3519.562950] __kmem_cache_alloc_node+0x5b/0x400 [ 3519.563379] ? __list_lru_init+0xcb/0x610 [ 3519.563785] ? __list_lru_init+0xcb/0x610 [ 3519.564174] __kmalloc+0x46/0xc0 [ 3519.564516] __list_lru_init+0xcb/0x610 [ 3519.564895] alloc_super+0x91d/0xb00 [ 3519.565245] ? __pfx_test_bdev_super+0x10/0x10 [ 3519.565669] sget+0x10f/0x560 [ 3519.565983] ? __pfx_set_bdev_super+0x10/0x10 [ 3519.566428] mount_bdev+0xfc/0x400 [ 3519.566773] ? __pfx_isofs_fill_super+0x10/0x10 [ 3519.567216] ? __pfx_isofs_mount+0x10/0x10 [ 3519.567625] legacy_get_tree+0x109/0x220 [ 3519.568019] vfs_get_tree+0x92/0x300 [ 3519.568384] path_mount+0x1314/0x1e30 [ 3519.568765] ? kasan_quarantine_put+0x8f/0x1f0 [ 3519.569200] ? __pfx_path_mount+0x10/0x10 [ 3519.569613] ? putname+0x102/0x140 [ 3519.569975] __x64_sys_mount+0x286/0x310 [ 3519.570359] ? __pfx___x64_sys_mount+0x10/0x10 [ 3519.570785] ? syscall_enter_from_user_mode+0x21/0x50 [ 3519.571269] do_syscall_64+0x3f/0x90 [ 3519.571673] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3519.572150] RIP: 0033:0x7ff78264c04a [ 3519.572509] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3519.574085] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3519.574771] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3519.575399] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3519.576052] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3519.576694] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3519.577332] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3519.578025] [ 3519.606440] loop2: detected capacity change from 0 to 256 [ 3519.621353] isofs_fill_super: get root inode failed 09:08:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:08:46 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x300}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:46 executing program 5: clone3(0x0, 0x0) 09:08:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="86b164298075fb34df7dcacf4b936f0e532f0a43eac6129ffe8478acb565559ca5ba2971527578bb6374a8fb244aaffa6f1e05fd057af7cc8c8abc58d16e535f8529e8c9013ea519ca41aade181ff7775a3c97877bdf9336bdc30435d81e89df6d5bf62faa108fc18fde445cf110b530503b1de523102f2551bbf7584f540a500bbbbbe0e4fba2e86b1a01", 0x8b, r0) 09:08:46 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 9) 09:08:46 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="014344fe303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:08:46 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 94) 09:08:46 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 99) [ 3536.905731] loop2: detected capacity change from 0 to 256 [ 3536.912841] loop3: detected capacity change from 0 to 136 [ 3536.917951] loop6: detected capacity change from 0 to 256 [ 3536.924599] isofs_fill_super: get root inode failed [ 3536.931708] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3536.935946] isofs_fill_super: get root inode failed 09:08:46 executing program 5: clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:46 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x304}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:08:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="228f41a706ee1fab34d8dd112dc8852be96bb4d97ed9492a9a009a3825740d8ecea5a04c2a696a6833a4084ad7bd37f1099670819fadf213a03726443e65f9024c5c8bad6f39ce6047ab97a0b9da3125cb070cbfe827ff638289bbc26029a9fd795cb1b59d817fa3e25c2823f609fa2dd4fb772f6034a92a958cc346ea5b3b4ccce7311e065f886ccdd8b9bc397fa2ba16e79369cfea5f93a9b508ab158ae3a1431a94fcae7b40f69ae558e972ab60cca4bf9ed556c77ad8e3307e3ec63933e7d3db7c9022aad1a70a4102499c3b88", 0xcf, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "a5387bf4398c20248ec07b6d19ef11fb97b9c482d44c701a6122ca592450699849025578438d44d1bc25a5eba91074b7eb99de41a905270b4fa4859247d4504b", 0x3e}, 0x48, r1) 09:09:04 executing program 5: clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430fe3101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:09:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:09:04 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "530fee7601991281562ce9370f74260223e86094253a2230685d2a87e4da2120da2b7356ea253af89108d02b56d8ab68056d47aad484bb2a804aa922c3688c6a", 0x10}, 0x48, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x1f, 0x6, 0x8, 0x1f, 0x0, 0x18, 0x20020, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0xdfa3fcfac8919fcb, 0x9, 0xf1, 0x6, 0x5bf927b, 0x9, 0x9, 0x0, 0x6564, 0x0, 0x3ff}, r2, 0xa, r3, 0x2) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r4) add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r4) 09:09:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 10) 09:09:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 100) 09:09:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 95) 09:09:04 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x308}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3554.568021] loop3: detected capacity change from 0 to 136 [ 3554.580792] FAULT_INJECTION: forcing a failure. [ 3554.580792] name failslab, interval 1, probability 0, space 0, times 0 [ 3554.581939] CPU: 1 PID: 13415 Comm: syz-executor.3 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3554.582714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3554.583460] Call Trace: [ 3554.583707] [ 3554.583961] dump_stack_lvl+0x8f/0xb7 [ 3554.584357] should_fail_ex.cold+0x5/0xa [ 3554.584769] should_failslab+0x9/0x20 [ 3554.585160] __kmem_cache_alloc_node+0x5b/0x400 [ 3554.585600] ? __list_lru_init+0xcb/0x610 [ 3554.586009] ? __list_lru_init+0xcb/0x610 [ 3554.586417] __kmalloc+0x46/0xc0 [ 3554.586763] __list_lru_init+0xcb/0x610 [ 3554.587151] alloc_super+0x8f3/0xb00 [ 3554.587520] ? __pfx_test_bdev_super+0x10/0x10 [ 3554.587997] sget+0x10f/0x560 [ 3554.588312] ? __pfx_set_bdev_super+0x10/0x10 [ 3554.588731] mount_bdev+0xfc/0x400 [ 3554.589099] ? __pfx_isofs_fill_super+0x10/0x10 [ 3554.589567] ? __pfx_isofs_mount+0x10/0x10 [ 3554.590018] legacy_get_tree+0x109/0x220 [ 3554.590260] FAULT_INJECTION: forcing a failure. [ 3554.590260] name failslab, interval 1, probability 0, space 0, times 0 [ 3554.590411] vfs_get_tree+0x92/0x300 [ 3554.591856] path_mount+0x1314/0x1e30 [ 3554.592246] ? kasan_quarantine_put+0x8f/0x1f0 [ 3554.592707] ? __pfx_path_mount+0x10/0x10 [ 3554.593107] ? putname+0x102/0x140 [ 3554.593480] __x64_sys_mount+0x286/0x310 [ 3554.593857] ? __pfx___x64_sys_mount+0x10/0x10 [ 3554.594291] ? syscall_enter_from_user_mode+0x21/0x50 [ 3554.594780] do_syscall_64+0x3f/0x90 [ 3554.595133] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3554.595620] RIP: 0033:0x7ff78264c04a [ 3554.596004] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3554.597594] RSP: 002b:00007ff77fbbffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 3554.598269] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff78264c04a [ 3554.598897] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff77fbc0000 [ 3554.599513] RBP: 00007ff77fbc0040 R08: 00007ff77fbc0040 R09: 0000000020000000 [ 3554.600148] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 3554.600789] R13: 0000000020000100 R14: 00007ff77fbc0000 R15: 0000000020012200 [ 3554.601465] [ 3554.601705] CPU: 0 PID: 13423 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3554.602537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3554.603265] Call Trace: [ 3554.603513] [ 3554.603738] dump_stack_lvl+0x8f/0xb7 [ 3554.604140] should_fail_ex.cold+0x5/0xa [ 3554.604541] ? __alloc_file+0x21/0x240 [ 3554.604928] should_failslab+0x9/0x20 [ 3554.605291] kmem_cache_alloc+0x5a/0x410 [ 3554.605681] ? d_instantiate+0x79/0xa0 [ 3554.606070] __alloc_file+0x21/0x240 [ 3554.606431] alloc_empty_file+0x71/0x170 [ 3554.606826] alloc_file+0x59/0x800 [ 3554.607172] alloc_file_pseudo+0x16e/0x260 [ 3554.607538] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3554.608024] ? shmem_get_inode+0x6b2/0xdb0 [ 3554.608441] __shmem_file_setup+0x144/0x320 [ 3554.608841] __do_sys_memfd_create+0x1ca/0x4e0 [ 3554.609295] do_syscall_64+0x3f/0x90 [ 3554.609641] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3554.610081] RIP: 0033:0x7f106c5aab19 [ 3554.610433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3554.611947] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3554.612633] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3554.613283] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3554.613927] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3554.614566] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3554.615200] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3554.615909] [ 3554.633663] FAULT_INJECTION: forcing a failure. [ 3554.633663] name failslab, interval 1, probability 0, space 0, times 0 [ 3554.634886] CPU: 0 PID: 13424 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3554.635624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3554.636398] Call Trace: [ 3554.636648] [ 3554.636876] dump_stack_lvl+0x8f/0xb7 [ 3554.637286] should_fail_ex.cold+0x5/0xa [ 3554.637698] should_failslab+0x9/0x20 [ 3554.638057] __kmem_cache_alloc_node+0x5b/0x400 [ 3554.638492] ? selinux_sk_alloc_security+0x94/0x210 [ 3554.638952] ? _raw_spin_unlock_irqrestore+0x2c/0x60 [ 3554.639440] kmalloc_trace+0x26/0x60 [ 3554.639801] selinux_sk_alloc_security+0x94/0x210 [ 3554.640249] security_sk_alloc+0x5a/0xb0 [ 3554.640649] sk_prot_alloc+0x20b/0x280 [ 3554.641041] sk_alloc+0x38/0x760 [ 3554.641373] __netlink_create+0x63/0x340 [ 3554.641758] ? sock_create_lite+0x49/0x120 [ 3554.642162] __netlink_kernel_create+0x114/0x870 [ 3554.642629] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3554.643155] ? __pfx_uevent_net_init+0x10/0x10 [ 3554.643588] uevent_net_init+0xfb/0x300 [ 3554.643994] ? __pfx_uevent_net_init+0x10/0x10 [ 3554.644492] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3554.644920] ? lock_is_held_type+0xdb/0x130 [ 3554.645324] ops_init+0xbb/0x680 [ 3554.645664] setup_net+0x40c/0x9d0 [ 3554.646005] ? down_read_killable+0x1af/0x4a0 [ 3554.646431] ? __pfx_setup_net+0x10/0x10 [ 3554.646831] copy_net_ns+0x31c/0x760 [ 3554.647208] create_new_namespaces+0x3f6/0xb30 [ 3554.647648] copy_namespaces+0x3b7/0x4a0 [ 3554.648009] copy_process+0x29e3/0x7220 [ 3554.648381] ? lock_is_held_type+0xdb/0x130 [ 3554.648773] ? find_held_lock+0x2c/0x110 [ 3554.649183] ? __pfx_copy_process+0x10/0x10 [ 3554.649586] ? _copy_from_user+0x169/0x1f0 [ 3554.649991] kernel_clone+0xeb/0x950 [ 3554.650344] ? lock_is_held_type+0xdb/0x130 [ 3554.650750] ? __pfx_kernel_clone+0x10/0x10 [ 3554.651187] ? lock_is_held_type+0xdb/0x130 [ 3554.651610] __do_sys_clone3+0x1d9/0x370 [ 3554.651999] ? __pfx___do_sys_clone3+0x10/0x10 [ 3554.652465] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3554.652952] ? fput+0x2f/0x1a0 [ 3554.653273] ? syscall_enter_from_user_mode+0x21/0x50 [ 3554.653735] ? syscall_enter_from_user_mode+0x21/0x50 [ 3554.654218] do_syscall_64+0x3f/0x90 [ 3554.654579] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3554.655036] RIP: 0033:0x7fbd5db53b19 [ 3554.655386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3554.656866] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3554.657515] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3554.658114] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3554.658681] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3554.659274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3554.659869] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3554.660576] [ 3554.661008] kobject_uevent: unable to create netlink socket! 09:09:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0143443030fe01004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3554.666520] loop2: detected capacity change from 0 to 256 [ 3554.675945] isofs_fill_super: get root inode failed 09:09:04 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x362}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf00000000000000000000000000000000000000000000000000000000000000000100000101000001000808001800000000000018140000000000000000000016000000002200", 0x9e, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) 09:09:04 executing program 5: clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) 09:09:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$reject(0x13, r0, 0x9af, 0x6c808c6f, r1) [ 3554.836147] loop2: detected capacity change from 0 to 256 09:09:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 11) [ 3554.846943] isofs_fill_super: get root inode failed 09:09:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303102004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3554.894929] loop3: detected capacity change from 0 to 136 09:09:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 96) 09:09:04 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x363}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3554.932802] loop6: detected capacity change from 0 to 256 [ 3554.950896] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3554.957694] isofs_fill_super: get root inode failed 09:09:22 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x8, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 97) 09:09:22 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x373}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:22 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) 09:09:22 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "02e595f392d551faec88f2ce67987aefc4c7f5139bd35cca460a67c323227d3639383f742f259ec73a5bc4b91598c60a575297c60fe994162dd42f2c79cc1098", 0x3b}, 0x48, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, 0x0) keyctl$read(0xb, r1, &(0x7f0000000040)=""/106, 0x6a) 09:09:22 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303103004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) 09:09:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3572.484167] loop3: detected capacity change from 0 to 136 09:09:22 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 12) 09:09:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "be52c58e23fffc8e3137f5652f08ad0fbc860ffdef5764ecc2babdf4532bd3481826cf6eef3eda8fb88f66cf58d882bd67f6b5830b6a36cb74fe0fd62f8aea60"}, 0x48, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) keyctl$get_keyring_id(0x0, r1, 0x6) [ 3572.517009] FAULT_INJECTION: forcing a failure. [ 3572.517009] name failslab, interval 1, probability 0, space 0, times 0 [ 3572.518110] CPU: 1 PID: 13470 Comm: syz-executor.6 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3572.518793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3572.519475] Call Trace: [ 3572.519696] [ 3572.519901] dump_stack_lvl+0x8f/0xb7 [ 3572.520273] should_fail_ex.cold+0x5/0xa [ 3572.520629] ? security_file_alloc+0x38/0x170 [ 3572.521022] should_failslab+0x9/0x20 [ 3572.521358] kmem_cache_alloc+0x5a/0x410 [ 3572.521714] security_file_alloc+0x38/0x170 [ 3572.522088] __alloc_file+0xb6/0x240 [ 3572.522417] alloc_empty_file+0x71/0x170 [ 3572.522768] alloc_file+0x59/0x800 [ 3572.523094] alloc_file_pseudo+0x16e/0x260 [ 3572.523461] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 3572.523870] ? shmem_get_inode+0x6b2/0xdb0 [ 3572.524280] __shmem_file_setup+0x144/0x320 [ 3572.524688] __do_sys_memfd_create+0x1ca/0x4e0 [ 3572.524896] FAULT_INJECTION: forcing a failure. [ 3572.524896] name failslab, interval 1, probability 0, space 0, times 0 [ 3572.525085] do_syscall_64+0x3f/0x90 [ 3572.526371] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3572.526826] RIP: 0033:0x7f106c5aab19 [ 3572.527164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3572.528679] RSP: 002b:00007f1069b1ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3572.529325] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f106c5aab19 [ 3572.529941] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f106c6040fb [ 3572.530563] RBP: 0000000000000004 R08: 0000000000010000 R09: ffffffffffffffff [ 3572.531172] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3572.531786] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020012200 [ 3572.532456] [ 3572.532678] CPU: 0 PID: 13471 Comm: syz-executor.1 Not tainted 6.1.0-rc7-next-20221129 #1 [ 3572.533443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3572.534145] Call Trace: [ 3572.534385] [ 3572.534598] dump_stack_lvl+0x8f/0xb7 [ 3572.534976] should_fail_ex.cold+0x5/0xa [ 3572.535362] should_failslab+0x9/0x20 [ 3572.535729] __kmem_cache_alloc_node+0x5b/0x400 [ 3572.536182] ? __netlink_kernel_create+0x1ad/0x870 [ 3572.536630] ? __init_waitqueue_head+0xca/0x150 [ 3572.537081] ? __netlink_kernel_create+0x1ad/0x870 [ 3572.537532] __kmalloc+0x46/0xc0 [ 3572.537859] __netlink_kernel_create+0x1ad/0x870 [ 3572.538308] ? __pfx___netlink_kernel_create+0x10/0x10 [ 3572.538791] ? __pfx_uevent_net_init+0x10/0x10 [ 3572.539213] uevent_net_init+0xfb/0x300 [ 3572.539595] ? __pfx_uevent_net_init+0x10/0x10 [ 3572.540023] ? __pfx_uevent_net_rcv+0x10/0x10 [ 3572.540456] ? lock_is_held_type+0xdb/0x130 [ 3572.540856] ops_init+0xbb/0x680 [ 3572.541190] setup_net+0x40c/0x9d0 [ 3572.541521] ? down_read_killable+0x1af/0x4a0 [ 3572.541929] ? __pfx_setup_net+0x10/0x10 [ 3572.542317] copy_net_ns+0x31c/0x760 [ 3572.542669] create_new_namespaces+0x3f6/0xb30 [ 3572.543109] copy_namespaces+0x3b7/0x4a0 [ 3572.543483] copy_process+0x29e3/0x7220 [ 3572.543847] ? lock_is_held_type+0xdb/0x130 [ 3572.544250] ? find_held_lock+0x2c/0x110 [ 3572.544632] ? __pfx_copy_process+0x10/0x10 [ 3572.545025] ? _copy_from_user+0x169/0x1f0 [ 3572.545426] kernel_clone+0xeb/0x950 [ 3572.545766] ? lock_is_held_type+0xdb/0x130 [ 3572.546161] ? __pfx_kernel_clone+0x10/0x10 [ 3572.546572] ? lock_is_held_type+0xdb/0x130 [ 3572.547003] __do_sys_clone3+0x1d9/0x370 [ 3572.547390] ? __pfx___do_sys_clone3+0x10/0x10 [ 3572.547812] ? __mutex_unlock_slowpath+0x15c/0x5e0 [ 3572.548490] ? fput+0x2f/0x1a0 [ 3572.548828] ? syscall_enter_from_user_mode+0x21/0x50 [ 3572.549332] ? syscall_enter_from_user_mode+0x21/0x50 [ 3572.549843] do_syscall_64+0x3f/0x90 [ 3572.550231] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3572.550750] RIP: 0033:0x7fbd5db53b19 [ 3572.551114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3572.552741] RSP: 002b:00007fbd5b0c9188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3572.553435] RAX: ffffffffffffffda RBX: 00007fbd5dc66f60 RCX: 00007fbd5db53b19 [ 3572.554105] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020004c00 [ 3572.554749] RBP: 00007fbd5b0c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3572.555386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3572.556021] R13: 00007ffc6834d95f R14: 00007fbd5b0c9300 R15: 0000000000022000 [ 3572.556702] [ 3572.559284] loop3: detected capacity change from 0 to 136 [ 3572.564009] loop2: detected capacity change from 0 to 256 09:09:22 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303104004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) [ 3572.578239] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3572.601600] kobject_uevent: unable to create netlink socket! 09:09:22 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) clone3(&(0x7f0000004c00)={0xc0003900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:22 executing program 0: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='syz', 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, r1, 0x80, 0x31, r2) keyctl$link(0x8, 0x0, r0) 09:09:22 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x1b, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3}}}}, 0x108) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getpid() clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {0x38c}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:09:22 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)=ANY=[]) 09:09:22 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[]) (fail_nth: 13) 09:09:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f45", 0x5b, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}, {&(0x7f0000011a00)="4552ed", 0x3, 0x10000}], 0x0, &(0x7f0000012200)=ANY=[@ANYBLOB]) [ 3572.737912] loop3: detected capacity change from 0 to 136 [ 3572.758122] loop6: detected capacity change from 0 to 256 [ 3572.763275] loop2: detected capacity change from 0 to 256 [ 3572.778562] loop3: detected capacity change from 0 to 136 [ 3572.780112] ISOFS: primary root directory is empty. Disabling Rock Ridge and switching to Joliet. [ 3572.788040] isofs_fill_super: get root inode failed [ 3572.789215] ISOFS: Logical zone size(0) < hardware blocksize(1024) [ 3573.267925] ================================================================== [ 3573.268650] BUG: KASAN: use-after-free in __lock_acquire+0x42c9/0x5e70 [ 3573.269288] Read of size 8 at addr ffff888017e60018 by task syz-executor/13495 [ 3573.269938] [ 3573.270100] CPU: 1 PID: 13495 Comm: syz-executor Not tainted 6.1.0-rc7-next-20221129 #1 [ 3573.270810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3573.271550] Call Trace: [ 3573.271782] [ 3573.271986] dump_stack_lvl+0x8f/0xb7 [ 3573.272366] print_report+0x175/0x478 [ 3573.272736] ? __lock_acquire+0x42c9/0x5e70 [ 3573.273655] kasan_report+0xbf/0x1c0 [ 3573.274199] ? __lock_acquire+0x42c9/0x5e70 [ 3573.274677] __lock_acquire+0x42c9/0x5e70 [ 3573.275189] ? __pfx_mark_lock.part.0+0x10/0x10 [ 3573.276041] ? finish_task_switch.isra.0+0x22d/0x8a0 [ 3573.276624] ? __pfx___lock_acquire+0x10/0x10 [ 3573.277165] ? __switch_to+0x5c3/0xee0 [ 3573.277610] lock_acquire+0x1a6/0x530 [ 3573.278289] ? kmemleak_scan+0x1a0/0x1600 [ 3573.278669] ? __pfx_lock_acquire+0x10/0x10 [ 3573.279059] ? __call_rcu_common.constprop.0+0x589/0xa40 [ 3573.279546] ? __call_rcu_common.constprop.0+0x589/0xa40 [ 3573.280022] ? lockdep_hardirqs_on+0x7d/0x100 [ 3573.280436] ? _raw_spin_lock_irq+0x45/0x50 [ 3573.280819] _raw_spin_lock_irq+0x36/0x50 [ 3573.281173] ? kmemleak_scan+0x1a0/0x1600 [ 3573.281543] kmemleak_scan+0x1a0/0x1600 [ 3573.281893] ? __pfx_kmemleak_scan+0x10/0x10 [ 3573.282293] ? strncpy_from_user+0x107/0x500 [ 3573.282679] kmemleak_write+0x574/0x680 [ 3573.283029] ? __pfx_kmemleak_write+0x10/0x10 [ 3573.283436] ? debugfs_file_get+0x1d2/0x450 [ 3573.283814] ? __pfx_debugfs_file_get+0x10/0x10 [ 3573.284248] full_proxy_write+0x121/0x190 [ 3573.284615] vfs_write+0x358/0xe40 [ 3573.284944] ? __pfx_full_proxy_write+0x10/0x10 [ 3573.285359] ? __pfx_vfs_write+0x10/0x10 [ 3573.285728] ? lock_release+0x3b6/0x750 [ 3573.286080] ? __up_read+0x192/0x730 [ 3573.286416] ? handle_mm_fault+0x43d/0xae0 [ 3573.286777] ? __pfx___up_read+0x10/0x10 [ 3573.287137] ? __fget_light+0x212/0x280 [ 3573.287481] ksys_write+0x12b/0x260 [ 3573.287802] ? __pfx_ksys_write+0x10/0x10 [ 3573.288182] ? syscall_enter_from_user_mode+0x21/0x50 [ 3573.288627] ? syscall_enter_from_user_mode+0x21/0x50 [ 3573.289078] do_syscall_64+0x3f/0x90 [ 3573.289421] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3573.289869] RIP: 0033:0x7fd05ea0d5c3 [ 3573.290197] Code: 16 00 00 00 eb ae 90 b8 6e 00 00 00 eb a6 e8 44 ef 04 00 0f 1f 40 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 [ 3573.291643] RSP: 002b:00007ffcaf4fdaf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3573.292293] RAX: ffffffffffffffda RBX: 00007ffcaf4fe138 RCX: 00007fd05ea0d5c3 [ 3573.292866] RDX: 0000000000000004 RSI: 00007fd05eac3ed9 RDI: 0000000000000003 [ 3573.293456] RBP: 0000000000000002 R08: 0000000000000df4 R09: 00007ffcaf545080 [ 3573.294035] R10: 00007ffcaf545090 R11: 0000000000000246 R12: 00000000fffffff6 [ 3573.294618] R13: 00007ffcaf4ffef1 R14: 0000000000000000 R15: 000000000036844d [ 3573.295212] [ 3573.295415] [ 3573.295572] Allocated by task 13496: [ 3573.295883] kasan_save_stack+0x22/0x50 [ 3573.296249] kasan_set_track+0x25/0x30 [ 3573.296583] __kasan_slab_alloc+0x5c/0x70 [ 3573.296942] kmem_cache_alloc+0x1e1/0x410 [ 3573.297295] __create_object+0x3d/0xc10 [ 3573.297637] kmem_cache_alloc+0x273/0x410 [ 3573.297976] __alloc_file+0x21/0x240 [ 3573.298281] alloc_empty_file+0x71/0x170 [ 3573.298627] path_openat+0xd4/0x29b0 [ 3573.298959] do_filp_open+0x1ba/0x410 [ 3573.299300] do_sys_openat2+0x171/0x4c0 [ 3573.299641] __x64_sys_openat+0x143/0x200 [ 3573.300008] do_syscall_64+0x3f/0x90 [ 3573.300361] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 3573.300804] [ 3573.300964] Freed by task 13: [ 3573.301235] kasan_save_stack+0x22/0x50 [ 3573.301583] kasan_set_track+0x25/0x30 [ 3573.301925] kasan_save_free_info+0x2e/0x50 [ 3573.302290] __kasan_slab_free+0x10a/0x190 [ 3573.302651] kmem_cache_free+0xfb/0x610 [ 3573.302994] rcu_core+0x7cf/0x2070 [ 3573.303309] __do_softirq+0x1c7/0x8f9 [ 3573.303647] [ 3573.303803] Last potentially related work creation: [ 3573.304234] kasan_save_stack+0x22/0x50 [ 3573.304576] __kasan_record_aux_stack+0x95/0xb0 [ 3573.304977] __call_rcu_common.constprop.0+0x6a/0xa40 [ 3573.305414] kmem_cache_free+0xc1/0x610 [ 3573.305748] rcu_core+0x7cf/0x2070 [ 3573.306049] __do_softirq+0x1c7/0x8f9 [ 3573.306385] [ 3573.306538] Second to last potentially related work creation: [ 3573.306998] kasan_save_stack+0x22/0x50 [ 3573.307349] __kasan_record_aux_stack+0x95/0xb0 [ 3573.307755] __call_rcu_common.constprop.0+0x6a/0xa40 [ 3573.308214] kmem_cache_free+0xc1/0x610 [ 3573.308553] rcu_core+0x7cf/0x2070 [ 3573.308861] __do_softirq+0x1c7/0x8f9 [ 3573.309190] [ 3573.309346] The buggy address belongs to the object at ffff888017e60000 [ 3573.309346] which belongs to the cache kmemleak_object of size 368 [ 3573.310372] The buggy address is located 24 bytes inside of [ 3573.310372] 368-byte region [ffff888017e60000, ffff888017e60170) [ 3573.311267] [ 3573.311421] The buggy address belongs to the physical page: [ 3573.311871] page:000000008ef8a832 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17e60 [ 3573.312632] head:000000008ef8a832 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0 [ 3573.313364] flags: 0x100000000010200(slab|head|node=0|zone=1) [ 3573.313851] raw: 0100000000010200 ffff88800844f780 ffffea00011e4d80 dead000000000004 [ 3573.314480] raw: 0000000000000000 0000000000120012 00000001ffffffff 0000000000000000 [ 3573.315103] page dumped because: kasan: bad access detected [ 3573.315564] [ 3573.315715] Memory state around the buggy address: [ 3573.316122] ffff888017e5ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3573.316723] ffff888017e5ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3573.317323] >ffff888017e60000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3573.317905] ^ [ 3573.318251] ffff888017e60080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3573.318944] ffff888017e60100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 3573.319525] ================================================================== [ 3573.320097] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 09:09:23 Registers: info registers vcpu 0 RAX=ffff88800cba9ac0 RBX=1ffff110031bbf50 RCX=ffffffff812c2023 RDX=dffffc0000000000 RSI=0000000000000008 RDI=ffffffff85d06610 RBP=0000000000000001 RSP=ffff888018ddfa58 R8 =0000000000000000 R9 =ffffffff85d06617 R10=fffffbfff0ba0cc2 R11=0000000000000001 R12=0000000000000001 R13=0000000000000000 R14=ffff88806ce3d8e0 R15=0000000000000000 RIP=ffffffff843ef1a1 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f7609a568c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe19e4038000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe19e4036000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffd34eb9e58 CR3=000000000f0ba000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=7269762f736563697665642f7379732f XMM03=747269762f736563697665642f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=3d4d554e51455300373d5145534b5349 XMM06=706f6f6c2f7665642f3d454d414e5645 XMM07=00000000000000000000000000000000 XMM08=6e753c007325732575253a5d73255b00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000002f RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8247fb55 RDI=ffffffff87fb1ae0 RBP=ffffffff87fb1aa0 RSP=ffff8880479e71e8 R8 =0000000000000001 R9 =000000000000000a R10=000000000000002f R11=0000000000000001 R12=000000000000002f R13=ffffffff87fb1aa0 R14=0000000000000010 R15=ffffffff8247fb40 RIP=ffffffff8247fbad RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555594400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe457d16c000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe457d16a000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f760911a344 CR3=0000000042352000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffff000000000000ff00000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=0000353d524f4e494d00373d524f4a41 XMM05=3d5145534b534944006b7369643d4550 XMM06=3d454d414e56454400303d444955555f XMM07=59534255530035706f6f6c2f6b636f6c XMM08=49006d756e203c2069000a313a56000a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000