open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x0, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:00:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0x0) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:00:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:00:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0x0) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:00:59 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x0) 08:00:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x7) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x0, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0, 0x106) 08:01:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, 0x0, &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x0) 08:01:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 08:01:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x8) fallocate(r0, 0x0, 0x0, 0x8800000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$setstatus(r1, 0x4, 0x2c00) recvfrom$inet(r1, &(0x7f0000000540)=""/255, 0xff, 0x1, &(0x7f00000000c0)={0x2, 0x4e24, @multicast2}, 0x10) ioctl$SG_SET_TIMEOUT(r0, 0x31e, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x3) dup2(0xffffffffffffffff, r2) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RVERSION(r0, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) 08:01:12 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="2729c72b7f49"}, 0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000019140)={@dev={0xfe, 0x80, '\x00', 0x19}, 0x4, r3}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xffffffffffffff01}, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') bind$bt_hci(r4, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r4, &(0x7f0000000040)=ANY=[@ANYRES64=r4], 0x6) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0xa00, 0x0) read(r5, &(0x7f00000000c0)=""/102400, 0xfffffc7b) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r5, 0x800448d3, &(0x7f0000000080)="6594c568c0038402fb6e71e39a926b1ec8dd3d3b8cc004f1da2b729b76f98c19ae13b6958fdcf3756f654342bdaf566fef7a77de4830a435982c5ac4ee4e01ecbab3") openat$zero(0xffffffffffffff9c, &(0x7f00000190c0), 0x40800, 0x0) 08:01:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000000140)="e14344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}, {0x0, 0x0, 0x4000010800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="62aeddb2fd6897dbd099fa9a3c42df319633c80abc9ff3de"]) creat(&(0x7f0000000080)='./file0\x00', 0xa2) 08:01:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, 0x0, &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0, 0x106) 08:01:13 executing program 3: r0 = mq_open(&(0x7f0000005c00)='-@\x00', 0x40, 0xc6, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) mq_timedsend(r1, &(0x7f0000000000)="3ab5eea081699569a184436a38ab9375516208e27df5069f97230f4c330f1d1339bd5a31ca6eae7d05ed5fdd3065d0b36e499ac6ac9a65c3d1e91df5209d0afe3fe7e30aaa4a31b8665ec26ae80b2104aaf18d231f697cee615a4e987cd6b1726da52c1c9f29e1b214bcf0569fa4fb649d9e47e24e02a9bcd3ff35e20f4b0bb746146102bca8fb6245166967f6a2e3465d4287f6bc6b76e23ab04cb0b4e64fdeca99ec4f65fed90fe27d1cda54120f1034254c48d68c497128e01d97b5523d1076d705e2a939ec2513feeb4811c7dc88350a05751822daf50c55f2cbfff4acea", 0xe0, 0x5, &(0x7f0000000180)) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140), 0x0, 0x0) [ 1984.131911] FAULT_INJECTION: forcing a failure. [ 1984.131911] name failslab, interval 1, probability 0, space 0, times 0 [ 1984.134265] CPU: 1 PID: 12685 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 1984.135390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1984.136733] Call Trace: [ 1984.137164] dump_stack+0x107/0x167 [ 1984.137768] should_fail.cold+0x5/0xa [ 1984.138421] ? alloc_pipe_info+0x105/0x580 [ 1984.139128] should_failslab+0x5/0x20 [ 1984.139760] kmem_cache_alloc_trace+0x55/0x360 [ 1984.140524] alloc_pipe_info+0x105/0x580 [ 1984.141202] splice_direct_to_actor+0x774/0x980 [ 1984.141954] ? _cond_resched+0x12/0x80 [ 1984.142595] ? inode_security+0x107/0x140 [ 1984.143263] ? pipe_to_sendpage+0x380/0x380 [ 1984.143958] ? selinux_file_permission+0x36/0x510 [ 1984.144749] ? do_splice_to+0x160/0x160 [ 1984.145398] ? security_file_permission+0x24e/0x570 [ 1984.146352] do_splice_direct+0x1c4/0x290 [ 1984.147007] ? splice_direct_to_actor+0x980/0x980 [ 1984.147915] ? selinux_file_permission+0x36/0x510 [ 1984.148820] ? security_file_permission+0x24e/0x570 [ 1984.149624] vfs_copy_file_range+0x57b/0x10f0 [ 1984.150351] ? generic_file_rw_checks+0x240/0x240 [ 1984.151229] ? __fget_files+0x296/0x480 [ 1984.151877] __do_sys_copy_file_range+0x176/0x420 [ 1984.152641] ? vfs_copy_file_range+0x10f0/0x10f0 [ 1984.153390] ? ksys_write+0x1a9/0x260 [ 1984.154005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1984.154851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1984.155664] do_syscall_64+0x33/0x40 [ 1984.156254] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1984.157056] RIP: 0033:0x7f9dba2a1b19 [ 1984.157658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1984.160663] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 1984.162137] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 1984.163267] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 1984.164489] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 1984.165738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1984.167117] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:01:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x0, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:13 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000001f0001000000000000000000fe8000000000000000000000000000bb0f00000000000000ac14140000000000000000000000000000000000000000000c0015000000000000000000"], 0x4c}}, 0x0) r1 = geteuid() ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000001640)={'ip6gre0\x00', &(0x7f00000015c0)={'syztnl2\x00', 0x0, 0x29, 0x9b, 0xcd, 0x1ff, 0x38, @private2, @loopback, 0x7800, 0x7, 0x5, 0xfc}}) sendmsg$nl_xfrm(r0, &(0x7f0000003ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000003a80)={&(0x7f0000001680)=@allocspi={0x23fc, 0x16, 0x200, 0x70bd2d, 0x25dfdbff, {{{@in=@broadcast, @in6=@private2, 0x4e20, 0x6, 0x4e24, 0x6d0, 0xa, 0x20, 0x80, 0x2e, 0x0, r1}, {@in6=@private0, 0x4d6, 0x6c}, @in=@multicast2, {0x5, 0x9, 0x28000000, 0xbb, 0x1f, 0x8, 0x0, 0x25}, {0x4d, 0xfff, 0x100000000, 0x9}, {0x5, 0x8, 0x7}, 0x70bd26, 0x0, 0x88e5c695164ae098, 0x7, 0x69}, 0x1, 0x80000001}, [@algo_aead={0x104c, 0x12, {{'morus640-generic\x00'}, 0x8000, 0x0, "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"}}, @algo_aead={0x102, 0x12, {{'aegis128-generic\x00'}, 0x5b0, 0x80, "2629901d2b203e38980a4c4a097f854d3028f8c04169f42df786361a33110db6f4b4b5609b6931a1872e5c8ca3e7cd83fcbea3b942d34cd607fd2aae2ec833f9617c941e2237e329b11fd4164ad6161379df8cc04be95a1d9e9a0f471b480ac0f2003eb68559bb789cf1a1d24462bb38d2bdb8c51c80af85f0d9b7dd0f7eabe19ebe1f23b55d82bf9aec4b87baa7323bc9302688b0e586029644e122ff1fe1a1a7245343765ee3ec6e3302b1828736f00fa230a00622"}}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x13c, 0x12, {{'rfc4543(aegis256-generic)\x00'}, 0x780, 0x360, "8ac6474ea11adeae6768b2335156564f3db9122743ea6d35423e02a4f8b6baab76586236a6f6959828d45552885b8a5e56770f2d00339beea4c8fe5c40a23960054627033ccf067a9a6937388d2980bcb9590a12f3713079b9a17136c88e9c145434e0b599283be9011b3aab2f07d7a7119027eab517874371f84b38bfc65d62715cc568702a4fe10b945c4f52b27bd2f0c445f60c16259ee52c631746bdfec60862181fc14c77de132bccbe73e6977016c09e8e455c8f6d0f2c6c6e0cecdee37de16eec31adf1d277fd7ae986f97a5c1c3de146b9337df0bc2bd229e9759d74d2ff3a2c8074ffb9f05d529f97d3da41"}}, @user_kmaddress={0x2c, 0x13, {@in=@multicast1, @in=@private=0xa010101, 0x0, 0x2}}, @lifetime_val={0x24, 0x9, {0x1fd, 0x9, 0x49, 0x5}}, @coaddr={0x14, 0xe, @in6=@remote}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x1, 0x9, 0x1000, "13490409eb5950d1fb920d17a5db39e34650c60b0fb247cf43871d7ff5ffbb1f9f32728af77739b564995ec13e0f07be4f9dec35f390121b61c5c4793fec8000c368e2671baf72da10bd6b4b3529cc550270ea66818aa61f8d5f2ae3b79114030cfee2553c37eb86bd278797fb4326a7a19faffd36faa025e6bf20f030964b6048fdb959b77f3ee447f2b8dc400158894171538fb17e7fb9f855a3285d699f2415b55c5bbd8ebc87e8ea7ba2fd489e79b06ed62fc87aff8152698a83f174f20527d14fb82407ee946bef7e7e419ced800f3ef9d3df74a66ccf658e5db7cf72478dcf4ad137e460d891523c3867a1d73a13ab0f19cf5aeb9ef4097d73724348656340951019989d16e06c77b26a38ac6fc534c235bdf3dd5329d977d138db56d8595745875e4f3939196f2218ffe68a8166edd48d68a6dea26897ebb5188e4cc1d176e0d7a328d3501d05bd7b34ea63d863fa0ed8fcb4d7462f6346c6d5948044652f711e026f2f6e1deaa0cc1c17965b2b0f3ab25cb6d155bef6b4b118b8fd7fb2b492202eafb441961c87af8d44eb8040fe96e194a1805a1ef221bfb4e813e9b12b266b16f4f0770530156985bfdafbe97d2686aa9f9951e4383d2d1dd03862bfa77bed5567602be569af4781b77d541d46929c30031a196029626516b1b2ae1f9e8355624d83d2d93d727a3b9b4d54b57a00f8c3095b5e537bd835b2c4bd141c5a644297bf1716711df3f310e715479f90c10910d389fa687f044a8dab93cf98c2e1df4e407f5d1624729e69a7e8d874f9166811e68822a8f8b9e0496201c7668253c07e5d69beeaa88b89f5c9fb2715f3e53f0a1c1f088f5e603b8aaa0e77216703f9324c85d2d93c7aeba10f78c7942c3a81d0493e73f53b6a96ccd736368e9d9a3129956c36ee1cb7f3c01f774c1c9fe985b140cb16065b95c69c0e45aee82365b191067b9118893e57e9813e155a9c92a7f6bc147ed62f14ccfb9ac3e6facbd363bd962657786bd038704378d9026fa4b1e8f58c46ea055ae0decd18c551d79f4a1b6ee7620c1906a3666f3af41f732d35d4e1067b277c66cfe3dbbf620a11d6be8780904448ce1dd67d503e6e83f2892dbd9641697ffba0e46703ec3c18ef48e510fe67f4eae7fe45e67a2ca30e9196c053f4ad4ec3a4812a6edbef76a8becb4d4c71bf1a74e5302182219c1572759b221a69fc5dc8681bfecc3d2e5e68aa03ffd8a732ff750711cb73361ad4abe49cc0ed0fa0aeac500eb3c7f8e7d11edab499d0098358e21853697c56599d24622a02d70837d5ced9d1cf810ce048c3fd768dae8591e81bc4d6cab1ffe6a8a8f7fc6166684dabf45f5013ec69c5a345cbba9416252b316877fc30e391f5eef6347e30198febe54e2d1de8f06dc32b8d9490d2609c37236272b5e725c94d58c4e8b933ec9bc906542ed8ba8c7a59eb2045df442ac4590bac3ce5eb8fbed7a8e03098805e21d1757d85fc3ba7b6b3fe15fedfdf941dc126d32f43229ce4570a83ab8b79e82b18c81e4d4c14f699284b4292e6f80ed7c6868c351fbdc5bb30a4f0a8b78f56a8cf13954c1be2e63f36b86fd7b833e232806d7abc5b2ce5e284ceee29b413d261a29b7f79519e760706b2968dc4ea016c6cb7d21eee775aafd15bcb3542c580592b2c509cf99dcc7d1dbf1f7722a86041c7227d5963c6997c34f63ba83c81aace8d21477bff6174c0770810abf12eaeeb3b26e86f4bf22364305ad07f4d8bde5598216dd20dc8081ac8848c9066a8c585c5d9010520dd0868badfca771a42132bb23e7ff83951f56b78367b299a4a3a682ce18f9285c13bca8fb388b2ecd5003e42303bc009e18653a5d174b4935517857849e14dbe6c7f1f90b56dbab0c7d52163ac2c2d1022efb4a9a9e222f6a6e7cf8d24e125f0b383318d48bf6fc8bada1452ee02f3040399841e3ab6c6663e0fe7ed18e1b322993324aeb9abf90576c9249b00691ba1c22fd21e9cbd370fc51139568d837dbf3819a3ab15442d4d18dfaebb2f5b54485d534926791a96828f373f739f1281be7bbe68929035bb9a3d125d9e908a98572f04c8da9ca13fa71529ddce0228584673988f9423ecac6cde3d4f9ae877f62212ea0a364f3484191d9462ae7b39c03c891e61b7ece6b7933eb0fc5b94b3d3d5a2e9e9b07edd4105c8c7a514ce0256c2eb51dc13212e788b00b388132140e0a6722b006dd47f424703fb2c70aaa737f0ec737c429b06f3e4ade5026ac677fe35afda424b1e4afd8c10640c45c61fe11536eb3d0c6e929b56e242b0d5e252bae07c2edc1dad8d9eb3f27f3320fe2be8df94c1702dff6b4f47c55fe15c6a9eddeec94fe622c3b88bd89a938b4a6f30ad3e3da687dda14848b0f7f1290275dad092b5d141efeda82a265befa53448657a110d1883ee1622d125d938075208ec2d63a4bbf4210267eeee7c6f92ca184ce5c53d118896c9c655527a77cb784d7c7af7bd7b9f422bb0b1976d4baa066d07666e7cc2bb66018476499977c08efe18325e08073b21d6640960f47f781fd8ed179a6f1e1ddfeb261ac2af9754c75c4a02b737abc8e523cd1fa639ecefaffb908cd2c9d65b5a3d54cccd2558934ddd7db4fff9063b00ce2c6c9baa33abdc6ccc97db3d1795221696643fa03c174bc4be58330ba1637388972ce6904a6e926575d87b1b46bd90a5607a73b430c1635cbf34c965e76641a1b3fea55e4ad82b3eb85c4a6ee9df9c907d6853adbcf737779c40cf2df15031bfc43eef98c77f4ee39acb8416e75f8aae5d70e500704294373b697eaa9237bea5dd891034c0251f34bb0fc796c969aeccfb6d64b8a00b933434eea7f40f30255401d51a64b4cd58fccb3bb3106126b58658fec9761c07da62c14fc3c2c6e8358197070681d8ea60a07fd6ad1c709acc5692fe4672511d08a97145469e37f9ba802bce2feb8c6557f0b5917650c63fecd2d039fee38986d726f2b29ebcd40daa8fc26dea6288060f869eba3e1e5bbe28e686bfab4ca78e3f903fa239c526c713ff579b2d074651e54d1a814484e7b584a200232d99195e90d3461b4aa71cb49210e8a77d6ee0a16c0a93b0213ce12a02489498ac8a61b49fa23ced0c25b135fee68d0a79b8ba01bd5759b176ba6bfebec35a1a2031499d61a09e7a47b2f3040d184c116364349141c01f1afe3f1bbf3629f4254e6f161d90be12aad9167dec2d6658d407f843eb7ac3e1722b4e7becd26d9db1cd0c8eb64333cc5df1845250145db17e5ab81c514f3fddd35ddc46b4ff5752bde03f882bf24ccee37a6911929c3345807ab6051c36558e36825826cec281d67d48a6b705b3d36aac4ef1ef096a9d8368a7498d8ff3de8c602f61783a0f2f060c076123160527b9fcc245597c958cf0e6b32ac4c6672ca7d91258e306b33a191a4bc45b0dad3050d2b8ef4ccdd851c1a75c1988c859205f18e5210277f2e7ddb6cdd6022d7ee9bf93a92877e1f82eb53042df353d206c3a182b23bad34b944acdabb6cf05c67caf8cbd181edf8756f041ab6ba0db03d7791a968e7083a96d92bfc6932697ed00f5e97fe5a65d61e92899839847415c491a5d18c2f6197caacfab82c3ef7b631704b0a01d9eadac96ab8c49948bdc9adefe5174d8e4dcfe72ce967ecbfbb1888ba95b7ef013045adde062f2a165a860ae5b957944d2bf5e98a1a9391bc298506b43362b92884b22c356f1e2fc7410027e0f1ebdaf18a58fc39b4cdec35068f2b42e5022f64aadbca6360c8de04c83b785fd671833e025d3278a36580548cc70d872ed7849519e87df084905d829b3fd63c1c6237f2e399fa98bbf8ae69f60ee4bd3fed5ba2ead06b455c71855dd11b41da3fdb104e6a0c87fee607ce96e75ce600e74dd52ebcdd3a32f78d4f108b553e1fdf410a5cda38188791ddac4c930ae49f3c3c1b34203949114102ea63592a281b01625610fa9a5f682d424e54ce7e398362782c9f8f4ff0ab549633cc5add2bcc87b6b0b1b5c7007b1ccbd9232ed7d3859460367dcf1f44a8431fbb35d3c71a8a5a79a99af4a2d4f022ed208bff566725834acf630ff26b66ca8a27c073c5c31dd6e84a77e5bb9bf7523fd70b3b843cfdc00a20f002d024041f605fb15a0a7cf888c2c69ab49050e64174b160b3fd0856878d029c57d5918a805ed5e217f21fe0ff4469f17141f5d5c51f0bcdedc8768100fb8138899d6221133091876923e7bac035f4ef53ddd0cc05c293c6ce3386e1966430b817b2cb865a28b40b0d5a2753a20ccc1599f08edbd7b3c30feb6e5a3b3b6e35d72a6f5432fd636638c23510e61d9e5c42a35ea7147e2e730d4b37c61145a3e9d4208d85a26c4b45a226d531eb1624b3d9d44894ad7600033428b298249859389eba3b360485c385e6e35c4f752efd474eb865f870a4ac5214a4a3c6691258d41f6113456e886c61a491b3e81d071f7a310acaaf662ef6c91f76b5360e27e8c22542bf1654cbfb8884d4d96412050d887ecfea0d0d6c0c200ac9d2b502a067c406d0527e57156b9b0be6ced2b1be2bca3e92415fac2e121aff771ea64353a86ceea3ad8764e3f4e65cce05b9686cdbfd1b8185c726ef0f75a8068476dcbcffaa9fbb1e414194e3c75c0246836d53299233154a3b6efbea7d30d20ae1463b26a1e5fe07e1137c35366e4fc19a66ad6361296114f8003b9bcd5c37b6f250c3793147131e93f386038c54289d1205ec65e253d0b87c6baa3ae22cff0cd62928fb5370b70e7b8c2ac5108e8956c2776592a602d6c2b2c7d2221028e1d7eb7bb13a317777f18749839f1fab4eccbed7db7869cea9c07b62a0d6b13012db475a9533aef980fb65f3fc52b313fca281cdb4e8aa87fc432a2310a52ea75cb86ef8724b8b579e0492402d2731f3c1e46d1f7c49f2c8b9b542a14435e79a625df4660c7d9eca20fdb82a3645d29ec53a3c8d3b9e10529a4fa4d9a4cb0011d10af389629dcc0ffbb589e6874eb0cfa2837d0f9f838a5f301bf492b646448b490aad1aea65c5fa18b6d4bbbdc1cc9532e1fbd08a95182327f3ddb62277f31436b6429b623eabfac6c3360b30cd2326802f61b296b8588514f3eaa9b629da4a87af7ea87a2d1dfa169c3ed6946e35ff7716607835e500ed6135ea534ffdd50bece3920de59b79c0722af5a02b386ad25e02be090a0d7cd4c61f060568069c6ae314ee047bc55c9a5c2f62e7bdf678e81544b65d8f490d734215a8ec03ff86ebd694c71a26fd8754b33257aff6a68c01f3ac2d9df5c98a33cd868546fc7f4be697984d7f68506963dbff13db0db5ea894e5a7afb7576be9984d053d710ff655943fb3864660dc36301b09460d52d4fd4fb352cf896fb0c8be9f8b2f5f2a7497aa267861d67539a6ab1ae6319fe51523b4a2bcc5b46b494583b7862f2cdc8c133a3d9354f88f783cbc0bf58c1bb18c4c119f02ebf676f4a2d709dfa251aa67539ab06fc2eb23148139366357f8d8d85dc911b1cc1d20c602344420b3ab111af07fa685c9baed7db0ee552495688766c14cd875a3f7156c4eae56a2b214bf8949299405371724b449ff36a129c18e45ab4f7f52ada6a6e192d42d89b1d12a01367f4eb7ddf48e2b9b481bda1d3a1148e1032991c2cbcdcf05e1775fa39d206cf7dd9ef27dec82741022554c018d60c1a9ab3567028f7d22f03345751c4a1cee5fd6495b5002f14703f94ead45039d41361fbc5c8fd4d0085cfb63be3b515f3d4ac9d6a3d9f4412529a908c38e01d24ab1b6f0f7702676a1c4410045fa75fe5ebc4994e81c8d8d57eb555f3a29"}}]}, 0x23fc}, 0x1, 0x0, 0x0, 0x200c0}, 0x804) 08:01:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000380)=[{{&(0x7f0000002740)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="80000000000000000000000007000000830700e25f727980678da18fdc10bfda6d7f00000100"], 0xf}}], 0x1, 0x0) 08:01:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x0, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0, 0x106) 08:01:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xb) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:29 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, 0x0, &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000021c0)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x17, 0x0, 0x1, 0x3f, 0x6, @random="123650370244"}, 0x14) 08:01:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2000.726071] FAULT_INJECTION: forcing a failure. [ 2000.726071] name failslab, interval 1, probability 0, space 0, times 0 [ 2000.730248] CPU: 0 PID: 12721 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2000.732500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2000.735188] Call Trace: [ 2000.736201] dump_stack+0x107/0x167 [ 2000.737366] should_fail.cold+0x5/0xa [ 2000.738489] ? create_object.isra.0+0x3a/0xa20 [ 2000.739786] should_failslab+0x5/0x20 [ 2000.740917] kmem_cache_alloc+0x5b/0x360 [ 2000.742245] create_object.isra.0+0x3a/0xa20 [ 2000.743595] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2000.745099] kmem_cache_alloc_trace+0x151/0x360 [ 2000.746432] alloc_pipe_info+0x105/0x580 [ 2000.747657] splice_direct_to_actor+0x774/0x980 [ 2000.749069] ? _cond_resched+0x12/0x80 [ 2000.750218] ? inode_security+0x107/0x140 [ 2000.751413] ? pipe_to_sendpage+0x380/0x380 [ 2000.752646] ? selinux_file_permission+0x36/0x510 [ 2000.754194] ? do_splice_to+0x160/0x160 [ 2000.755472] ? security_file_permission+0x24e/0x570 [ 2000.756985] do_splice_direct+0x1c4/0x290 [ 2000.758171] ? splice_direct_to_actor+0x980/0x980 [ 2000.759567] ? selinux_file_permission+0x36/0x510 [ 2000.761038] ? security_file_permission+0x24e/0x570 [ 2000.762535] vfs_copy_file_range+0x57b/0x10f0 [ 2000.763852] ? generic_file_rw_checks+0x240/0x240 [ 2000.765294] ? __fget_files+0x296/0x480 [ 2000.766528] __do_sys_copy_file_range+0x176/0x420 [ 2000.767906] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2000.769265] ? ksys_write+0x1a9/0x260 [ 2000.770542] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2000.772029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2000.773509] do_syscall_64+0x33/0x40 [ 2000.774742] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2000.776450] RIP: 0033:0x7f9dba2a1b19 [ 2000.777706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2000.783526] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2000.786100] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2000.788548] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2000.790936] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2000.792810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2000.793897] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:01:29 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004600000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011700)="20000000945343359453433500000000d3f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030000000", 0x40, 0x2200}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2300}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2380}, {&(0x7f0000011c00)="c041000000400000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2a00}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2a80}, {&(0x7f0000011e00)="ed41000000080000d4f4655fd4f4655fd4f4655f00000000000002004000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000d6b05c9300000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2b00}, {&(0x7f0000011f00)="ed8100001a040000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000000da710e000000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2c00}, {&(0x7f0000012000)="ffa1000026000000d4f4655fd4f4655fd4f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3230323230373937342f66696c65302f66696c653000000000000000000000000000000000000000000000d6e8afef00000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2d00}, {&(0x7f0000012100)="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", 0x1a0, 0x2e00}, {&(0x7f0000012300)="ed81000064000000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000d9d9ad0100000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x3000}, {&(0x7f0000012400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012500)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000000040)="0000000000000000010000000000000000000000000000c5710000000000000000000000000000000800000000000000000000000000000000000000000000000080030000000000000000000000000000000000000000000000000000e1ffffd8778582fc981af3f8b589f9a7e5563a3c459d02afa6c10e1d176206b03c496f1c83", 0x82, 0x19400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x20400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x21400}, {&(0x7f0000013900)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000013f00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000014000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x48000}], 0x0, &(0x7f0000014100)) 08:01:29 executing program 3: r0 = fork() r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_procfs(r1, &(0x7f0000000040)='net/packet\x00') tkill(r1, 0x16) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_open_procfs(r0, &(0x7f0000000000)='schedstat\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) pread64(r2, &(0x7f0000000100)=""/131, 0x83, 0x8) 08:01:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2001.003244] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 08:01:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x0) 08:01:30 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 3) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:30 executing program 6: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001000010000000000fddbdf250000000005000000000000000c00008008000d00", @ANYRES32=0x0, @ANYBLOB="76f0395b9cac398be09ab81b644cc7ea10c5bde94f66e2adc9025daf916008c59bf592e95f06728bd46188f43357def4ca7423682a1f74d17fd52eaa3897cabbbf041e13d0"], 0x28}}, 0x0) r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder-control\x00', 0x2, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000180)=""/221, 0xdd}], 0x2) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x128, 0x1d, 0x200, 0x70bd25, 0x25dfdbfd, {0xc}, [@generic="c61d4bc50412a6089f2caf1027b9f58b58d33c2a9683d9aede26e0408489d1182dca43e622e06df726dd3f97a7d20e4ff7133d7731c7a376ee2ca7bc549f771bf43ddc451bfde82abe6bffa3c2702e1297fe71177fcddd0f28302ffacbceb227cbefc37bde11b0fdfb76099c05aa9c07b74e14eb93169f3ce9923d576b171d4024f94f8812c4337d3cfc414691bcfb703fe6a0a0497bc1ff5714aa381dd0470b287c244fc51ff792d9018985a22eef45fe567760d9bc3c8a51", @generic="cd80b80b7468639f1dd28dc86916c6c52422a71463583d6546be9443f3b11a0136b18e28e414b49117ebf3928c20c8b0cbdaaee0dbc8e19944b888b65f23259dbf1bc0a0debc8b503436f0aa6fe13786007a7d085a56f9db8ddf"]}, 0x128}, 0x1, 0x0, 0x0, 0x50}, 0x20040080) 08:01:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2001.303990] FAULT_INJECTION: forcing a failure. [ 2001.303990] name failslab, interval 1, probability 0, space 0, times 0 [ 2001.308299] CPU: 1 PID: 12774 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2001.310204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2001.313049] Call Trace: [ 2001.313798] dump_stack+0x107/0x167 [ 2001.314961] should_fail.cold+0x5/0xa [ 2001.315892] ? alloc_pipe_info+0x1e0/0x580 [ 2001.317046] should_failslab+0x5/0x20 [ 2001.318152] __kmalloc+0x72/0x3f0 [ 2001.319283] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2001.320679] alloc_pipe_info+0x1e0/0x580 [ 2001.321806] splice_direct_to_actor+0x774/0x980 [ 2001.322521] ? _cond_resched+0x12/0x80 [ 2001.323066] ? inode_security+0x107/0x140 [ 2001.323643] ? pipe_to_sendpage+0x380/0x380 [ 2001.324242] ? selinux_file_permission+0x36/0x510 [ 2001.324917] ? do_splice_to+0x160/0x160 [ 2001.325485] ? security_file_permission+0x24e/0x570 [ 2001.326195] do_splice_direct+0x1c4/0x290 [ 2001.326786] ? splice_direct_to_actor+0x980/0x980 [ 2001.327465] ? selinux_file_permission+0x36/0x510 [ 2001.328139] ? security_file_permission+0x24e/0x570 [ 2001.328838] vfs_copy_file_range+0x57b/0x10f0 [ 2001.329472] ? generic_file_rw_checks+0x240/0x240 [ 2001.330151] ? __fget_files+0x296/0x480 [ 2001.330741] __do_sys_copy_file_range+0x176/0x420 [ 2001.331416] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2001.332069] ? ksys_write+0x1a9/0x260 [ 2001.332631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2001.333366] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2001.334109] do_syscall_64+0x33/0x40 [ 2001.334669] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2001.335443] RIP: 0033:0x7f9dba2a1b19 [ 2001.336030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2001.338873] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2001.340042] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2001.341128] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2001.342203] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2001.343204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2001.344212] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:01:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14, 0x1a, 0xd01}, 0x14}}, 0x0) 08:01:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x0) 08:01:46 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 4) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x0, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0xfffffffd, 0x0, 0x0, 0x2, 0x2, "77004a6efdff0000000008002600", 0xffffffff, 0x401}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet(0x2, 0xa, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'wg2\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c611a7fa59d85995457792c00"]) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r0, @ANYBLOB="000000000400"/28, @ANYRES32, @ANYBLOB="000000004000000000000000000000aaebffffffffffffff00000000", @ANYRES32=r2, @ANYBLOB="000000000100"/28, @ANYRES32=r4, @ANYBLOB="00000000ab00"/28]) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) dup3(r3, r1, 0x80000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 08:01:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xd) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0xffffffffffffffe2) r1 = socket$inet6(0xa, 0x800, 0x2) accept$inet6(r1, 0x0, &(0x7f0000000080)) listen(r0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x3ff, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0xe2, 0x0, 0x80000000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 2017.498748] FAULT_INJECTION: forcing a failure. [ 2017.498748] name failslab, interval 1, probability 0, space 0, times 0 [ 2017.500863] CPU: 0 PID: 12807 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2017.501920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2017.503452] Call Trace: [ 2017.503840] dump_stack+0x107/0x167 [ 2017.504397] should_fail.cold+0x5/0xa [ 2017.504978] ? create_object.isra.0+0x3a/0xa20 [ 2017.505697] should_failslab+0x5/0x20 [ 2017.506302] kmem_cache_alloc+0x5b/0x360 [ 2017.506957] create_object.isra.0+0x3a/0xa20 [ 2017.507641] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2017.508438] __kmalloc+0x16e/0x3f0 [ 2017.509015] alloc_pipe_info+0x1e0/0x580 [ 2017.509658] splice_direct_to_actor+0x774/0x980 [ 2017.510387] ? _cond_resched+0x12/0x80 [ 2017.511004] ? inode_security+0x107/0x140 [ 2017.511645] ? pipe_to_sendpage+0x380/0x380 [ 2017.512307] ? selinux_file_permission+0x36/0x510 [ 2017.513050] ? do_splice_to+0x160/0x160 [ 2017.513654] ? security_file_permission+0x24e/0x570 [ 2017.514471] do_splice_direct+0x1c4/0x290 [ 2017.519199] ? splice_direct_to_actor+0x980/0x980 [ 2017.519921] ? selinux_file_permission+0x36/0x510 [ 2017.520637] ? security_file_permission+0x24e/0x570 [ 2017.521381] vfs_copy_file_range+0x57b/0x10f0 [ 2017.522053] ? generic_file_rw_checks+0x240/0x240 [ 2017.522782] ? __fget_files+0x296/0x480 [ 2017.523377] __do_sys_copy_file_range+0x176/0x420 [ 2017.524095] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2017.524795] ? ksys_write+0x1a9/0x260 [ 2017.525374] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2017.526183] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2017.526984] do_syscall_64+0x33/0x40 [ 2017.527543] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2017.528280] RIP: 0033:0x7f9dba2a1b19 [ 2017.528840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2017.531683] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2017.532847] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2017.533956] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2017.535078] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2017.536181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2017.537289] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:01:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 6: statfs(&(0x7f00000015c0)='./file0\x00', 0x0) unlink(&(0x7f0000001340)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x4, &(0x7f0000001900)=[{&(0x7f0000001700)="06e717eb2c2ab6f6a83d5baac99732bcae7ff5b4c597e702bc17b55561f2945644cfb9220a642cba0ad3d03cba586a79c92a8bc7ebad3adbac8f903040a0b7d7250831b2aeab242eb912843a7cf264960afaf17ddf25bfa6c95ed789c92f4f4302ead2a5c665994ff80a3a4af04e774aeeb4485384a3da3551ebb28822dc089a81d4a366bfe0839a30dc94e0b88304d8157d4a52c21b6a08d3555796e8df9a506b9ee7c9a522ea92a14e202881", 0xad, 0x808001}, {0x0, 0x0, 0xff}, {&(0x7f00000017c0)="0eaa101618e36559bcb4fa0b7428d2fee0e6579d9a25bcbcedd24278929143bc69a4d93c511c39456bf0f131c33ef774bface3b70d19782851c7ce731c23a9065044b635717ea6ff64b14c9cf164071b3a459702d69e1a2f8e9b6f901751a66000a1850ec80c3edf40482a79b69dc2f90d83b5d9360f77ec98fb62939c069e4fa513ce0487e5c22d171f2d9aa502080dde91d451380a652cda216bd0e66949ef912fe3d3e80f7d5088582573149e409f9cb2fd717089bf5d23948f439bd2dae0c703454c13779ab0fe7e74261984402aebb2a70ba93894d4f251e76bb7abc39b1afcc6f816b3b74991d09946e94be4c9a5", 0xf1}, {&(0x7f00000018c0)="e51271ab69d2d28d320adf4bedf86b2f04dba83b0adbdbdfa568e7575a1a7f0d2a1426", 0x23, 0x7fff}]) 08:01:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xe) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2017.718733] FAT-fs (loop5): Unrecognized mount option "./file1" or missing value 08:01:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x0) 08:01:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:01:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x10) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 6: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={0x0, 0xfffffffffffffd5a, &(0x7f0000000280)={&(0x7f0000000180)=@flushsa={0x14, 0x1c, 0x2, 0x70bd2b}, 0xb}, 0x1, 0x0, 0x0, 0x40448d4}, 0x20004800) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) 08:02:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fchdir(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@private0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) setsockopt$inet6_mreq(r1, 0x29, 0x3, &(0x7f0000000340)={@mcast2, r3}, 0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)=@updpolicy={0x404, 0x19, 0x300, 0x70bd27, 0x25dfdbfb, {{@in6=@mcast2, @in6=@local, 0x4e21, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0x20, 0x8, r3, 0xee01}, {0x1, 0x5, 0x7f, 0x4, 0x7b, 0xaa, 0x8, 0x7}, {0x7, 0xfffffffffffffff7, 0x7}, 0xdf3, 0x6e6bbb, 0x0, 0x1, 0x1, 0x3}, [@offload={0xc, 0x1c, {0x0, 0x2}}, @lastused={0xc, 0xf, 0x100}, @replay_thresh={0x8}, @XFRMA_SET_MARK={0x8, 0x1d, 0x1}, @mark={0xc, 0x15, {0x35075a, 0xb5}}, @lastused={0xc, 0xf, 0xfffffffffffffffb}, @algo_auth={0xaf, 0x1, {{'sha1-neon\x00'}, 0x338, "692a626b669b12e1d9e9e3ae5c77b1041f604be52a23c26cc8c476cbc6bb285d360fddde98c4b59c480ea03fe44abd137b4e95be89ad4ae033994bcf8850096c6351ee49c61c6c313a05047916ff32bd5c50ae884a79f6947f112949c7c0bf392bfe88d5adf951"}}, @algo_auth={0x10b, 0x1, {{'rmd128-generic\x00'}, 0x618, "0b92c0ad27a0472f33ea74ac2f8630a14f65a464d360fce4c2afab06f80b75e1d7379974bb753b868658f0f9206ad9a7e6bcb24165f0a516ba58d2575b974f739a551e679455a8933852c59e2ecf781fc9970b2a10d24199442ad06469753855f0a12e732ec7a0eeb3ef21c92ee134f35f49684588cb70e31dc87673ddce07f989ef8f274eb3e9eb28c458cbefb77983e20069891ebcf4ed75adb671a96c785fd29db096133c7e31896a9528b489b692cd22e2821da5987c9330ca0b5ce2689e5070b7"}}, @tfcpad={0x8, 0x16, 0x8}, @algo_auth={0x145, 0x1, {{'blake2s-128\x00'}, 0x7e8, "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"}}]}, 0x404}, 0x1, 0x0, 0x0, 0x40000}, 0x20000010) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:02:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xf) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 5) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x11) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2034.385770] FAULT_INJECTION: forcing a failure. [ 2034.385770] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.387824] CPU: 0 PID: 12870 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2034.388789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2034.389894] Call Trace: [ 2034.390399] dump_stack+0x107/0x167 [ 2034.391008] should_fail.cold+0x5/0xa [ 2034.391839] ? iter_file_splice_write+0x16d/0xbe0 [ 2034.392550] should_failslab+0x5/0x20 [ 2034.393091] __kmalloc+0x72/0x3f0 [ 2034.393666] iter_file_splice_write+0x16d/0xbe0 [ 2034.394298] ? atime_needs_update+0x600/0x600 [ 2034.395531] ? generic_splice_sendpage+0x140/0x140 [ 2034.397102] ? pipe_to_user+0x170/0x170 [ 2034.398407] ? _cond_resched+0x12/0x80 [ 2034.399708] ? avc_policy_seqno+0x9/0x70 [ 2034.401005] ? selinux_file_permission+0x36/0x510 [ 2034.402554] ? lockdep_init_map_type+0x2c7/0x780 [ 2034.404107] ? generic_splice_sendpage+0x140/0x140 [ 2034.405695] direct_splice_actor+0x10f/0x170 [ 2034.407214] splice_direct_to_actor+0x387/0x980 [ 2034.408728] ? pipe_to_sendpage+0x380/0x380 [ 2034.410094] ? do_splice_to+0x160/0x160 [ 2034.411436] ? security_file_permission+0x24e/0x570 [ 2034.413020] do_splice_direct+0x1c4/0x290 [ 2034.414367] ? splice_direct_to_actor+0x980/0x980 [ 2034.415947] ? selinux_file_permission+0x36/0x510 [ 2034.417566] ? security_file_permission+0x24e/0x570 [ 2034.419227] vfs_copy_file_range+0x57b/0x10f0 [ 2034.420291] FAULT_INJECTION: forcing a failure. [ 2034.420291] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.420722] ? generic_file_rw_checks+0x240/0x240 [ 2034.420743] ? __fget_files+0x296/0x480 [ 2034.420780] __do_sys_copy_file_range+0x176/0x420 [ 2034.424590] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2034.425259] ? ksys_write+0x1a9/0x260 [ 2034.425797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2034.426536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2034.427258] do_syscall_64+0x33/0x40 [ 2034.427751] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2034.428441] RIP: 0033:0x7f9dba2a1b19 [ 2034.428953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2034.431457] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2034.432499] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2034.433482] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2034.434448] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2034.435465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2034.436459] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2034.437475] CPU: 1 PID: 12873 Comm: syz-executor.2 Not tainted 5.10.149 #1 [ 2034.438624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2034.439923] Call Trace: [ 2034.440348] dump_stack+0x107/0x167 [ 2034.440909] should_fail.cold+0x5/0xa [ 2034.441504] ? alloc_pipe_info+0x105/0x580 [ 2034.442130] should_failslab+0x5/0x20 [ 2034.442697] kmem_cache_alloc_trace+0x55/0x360 [ 2034.443408] alloc_pipe_info+0x105/0x580 [ 2034.444012] splice_direct_to_actor+0x774/0x980 [ 2034.444709] ? _cond_resched+0x12/0x80 [ 2034.445316] ? inode_security+0x107/0x140 [ 2034.445957] ? pipe_to_sendpage+0x380/0x380 [ 2034.446614] ? selinux_file_permission+0x36/0x510 [ 2034.447371] ? do_splice_to+0x160/0x160 [ 2034.447978] ? security_file_permission+0x24e/0x570 [ 2034.448741] do_splice_direct+0x1c4/0x290 [ 2034.449354] ? splice_direct_to_actor+0x980/0x980 [ 2034.450072] ? selinux_file_permission+0x36/0x510 [ 2034.450843] ? security_file_permission+0x24e/0x570 [ 2034.451587] vfs_copy_file_range+0x57b/0x10f0 [ 2034.452285] ? generic_file_rw_checks+0x240/0x240 [ 2034.453023] ? __fget_files+0x296/0x480 [ 2034.453631] __do_sys_copy_file_range+0x176/0x420 [ 2034.454361] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2034.455099] ? ksys_write+0x1a9/0x260 [ 2034.455696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2034.456662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2034.457510] do_syscall_64+0x33/0x40 [ 2034.458097] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2034.458985] RIP: 0033:0x7f1ed311eb19 [ 2034.459531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2034.462117] RSP: 002b:00007f1ed0694188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2034.463179] RAX: ffffffffffffffda RBX: 00007f1ed3231f60 RCX: 00007f1ed311eb19 [ 2034.464174] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2034.465086] RBP: 00007f1ed06941d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2034.466005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2034.466929] R13: 00007fffc134e5ff R14: 00007f1ed0694300 R15: 0000000000022000 08:02:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000dc0000000f000000010000000000000000000000002000000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000000180)="4a1a4f3600040000d7f45cac28ce969f1fc98a83c36fa4279d10b2f38a3152a74444d355bb46deaeda", 0x29, 0x1500}], 0x0, &(0x7f0000000080)) r0 = syz_open_dev$vcsu(&(0x7f0000000140), 0x8, 0x2000) openat(r0, &(0x7f0000000300)='./file0\x00', 0x240, 0x100) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='transd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',access=any,\x00']) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x84000, 0x1d0) 08:02:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0/file0\x00', 0x40000, 0x4, &(0x7f0000001540)=[{&(0x7f0000010000)="2000000040000000030000b588e0d3000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f0000000000000000010c0000000000000b0000000002", 0x5a, 0x80000000400}, {&(0x7f0000000040)="020000000300000004", 0x9, 0x1ed}, {&(0x7f00000001c0)="ed41426409000000a0a775332c040000f94ef377143c5661655fe297ec34", 0x1e, 0x41ff}, {&(0x7f0000001440)="9231e290dcc2b1a5c95491c2a722f6f4cdfe6d4a6dabd2c1249b69542a447ff5b95e62a3c9ea5b1f30fc2a05a4e79637afb5757903c2c701f3bf6a373489715b5f08c743d7cbd1dda986937a33633f768ac44107c9b2f41bbdc2ff22ca674f3a92c653912794010588bbdd28891e973613c001b52869b520a73a321babb664aecebdd24e328bae13acad2577d6c54c042b95568760993598d31d669b6eb328fd400711fa1b779ad304264b6989d02a94a7b497b4853493a0170884cef3866b6ec5ac9cb939bbc320f1b33a6e2714904279cec1281a522b1065fd3570fe59795a09b85129db1c809d3d58", 0xea, 0x8}], 0x0, &(0x7f0000000140)) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') utimes(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)={{0x0, 0x2710}, {0x77359400}}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280), 0xa001, 0x0) move_mount(r0, &(0x7f0000000180)='./file0/file0\x00', r1, &(0x7f00000002c0)='./file0/file0\x00', 0x37) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/4096, 0x1000) mount$9p_xen(0x0, &(0x7f0000001400)='./file0\x00', 0x0, 0x0, 0x0) 08:02:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x23) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x10) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2034.641259] EXT4-fs error (device loop6): ext4_fill_super:4978: inode #2: comm syz-executor.6: casefold flag without casefold feature [ 2034.646196] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 2034.679348] EXT4-fs (loop6): mount failed [ 2034.775339] EXT4-fs error (device loop6): ext4_fill_super:4978: inode #2: comm syz-executor.6: casefold flag without casefold feature [ 2034.781295] EXT4-fs (loop6): corrupt root inode, run e2fsck [ 2034.782192] EXT4-fs (loop6): mount failed 08:02:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 6) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x0, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 6: r0 = fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x40010, 0xffffffffffffffff, 0x10000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000880)=""/4096, 0x1000) copy_file_range(0xffffffffffffffff, 0x0, r1, 0x0, 0x0, 0x0) 08:02:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x11) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xce) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 3: syz_emit_ethernet(0x125, &(0x7f0000000000)={@link_local, @dev, @void, {@mpls_uc={0x8847, {[{0x3, 0x0, 0x1}, {0x6}], @ipv6=@icmpv6={0x8, 0x6, "bcb158", 0xe7, 0x3a, 0xff, @dev={0xfe, 0x80, '\x00', 0x23}, @remote, {[@fragment={0x2, 0x0, 0x9, 0x0, 0x0, 0x1d, 0x65}, @fragment={0x87, 0x0, 0xff, 0x0, 0x0, 0x1a, 0x65}, @srh={0x32, 0x4, 0x4, 0x2, 0x1, 0x40, 0x3, [@empty, @mcast1]}, @srh={0x3b, 0x8, 0x4, 0x4, 0x1, 0x20, 0x2, [@dev={0xfe, 0x80, '\x00', 0x2f}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}]}], @ndisc_ra={0x86, 0x0, 0x0, 0x1, 0x7f, 0x75b3, 0x8, 0x80, [{0x5, 0x1, "de27bd41d5c5511a9459"}, {0x22, 0x9, "95ffb3494eb64f2ea4ba53caa4b056e10e65ddb5c3e5656b3ca454ae3104647c2adcc93460afdb9a33c71306acdce5497f93e60d8032d792096fe8e828676b9c4646412a7f5ff7c65f"}]}}}}}}}, 0x0) 08:02:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x1, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) [ 2050.700374] FAULT_INJECTION: forcing a failure. [ 2050.700374] name failslab, interval 1, probability 0, space 0, times 0 [ 2050.704322] CPU: 1 PID: 12929 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2050.705474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2050.706848] Call Trace: [ 2050.707291] dump_stack+0x107/0x167 [ 2050.707921] should_fail.cold+0x5/0xa [ 2050.708508] ? create_object.isra.0+0x3a/0xa20 [ 2050.709281] should_failslab+0x5/0x20 [ 2050.709956] kmem_cache_alloc+0x5b/0x360 [ 2050.710590] ? igrab+0xc0/0xc0 [ 2050.711233] create_object.isra.0+0x3a/0xa20 [ 2050.712099] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2050.712886] __kmalloc+0x16e/0x3f0 [ 2050.713451] iter_file_splice_write+0x16d/0xbe0 [ 2050.714184] ? atime_needs_update+0x600/0x600 [ 2050.714873] ? generic_splice_sendpage+0x140/0x140 [ 2050.715644] ? pipe_to_user+0x170/0x170 [ 2050.716259] ? _cond_resched+0x12/0x80 [ 2050.716861] ? avc_policy_seqno+0x9/0x70 [ 2050.717486] ? selinux_file_permission+0x36/0x510 [ 2050.718244] ? lockdep_init_map_type+0x2c7/0x780 [ 2050.718997] ? generic_splice_sendpage+0x140/0x140 [ 2050.719762] direct_splice_actor+0x10f/0x170 [ 2050.720453] splice_direct_to_actor+0x387/0x980 [ 2050.721181] ? pipe_to_sendpage+0x380/0x380 [ 2050.721850] ? do_splice_to+0x160/0x160 [ 2050.722471] ? security_file_permission+0x24e/0x570 [ 2050.723266] do_splice_direct+0x1c4/0x290 [ 2050.723894] ? splice_direct_to_actor+0x980/0x980 [ 2050.724626] ? selinux_file_permission+0x36/0x510 [ 2050.725364] ? security_file_permission+0x24e/0x570 [ 2050.726138] vfs_copy_file_range+0x57b/0x10f0 [ 2050.726828] ? generic_file_rw_checks+0x240/0x240 [ 2050.727783] ? __fget_files+0x296/0x480 [ 2050.728411] __do_sys_copy_file_range+0x176/0x420 [ 2050.729161] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2050.729886] ? ksys_write+0x1a9/0x260 [ 2050.730479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2050.731316] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2050.732110] do_syscall_64+0x33/0x40 [ 2050.732681] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2050.733457] RIP: 0033:0x7f9dba2a1b19 [ 2050.734041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2050.736718] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2050.737714] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2050.738640] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2050.739663] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2050.740603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2050.741516] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2050.761852] FAULT_INJECTION: forcing a failure. [ 2050.761852] name failslab, interval 1, probability 0, space 0, times 0 [ 2050.763878] CPU: 0 PID: 12937 Comm: syz-executor.2 Not tainted 5.10.149 #1 [ 2050.764865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2050.766108] Call Trace: [ 2050.766478] dump_stack+0x107/0x167 [ 2050.766988] should_fail.cold+0x5/0xa [ 2050.767587] ? create_object.isra.0+0x3a/0xa20 [ 2050.768292] should_failslab+0x5/0x20 [ 2050.768802] kmem_cache_alloc+0x5b/0x360 [ 2050.769407] create_object.isra.0+0x3a/0xa20 [ 2050.769999] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2050.770744] kmem_cache_alloc_trace+0x151/0x360 [ 2050.771463] alloc_pipe_info+0x105/0x580 [ 2050.772017] splice_direct_to_actor+0x774/0x980 [ 2050.772683] ? _cond_resched+0x12/0x80 [ 2050.773296] ? inode_security+0x107/0x140 [ 2050.773850] ? pipe_to_sendpage+0x380/0x380 [ 2050.774477] ? selinux_file_permission+0x36/0x510 [ 2050.775205] ? do_splice_to+0x160/0x160 [ 2050.775733] ? security_file_permission+0x24e/0x570 [ 2050.776477] do_splice_direct+0x1c4/0x290 [ 2050.777031] ? splice_direct_to_actor+0x980/0x980 [ 2050.777715] ? selinux_file_permission+0x36/0x510 [ 2050.778452] ? security_file_permission+0x24e/0x570 [ 2050.781227] vfs_copy_file_range+0x57b/0x10f0 [ 2050.781835] ? generic_file_rw_checks+0x240/0x240 [ 2050.782538] ? __fget_files+0x296/0x480 [ 2050.783199] __do_sys_copy_file_range+0x176/0x420 [ 2050.783848] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2050.784605] ? ksys_write+0x1a9/0x260 [ 2050.787383] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2050.788151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2050.788846] do_syscall_64+0x33/0x40 [ 2050.789401] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2050.790139] RIP: 0033:0x7f1ed311eb19 [ 2050.790640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2050.793253] RSP: 002b:00007f1ed0694188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2050.794303] RAX: ffffffffffffffda RBX: 00007f1ed3231f60 RCX: 00007f1ed311eb19 [ 2050.795318] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2050.796312] RBP: 00007f1ed06941d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2050.797339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2050.798332] R13: 00007fffc134e5ff R14: 00007f1ed0694300 R15: 0000000000022000 08:02:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x23) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xcf) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) fsetxattr(r0, &(0x7f0000000040)=@known='user.incfs.size\x00', &(0x7f0000000080)='ext4\x00', 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f000300040000000000000000000f00c7e0", 0x20, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x101600}, {&(0x7f0000010f00)="20000000d0fadacd51", 0x9, 0x1680}], 0x0, &(0x7f0000012900)) 08:02:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:19 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 7) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 3) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:20 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xd6, &(0x7f0000000280)={@broadcast, @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x64, 0x0, @gue={{0x0, 0x0, 0x0, 0x0, 0x0, @void}, "e3b51be59f02aad78e6273def65f47be20bf901d129e950622c52c5d8c3f045f8e23743b265f322674b7eb6855583f57f14a0f3aeba10f7a12d35a5881159e856f41866628268ba2e9793bedcea330bf04fe148312b2dc32061862b7bf6067707377ba723c903170c6cf2cd755f33b407a42a45c2d501e15600dd2f8ec2a5385e1dccd3a0afe7d976c06e004e00105db1e59b233c8857aa17fea50394e840026e50893249a4fb4d2e6f078498633591d51933f0bff6a8788f4975dce7369336624050a29cfe3e4669ed41b66148470"}}}}}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendto$packet(0xffffffffffffffff, &(0x7f0000000140)="238e653328849672ba880496888e", 0xe, 0x0, &(0x7f0000000000)={0x11, 0x3, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000004280)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f0000004340)={'syztnl2\x00', &(0x7f00000042c0)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x2, 0xffffffff, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10, 0x10, 0x95, 0xfff}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000004400)={'ip6_vti0\x00', &(0x7f0000004380)={'syztnl0\x00', 0x0, 0x29, 0x20, 0x1f, 0x3, 0x0, @loopback, @dev={0xfe, 0x80, '\x00', 0xc}, 0x7, 0x700, 0x3, 0xfffffffc}}) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@private0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}) setsockopt$inet6_mreq(r8, 0x29, 0x3, &(0x7f0000000340)={@mcast2, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000008380)={'sit0\x00', &(0x7f0000008300)={'ip6_vti0\x00', 0x0, 0x2f, 0x5c, 0xb9, 0x6, 0xb, @dev={0xfe, 0x80, '\x00', 0x2c}, @private1, 0x8000, 0x20, 0x9, 0x10000}}) sendmmsg$inet(r2, &(0x7f00000085c0)=[{{&(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000100)="05d71f05a9568abe5cd9e5455332b8a5abec432c8018eee3f6134490db22937e67449996d1949cf56d55d1dac101bc207b14fc3b5919434d35a1922b746435ab0a3529ac88cf315b71360ade052684bc5840819404ad5b573f24aaa28260562d89d7319ecc3d8f0cc6a596d5c1b8ac60ca585c3f288b0d", 0x77}], 0x2, &(0x7f0000001380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @dev={0xac, 0x14, 0x14, 0x24}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_retopts={{0x30, 0x0, 0x7, {[@ssrr={0x89, 0x1b, 0xd, [@dev={0xac, 0x14, 0x14, 0x35}, @local, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0xeb, 0x3, 0xe, [{@multicast2, 0x6}]}]}}}], 0x120}}, {{&(0x7f0000000240)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000003840)=[{&(0x7f00000014c0)="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", 0x1000}, {&(0x7f00000024c0)="f74c7eb306f597e62ee90d1cdaeba3776659714dd4267bf22beff99bc9f3da840d546125e75724435e2f7ba0c8d00c54e1911a0a3cf5311012fa8fb532964cb3b839ce18f397b81795d8e300982243b5f49df1a5364df3fc38295ee6f5bed8419f636aa68fb82960656c880ad77afe79b87816b7ef367729ca7382940473c1772dca49fff29babe247312bebe38ec7dcc20d87f25c8f9dc0139c03fa14e537ca894751fc39cbd2dd348282e271ad727ada0d732a217cab6ebfcf3028327dc90554fd88b88947eab033bb6e22e2050f33d75037364737bba2ca2c9316f7b4fed97ff626536a42e1a794f592b0d6e8621456c61a0dc9214ea1e5d8e4417597591654830a8d7146b2630f3130169faea1c761639b9761025005fa30430bf06b4b31c847c6c7730371c4ae1e5d1424993ecad9f7bf41634fc563ce1380a85df031350fffef52687d90d3bed781ba820da7a331556c1aa92f9a5a5a59c913f271c11910c90dc97cfadc7530f73703613c838ff2596faa5774ff82c3c7eb4875f3f9a492fac48b3256ab6dbeb2ba8dc8bdd26e01f8fc9cb1c3444cb16a51bfd11d343d27a800d64c204fcc54aa0266d8f94ee4f5f916ffdb7d95ee15d10cc2446ff8ba2008a945d2baa5771f346fe46ca9c95ef07985ad3ab3708894d15caebcf3305e47b6e23fb3b5276ab2ae263630765c99468c7bc6ed7a6683171401dcc62843ae824f2d0493c9bc21a2933ba55d30c55aedec8b0bb5c57b1c404a3952b50aa1a58a186abfccac02724cb05f0049cf19d7d6a653a8c1653429fd265bf5beedbacaca258bb50b784a7d127e08280c9332b0be44a8671d2fc17f38b771e19bc9f99ef0b00872104116c9446775a3fe96e828728217e2eff7ec0764299300f73cc190e4537f57017bb85db23e67b4198247db35ac0500816367be674e67ed2414708ba8cf11ef346adbd925956aeae114d329da194d3723401c88f6b390f724b03aee4760a0a6b804defb5a9edbe43c42e8b13337bf987b4ae46feaa1c974572e21f7293a797849e596b8b9bfbd403c83cff36bcea93ece51763a06b6a83b1b6740e5e09788b491c0589b059af6738a38a21ebbf67a4f813f377cf1d2bb6e2326351a5876a51552a075aed8af6d1c57c53d79f6c24eb1f7874fcd9ee0c756b448a898cdfdfabdeba30cc91f8fd631de20021090e43255d7591a3055f7c07ec066aa8733c8d11aadd093d0b169cd11903c905a028c486a74604610f98772660e49c7b17038498ae661bc9b25c23eb79a36079a87a395e2a6c6df867132e7c4a44ab757db24ff6d7e11372596e909e9facbb8a2e015eabb1fcec53533eea85d5ca32de3f3e8e3c931ffb54d7f2db7f234a73f2d48b70af71ab787a2c346e650d736e67bacf7c2f1ef27b7a221a52f9131299d22ef25d62b3b8d3247220a7e8e5e70c1f79b6ca4f65f1d1ecae5081c80346a4b35dff797633227af6d6c125c3ae282f3c326643b4d0926b756b060b62718ec852694dd24dfc8c3280980355d290f88248430d80202671ef2017bc516f7cd10e1ef2449c3e837512624dd206c9c5a21ce855fbee9c61e937bbcc3919c1eaf85c09774bfd387df29edd41beabb831c31e21b736c4b151777d393c15887bb3628219e58c3e10bef1a8bb9c181b7fca45500d1bf1359a15af144f2057a5bf358d7fa759c848c1c9c3f916fdd07cba5b3f46aa853e887fafd3597099ca992a7f344cba0660acbd3c11e071a76122dae2ff5382381c70e0c72d31539e02afbffd21f121b28b1f8445556e51ff1889253a5a2b445f201150a95166757dd8df560a2319a9c11e8a3c7377ca5147d750040316f5993957f9e4f6811220a0c48f6987dcb3427fbe6fdb697ed95a1f87ad40d5539e3ae600d556dc45f7ce2c93d769aaddf7c9052d917d054dd59f9b82400315e0df5c287acfe54a990ed2bbed494f6d4fd408a7bd90d6a06550f6d8e7f00bf45e5a0180e19d4262855d8c6838907134859aad8dec11d429d6645727388af3c03dfc1ef9b5380ccaefbe3aa4997b2951ca76590b6f26831fb74229ae9c5f91b5a025f2d3e6d9f3aed301042d8aa195be2444e6c359c53fc5b444691910e10a0f1bbf63bd9af94b1347eb92ddcb4c9c8e53690c0c716aab5d35259866cc8ef9f4a8a77ed40271e76558d7c7b09fb728d1f5e44955adcbd34d85a4c9b4686eb5104d0158d85f4b2d5c7edc92541346834e8719ca14aa076b906f0b3e550f298cdcf6347e01fbed8edde4e90b747270b0537f25cd3d4363991fbf7a79fec47ccd40b6ed617fcf7d077ee72a73f01d4a5359ca943d5b91e10307c59fe593d1a0f7779c8c166efb6261790bdacc0cd45a718abca0b34f532f89dea515f59fbe1b3179b6cdedab1e0c485618f68c037897f7c4de5cee6385f3bb81ed420c1cbb6330db7eb2cc54f9fb987c47731e62c85e4a9a11a9ad3ed12f57f63db042b2d942e358dc560c1d880b16a742fd707ea18ca46c9125a4effbaba83ccbf387aae93b16e1de50750d321b705a617445f01c7bc477744001372cc44bbb5e7fc5983d4a025818a07987de2d7ba6a7064e844d82ddf95d0707b9750c774f3cf0740376fe3972a20951d6858ace98c1b2a94104bf26bede17e6f9117022d43c36e8240da7bb1a7ec384ed5e941cea7634f842ce1a86e05a50ae8009fbf08f4948625b40215d6a4f53dd854576d79429e630aa233b38c43aeefbc4cec6dbe04265fa43aa253fd518f796c424ba0bdfc66332897727b60f618fd31b4c9b11862bb8820e538bbde8a43a7559336b4e5480b00de955fad080af775a89f5c09bfddd4e4c0652c45298e4133a8edc1381ed43ba187b534a7768f379d3e83f6c34ed0b9a14b909955ce258a02f6a17f87697faf6981126129ce168376be423c52b37ac9b22d25fbe3164ad7723f81110632ebc629d5049c308269d0f63c34d1df33feb001f5f754791f9a8c0c4a2b2c02fbf2adfce3f50137c8cdbae15c34120d7f3be6a2965cffeb3cf665cebf97b08e58bac03f777db2679b0fec81922a921e1a29f4fe950a1832ac3e1a328fdcb27487f5bdb9c85a1d36fd4740968779cb107369f584b3fd3a0182f08a8e0e7a24d94b0d95dda6cc45a78bf0ad624ea27bdc9cb5a3052070634686cecd2ff92885409f8b0afa8af48a6d5787cd186174a367303e46653ef9a5d726d0cb5e645ec6739a7c8994b1050c44f1f49a7628dbe55e236f34949d69684b43e36d124f1f487b24de387ad9d40f16a2b3f4713a55dd38a53da0713538466ee0b94248c55dfbc4172aabafdeb309a48431e5ab5f5177906a0deff1566932d2bd47ca92cfbde63b5362d6b8ec0ec29b4232f4da0b05e6afcebb2a28ab77a67054add50ab47eeb17b4977f45a45e19476381f779408bdb6c443fb71ac24c1ed8e9251685ff75024d888a8edc426d38f7c87daf96cae0a3276856fcfef1373db4611edc5effe025b59d8f938a95ffefa6ef636efa20257c521d0f7b171d8048f74f7828fc3738e34984ff0427320219d14b2cd9b52f98e78d3534122faf8c0960114dc5a66cb8e11ca9cfa1510772ad311ad5c087ab51cc8478c0db2ecf54590996806d06b8737ca35b89a25d2b0fe4c9425be19ec718d060dee067585f1290eda1e65a4a04700ac280b13d7f0694e54f78d82feae82267bba1eb0e6b150af93232c6648e98208a9565a5af77a78b11a961f5e50915c680350b0c042148856490c1cd34eb7b8b8c4f2f7e25ac3b0ca17486d824944df1d19e917e49ad6a9f422f923bf336fa52920e580a688d1e5f7da042ba1c53b9d054354b398c83d397e657915489fac1f6e39f1a1653e0f4f36f05821cff399211eda4f0833229e795eb2c9d54322d91d1b4d40dde4ef395d0e8e3063cf9bb26ca56fd7378fe99324a35c610665e6991e20d6e82f2eeda89ccc307a752e34c1f38c955869f54554e42733021a463ce02d02a18920d9e82fa15fce4fa44e3bca9334f1858ff8fc3cd8f556b97108adac74c5970ece8daf14de980e7756efebbbfa8d83a00c7177b78ac6c0c1f44369349ae9602372a80c071224fea26cd3d8c697e7fad04993a4ce010d7548dcf0835285d42a5134487def6579c0644b53f6e4058c3328cd0ef5ae4817a822ec920eaf149b6e8c93d2d27617443c66077e6528772e2fc1b48fcbff651313be80c4ceb10a00ca79822f1789295322989862f94ffa7a6b15b443ffe589b63c4b35727b4b87e29a23c70c8d68800dd4fad94cd73b96d3df813c4f8113fb3a8d1081dc1f9302917df88015441076a42fe43c0fc294a350a76c57ff1e012c780242584b0e22c44ed67e5192ae9553ee96393909f84f47e2248270d25bc02420c4b5c22401af48d7dd4185c26c2c5e661a19771c5ba73afd98ea5fe18897d574992343a146b74a0c5820aa2181fee26de86e1dfcce2e415330ec213585014ca2ce56b94d4f500e522db37a7f6665cc5d919af6e6ecf4df9be20857a9de6f186453ded9f0043df4a1b44e3ca4ff6efc9d0f35a5db3090c590457d4d7a842325aa6768dc4057f73120847a2cac0a34b08fb9330ce1561b190d518b49d433afef626f3f7bd71aa1f8bf6d63080f17a0af910e99cd7ec74a6891cbb20851e3376ca306f8aa0cac8c54b7b96027c511771bd53ea8b24717bca845e6319148528d8eec1d353ccbabd1f2dd5248c185fe5d381cc034024bd43f41ae9deea1743117e406a86b8c6be3055a8532f267600ba8cea25138856dd67e54a8bf14c17f6590dfaad7208f6da579c811e5b8193d9a256415ef1e4188734a33ef64b225ef767626256ff2b44aeceb20f2ec51c6096536510af262a4e507d2950fe7adac76ac4f6b23171293a49351ba76aaa09606cebcf716ebbaceb5bbfecb8851c0bfb46c8a35bd5f03791f1fdb7a25b3c8155971a658145cd44ca516ffef3c00ce0dc17a0b3225c886239033dbff436e95d3b7b39929afd6aa9362cb203e2bd82a620dbd6fb857b3eb3bdc2debd5c72e6f84ead7fa7ba9190e770f3523ba84797defe3c4868a3f83cf7d810811bd72cf7850a8d17be0b174a5a8260b965c5df3069cb16b8813745805b67d875c11dbc254fb3eecb115c8f181a8639789e92a066f41e88406d35bc2e3149500e90fc2a13f3a058fdc34ff8f032051f258da6f7e3da7374eb69d766837595fbb37991a6db654c474da54bc5ea90cac8a24cd55756d3421d9895725c0c486b69440ba72417d7018930ab5754c9e2eff4bce5f4360fa922eaea421903a3f5c157d060b23a8fbe241a34ee81e2b6d00473d512ebb11e4fdaa5ace59167b06218c0525520cef7b4d74373668c3c0cf7d00851377d14bc64fa216cbfd7d8ea09a97a0cfd1f27a14df517cb9fcc78d69c66c6ce37c2b346bda191dfda4e301e55ecf0666543efe9629ea287506336290a0c39c212f1efe094c8458b0ee4ff0f08cc2d80455b9b0fb15a4621b29121e15847dc7effded9ddab6de7649642cb1ab9e54effc31a28a3e34535f9fdc1204853a2c51b93ef5f432878c931ec84234bbcedc33f5262cb84fc3a59476c36daa6a833d8efce626f90f3a85dc68d0fd27db04ffb1e4b9f057dccd4fca983bb85e46226d24e8f9698702ece5a962a58c95cc0bd46913d0350b7a382c5402ba00be7bb7df5fa0e56fe5cedb68c7c9644810dfb7ed226e541b0cd7fe52d0abc94b792feb396eaa2539ba8bf1f9b392697fd6646400624f8a1281e1cd0e6f1de2e9284d5646966c4833b339c93bdba2775bcb0678d637d71", 0x1000}, {&(0x7f00000034c0)}, {&(0x7f0000003500)="f6601f1c75e9a75cee5a2550d0c67a3f56aaacec99620e4af9b648db4c1c0f02d7260b4ea845347f316303de42308c3041a62dd0d49f1a259ada71c4d12b58ed8f1e27d2b28aac388aa70bb207a2208e9d9cf6fe17206423e1f2bfe6e54eb590873d03cf7dce1da728043192345012f2da7eb2b7350e80a9990d8b88be43e1746f221d28ed03eac799b0ec06f99c55146ade40eab62eb335634bb9a98b1186cc1de52348fb62e0e2d33835e72a2b176d2f179124817db7316e8cb5", 0xbb}, {&(0x7f00000035c0)}, {&(0x7f0000003600)="c85b2e11d8c4211efc3c9784109c7ec37c19a0fffd67f7a191c66b73a9484f46907a61e0563bfceb182fb0d24006bb280b", 0x31}, {&(0x7f0000003640)="462d34c918fe12fa57b7c7ab3b092c8cb4db63766922b14e0f4101a087c8cf7e8daaf9b10e281d04a80aeda5e2e7b9e36a6b5f8177cb043f473e7cc2affef55852bf407c508aa42b374758d00d1f046c3a65e95c5c8eb88172bc37c8dd4f46289f7b139dcd97f514a544a7de01d31f09235a2636d2e2a07aad93409e6b3c12d84afb9eec83a04144", 0x88}, {&(0x7f0000003700)="a46c9f940f7cebffa877e768332c2a460ab1ee37e1d252e98bb4d98fea3fd14e122bff893e58f4cec852aafdd104dab8b8a208", 0x33}, {&(0x7f0000003740)="251f343603b9e365845eda65f138ccb455a7ffd1fb45250b07fc91419ad9df61d3e26cbe01ba64580c46027e02fe0326d0b687372a37994103df7a9e5ad7219e9dcc3aef69e654540547e6c916c98d063b274320175b00b1e3335ef0bc17280b860248b719f031343d4bbe353e5ace3124949b05aad0dc244344143de04eff24708f58229fea21102d305af04283cbbdbb2505008cbd41bff4027f46cacf6cf99ee25af05bc354d62eb298e7fac530cffb696dc31d68bc8fe49b528bed6c81176e54dd7fae2fbd8ab06a66a9bae4580cc92c01f061e271d1bfd8d9d23c73332aa185da193cb8938c1a", 0xe9}], 0x9, &(0x7f0000003900)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7fffffff}}, @ip_retopts={{0xbc, 0x0, 0x7, {[@cipso={0x86, 0x62, 0x3, [{0xa15e6629fb3717e6, 0x7, "d5c187388f"}, {0x7, 0x7, "863d23904d"}, {0x7, 0x9, "5edd8d1d27474d"}, {0x6, 0x10, "077f761faf6987ddc9296d9358c4"}, {0x7, 0xc, "69b82cb75b330141e1b6"}, {0x7, 0xf, "5639018071046fd694116bc235"}, {0x1, 0x8, "aab3f8527a04"}, {0x0, 0xa, "efed2ca5fe854f9d"}, {0x2, 0x8, "3d583629c526"}]}, @timestamp_prespec={0x44, 0xc, 0x1a, 0x3, 0x2, [{@loopback, 0xa6e}]}, @timestamp_prespec={0x44, 0x3c, 0x4c, 0x3, 0x1, [{@private=0xa010102, 0x4}, {@remote, 0x1}, {@rand_addr=0x64010100, 0x69ba}, {@loopback, 0x200}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@dev={0xac, 0x14, 0x14, 0x36}, 0x1}, {@multicast2, 0x3fe0000}]}, @noop, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @multicast1}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x110}}, {{&(0x7f0000003a40)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3d}}, 0x10, &(0x7f0000003dc0)=[{&(0x7f0000003a80)="4e9c60a292bfd05e8f4c1dde45278aececb00e0a8550f78eaedc6d0be7f2ed158f31b0d1f426d6129074e1b3c12f738a765256c4c402b5164b9e562004f9f72d99e341759a2ab8cc3775530ec404cdf14a37602558ddf7217deaba4b3655bc0c7ce96b07ada6ac2837c0e31a8f792dc0eab4fb6fea9f697d334f535833868c09f4ef0bc3435e33ccf91e10145adf622a225b7dcf60f5a3cf80299182d0b18bfa8f508254aead8d90c8b299b0d93f8fadf7549bd5d38527fc220477d8b0b68e35", 0xc0}, {&(0x7f0000003b40)="b8b1f1ea8c1c601c0650c9da87df264dfd7866635bf67a0b5ea61a72d150bede9e92d94376e7604dde3092bafa2ee85d914a470f4a55bd4af9296e386ae7578bb94acdb365e516f9bc28e806fc96263aa1fe1946c630f6862321cb0d200adf93297f46bb2c96dfb3ae3181acb928aa082117fb6000c8aa799adaea26a7ba3c964844da4ebf5093946b8abdc5e4bd56fae58c19dc71f6f076d0ea40a2b36c0837ecf7123e6fe545ef42ad25a0d062f7edcc3b4391b448aef25177c275c25b316fecb169291a5a07084f1f5b71fd9a95b1340196ea11f11c7dd0f1e7219fbd2e65714814ff6e78888a6bca", 0xea}, {&(0x7f0000003c40)="5e10e4127f81", 0x6}, {&(0x7f0000003c80)="d838996bb484f82160f5297306a428914a1d3d6d2c2dafee9018c02d4a5fe0b769a40f7019147ba1037bb6ecefc5c5d47767af12fb6fe1e91c92d5c9170a222cd5219d248813a8afb26ca2a113e20f91ff09220cf7f7863c92b934613b337f0d1393fdfe6bbf5a5d876e63c19c515c8b86ce71407129e333eaa12f15955eaddfc441d3cc1e5b52a5878b01e1315ab4db6b400669a5979cb1647679deacafe57db750e302617d14811df98ca45d786bbd14cebbf8752c", 0xb6}, {&(0x7f0000003d40)="13bd3defa1ed4c5350d6359a3a2f0212c9e1f2115622292a61b481eb4ceb15b1f634ef667f74b8b1270c4916890be0db0a4b5fb9632187452a41d4bed96cd61e53bd4e3f367d5933d4c1c186bf32f0ca1892b82ca92acd9af3c81398756fac1dcfe0c9dd83d878e4a251c4f935219ef9545c1e601658fec87eff", 0x7a}], 0x5, &(0x7f0000003e40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfc}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @rand_addr=0x64010101}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x470}}], 0xa0}}, {{&(0x7f0000003f00)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000004200)=[{&(0x7f0000003f40)="aa85e6ca24f848d696e5758cb2437aa112883409590c460d2da2726587198a3a0318d648f17baf7126646a75a1107ff33d1ec146921295fb767479cc085d133bbbbef7a6ea23a9624437ef870695376df7a49204f91c38cc00028257e15463d90a34e0dd53121ecca3c43c9ea8920727abfa3a0f3e26d0074c1cb2c90ffb4662db", 0x81}, {0xfffffffffffffffc}, {&(0x7f0000004000)="5a11fd151582777145750e0b4bd08caf1bc2487682e66157212add9653d54ae1f2d9bfec6a8a885bd0a11c", 0x2b}, {&(0x7f0000004040)="f2f7dedf8034c1ac35f7d0b6502e55f3097207747b986fe7107101653c8f1bf0abfe37ce7ad1c3ea17a4530f157df0c175625eaa0d5ef1af62ac586af274fb46ccf2a14e314645e605", 0x49}, {&(0x7f00000040c0)="b6e678b5852c7eb8843989fcdc5494a2fd6172d58feaccbf3e46f770fb942c9733e7514b137c381b2fcbc7fa782fc83ca7a5bae92b010caf7b4971616d284c11ad717ffc79", 0x45}, {&(0x7f0000004140)="8e7472e48b63ba9ba91f7f94f846ae3031b57861b1e9c9210f26ba2862a6fbfc0dd3cfa0b333faea650b16123707ee8a0caa2de13644436c9e24d8e7bf23a48758301e1347237c635b6865f3dda7e96ee0b90d8aaf06d5c088cb483b7179fc6f131fab1d20905934f3bf89642c6c0b1c3a736e55d77470829850f9e8c866b090078d7dd83541d8acc09b8d0f562af94c9fbd6d2dc07d481fb9fade5b2628586aa33c924aa94a941d", 0xa8}], 0x6, &(0x7f00000083c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @loopback, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @empty, @dev={0xac, 0x14, 0x14, 0x22}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @loopback, @local}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0xa7, 0x0, 0x7, [0x37]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @rand_addr=0x64010100, @loopback}}}], 0xb8}}, {{&(0x7f0000008480)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000008580)=[{&(0x7f00000084c0)="2b3b22263307d5559b193ed8a0d1585d88f55faaa65cdd9c5ecdab91ffac1f83b0638df1e2d94a1726a63257b01564d911c6712f819131547d047b495e6fe4364d12da4b7c320cf1b4b791405714f987a941471c7578ef681bd12c7e5c07ce503da4e88dd12c095780c3765947358fef7b09dd10d8cbe4b03b3e6c8d46591ce7b44debd9d14b64c4bf8842286c59b517b2334d6943df5305f5bf1fdb3a99692a839b40a1f618a1a97adf92c3147e5ed148f7", 0xb2}], 0x1}}], 0x5, 0x4008041) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0, 0x0) [ 2051.135978] FAULT_INJECTION: forcing a failure. [ 2051.135978] name failslab, interval 1, probability 0, space 0, times 0 [ 2051.138209] CPU: 1 PID: 12976 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2051.139170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2051.140263] Call Trace: [ 2051.140636] dump_stack+0x107/0x167 [ 2051.141141] should_fail.cold+0x5/0xa [ 2051.141679] ? jbd2__journal_start+0x190/0x890 [ 2051.142311] should_failslab+0x5/0x20 [ 2051.142842] kmem_cache_alloc+0x5b/0x360 [ 2051.143435] jbd2__journal_start+0x190/0x890 [ 2051.144051] __ext4_journal_start_sb+0x214/0x430 [ 2051.144725] ext4_dirty_inode+0xbc/0x130 [ 2051.145293] ? ext4_setattr+0x22c0/0x22c0 [ 2051.145861] __mark_inode_dirty+0x492/0xf10 [ 2051.146455] ? security_inode_need_killpriv+0x79/0xa0 [ 2051.147182] generic_update_time+0x21c/0x370 [ 2051.147851] file_update_time+0x43a/0x520 [ 2051.148475] ? evict_inodes+0x420/0x420 [ 2051.149081] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2051.149835] file_modified+0x7d/0xa0 [ 2051.150397] ext4_file_write_iter+0x8f9/0x1890 [ 2051.151127] ? stack_trace_consume_entry+0x160/0x160 [ 2051.151906] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2051.152609] ? kasan_save_stack+0x32/0x40 [ 2051.153247] ? kasan_save_stack+0x1b/0x40 [ 2051.153878] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2051.154657] ? iter_file_splice_write+0x16d/0xbe0 [ 2051.155354] ? direct_splice_actor+0x10f/0x170 [ 2051.155982] ? splice_direct_to_actor+0x387/0x980 [ 2051.156640] ? do_splice_direct+0x1c4/0x290 [ 2051.157236] ? vfs_copy_file_range+0x57b/0x10f0 [ 2051.157946] ? __do_sys_copy_file_range+0x176/0x420 [ 2051.158656] do_iter_readv_writev+0x476/0x750 [ 2051.159289] ? new_sync_write+0x660/0x660 [ 2051.159869] ? selinux_file_permission+0x36/0x510 [ 2051.160635] do_iter_write+0x191/0x670 [ 2051.161190] vfs_iter_write+0x70/0xa0 [ 2051.161784] iter_file_splice_write+0x721/0xbe0 [ 2051.162470] ? generic_splice_sendpage+0x140/0x140 [ 2051.163174] ? avc_policy_seqno+0x9/0x70 [ 2051.163761] ? selinux_file_permission+0x36/0x510 [ 2051.164445] ? lockdep_init_map_type+0x2c7/0x780 [ 2051.165107] ? generic_splice_sendpage+0x140/0x140 [ 2051.165779] direct_splice_actor+0x10f/0x170 [ 2051.166393] splice_direct_to_actor+0x387/0x980 [ 2051.167062] ? pipe_to_sendpage+0x380/0x380 [ 2051.167667] ? do_splice_to+0x160/0x160 [ 2051.168208] ? security_file_permission+0x24e/0x570 [ 2051.168912] do_splice_direct+0x1c4/0x290 [ 2051.169489] ? splice_direct_to_actor+0x980/0x980 [ 2051.170234] ? selinux_file_permission+0x36/0x510 [ 2051.171026] ? security_file_permission+0x24e/0x570 [ 2051.171802] vfs_copy_file_range+0x57b/0x10f0 [ 2051.172505] ? generic_file_rw_checks+0x240/0x240 [ 2051.173260] ? __fget_files+0x296/0x480 08:02:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) copy_file_range(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)=0x3ff, 0x9, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x75, 0x6, 0x7f, 0x401, 0x10, @local, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x1, 0x8000, 0x9, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r3, 0x89f7, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6gre0\x00', r4, 0x0, 0x81, 0x3d, 0x8, 0x11, @empty, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10, 0x7, 0x0, 0x5}}) ioctl$AUTOFS_IOC_PROTOSUBVER(r3, 0x80049367, &(0x7f0000000000)) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f00000000c0)=0x1) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000280)="0000abe02400030021206cda3b5e5672b89aeddb2a535fbd0706006dff0043a9d7cceb232fb81bf74ebdd05b7677", 0x2e}, {&(0x7f00000001c0)="7fd40046e92ed2616f72657d044129471d4fd47924fd0900849e00"/42, 0x2a}], 0x2) [ 2051.174221] __do_sys_copy_file_range+0x176/0x420 [ 2051.176394] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2051.177122] ? ksys_write+0x1a9/0x260 [ 2051.179412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2051.182427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2051.184140] do_syscall_64+0x33/0x40 [ 2051.184730] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2051.185531] RIP: 0033:0x7f9dba2a1b19 [ 2051.186121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2051.189108] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2051.190307] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2051.191408] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000006 [ 2051.192526] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2051.193612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2051.194707] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2051.306249] FAULT_INJECTION: forcing a failure. [ 2051.306249] name failslab, interval 1, probability 0, space 0, times 0 [ 2051.307861] CPU: 1 PID: 12984 Comm: syz-executor.2 Not tainted 5.10.149 #1 [ 2051.308781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2051.309887] Call Trace: [ 2051.310266] dump_stack+0x107/0x167 [ 2051.310774] should_fail.cold+0x5/0xa [ 2051.311336] ? alloc_pipe_info+0x1e0/0x580 [ 2051.311920] should_failslab+0x5/0x20 [ 2051.312443] __kmalloc+0x72/0x3f0 [ 2051.312926] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2051.313628] alloc_pipe_info+0x1e0/0x580 [ 2051.314201] splice_direct_to_actor+0x774/0x980 [ 2051.314846] ? _cond_resched+0x12/0x80 [ 2051.315421] ? inode_security+0x107/0x140 [ 2051.315986] ? pipe_to_sendpage+0x380/0x380 [ 2051.316575] ? selinux_file_permission+0x36/0x510 [ 2051.317267] ? do_splice_to+0x160/0x160 [ 2051.317821] ? security_file_permission+0x24e/0x570 [ 2051.318525] do_splice_direct+0x1c4/0x290 [ 2051.319119] ? splice_direct_to_actor+0x980/0x980 [ 2051.319780] ? selinux_file_permission+0x36/0x510 [ 2051.320463] ? security_file_permission+0x24e/0x570 [ 2051.321179] vfs_copy_file_range+0x57b/0x10f0 [ 2051.321812] ? generic_file_rw_checks+0x240/0x240 [ 2051.322486] ? __fget_files+0x296/0x480 [ 2051.323066] __do_sys_copy_file_range+0x176/0x420 [ 2051.323735] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2051.324390] ? ksys_write+0x1a9/0x260 [ 2051.324926] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2051.325653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2051.326371] do_syscall_64+0x33/0x40 [ 2051.326885] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2051.327615] RIP: 0033:0x7f1ed311eb19 [ 2051.328124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2051.330613] RSP: 002b:00007f1ed0694188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2051.331663] RAX: ffffffffffffffda RBX: 00007f1ed3231f60 RCX: 00007f1ed311eb19 [ 2051.332643] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2051.333603] RBP: 00007f1ed06941d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2051.334560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2051.335561] R13: 00007fffc134e5ff R14: 00007f1ed0694300 R15: 0000000000022000 08:02:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) r3 = fsmount(r2, 0x0, 0x82) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(r3, r4, 0x2) creat(&(0x7f0000000040)='./file0\x00', 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 08:02:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 4) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 8) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc1) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}]}}) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000880)=ANY=[@ANYBLOB="c8040000", @ANYRES16=r2, @ANYBLOB="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"], 0x4c8}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x10001}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x2c}}, 0x0) [ 2067.330951] FAULT_INJECTION: forcing a failure. [ 2067.330951] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.333626] CPU: 0 PID: 13020 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2067.338496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.341181] Call Trace: [ 2067.342067] dump_stack+0x107/0x167 [ 2067.343408] should_fail.cold+0x5/0xa [ 2067.344759] ? create_object.isra.0+0x3a/0xa20 [ 2067.346438] should_failslab+0x5/0x20 [ 2067.347812] kmem_cache_alloc+0x5b/0x360 [ 2067.349290] create_object.isra.0+0x3a/0xa20 [ 2067.350887] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2067.352726] kmem_cache_alloc+0x159/0x360 [ 2067.354070] ? release_pages+0x806/0xc20 [ 2067.355386] alloc_buffer_head+0x20/0x110 [ 2067.356905] alloc_page_buffers+0x14d/0x6d0 [ 2067.358267] create_empty_buffers+0x2c/0x640 [ 2067.359605] create_page_buffers+0x1bb/0x230 [ 2067.361046] __block_write_begin_int+0x1d1/0x19c0 [ 2067.362703] ? fat_add_cluster+0x100/0x100 [ 2067.364105] ? add_to_page_cache_locked+0x40/0x40 [ 2067.365491] ? __page_cache_alloc+0x10d/0x360 [ 2067.366817] ? remove_inode_buffers+0x300/0x300 [ 2067.368275] ? pagecache_get_page+0x243/0xc80 [ 2067.369728] ? perf_trace_lock+0xac/0x490 [ 2067.370840] ? wait_for_stable_page+0x92/0xe0 [ 2067.372167] cont_write_begin+0x466/0x970 [ 2067.373424] ? fat_add_cluster+0x100/0x100 [ 2067.374831] ? nobh_write_begin+0xed0/0xed0 [ 2067.376322] ? __mark_inode_dirty+0x9dc/0xf10 [ 2067.377721] ? lock_downgrade+0x6d0/0x6d0 [ 2067.378911] ? do_raw_spin_lock+0x121/0x260 [ 2067.380194] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2067.381825] fat_write_begin+0x89/0x180 [ 2067.383046] ? fat_add_cluster+0x100/0x100 [ 2067.384323] generic_perform_write+0x1fe/0x4e0 [ 2067.385741] ? fat_direct_IO+0x1ef/0x380 [ 2067.387090] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2067.389213] ? generic_file_direct_write+0x368/0x560 [ 2067.390845] __generic_file_write_iter+0x2cd/0x5d0 [ 2067.392391] generic_file_write_iter+0xdb/0x230 [ 2067.393719] do_iter_readv_writev+0x476/0x750 [ 2067.395021] ? new_sync_write+0x660/0x660 [ 2067.396413] ? selinux_file_permission+0x36/0x510 [ 2067.398021] do_iter_write+0x191/0x670 [ 2067.399336] vfs_iter_write+0x70/0xa0 [ 2067.400579] iter_file_splice_write+0x721/0xbe0 [ 2067.402034] ? generic_splice_sendpage+0x140/0x140 [ 2067.403596] ? avc_policy_seqno+0x9/0x70 [ 2067.404700] ? selinux_file_permission+0x36/0x510 [ 2067.406145] ? lockdep_init_map_type+0x2c7/0x780 [ 2067.407606] ? generic_splice_sendpage+0x140/0x140 [ 2067.409137] direct_splice_actor+0x10f/0x170 [ 2067.410504] splice_direct_to_actor+0x387/0x980 [ 2067.411997] ? pipe_to_sendpage+0x380/0x380 [ 2067.413383] ? do_splice_to+0x160/0x160 [ 2067.414632] ? security_file_permission+0x24e/0x570 [ 2067.416196] do_splice_direct+0x1c4/0x290 [ 2067.417569] ? splice_direct_to_actor+0x980/0x980 [ 2067.419135] ? selinux_file_permission+0x36/0x510 [ 2067.420016] ? security_file_permission+0x24e/0x570 [ 2067.420703] vfs_copy_file_range+0x57b/0x10f0 [ 2067.421412] ? generic_file_rw_checks+0x240/0x240 [ 2067.422173] ? __fget_files+0x296/0x480 [ 2067.422817] __do_sys_copy_file_range+0x176/0x420 [ 2067.423544] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2067.424245] ? ksys_write+0x1a9/0x260 [ 2067.424834] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2067.425654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2067.426450] do_syscall_64+0x33/0x40 [ 2067.427028] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2067.427880] RIP: 0033:0x7f9dba2a1b19 [ 2067.429009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.435465] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2067.437974] FAULT_INJECTION: forcing a failure. [ 2067.437974] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.441948] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2067.441992] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2067.442001] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2067.442010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2067.442018] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2067.448305] CPU: 1 PID: 13029 Comm: syz-executor.2 Not tainted 5.10.149 #1 [ 2067.449248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2067.450457] Call Trace: [ 2067.450888] dump_stack+0x107/0x167 [ 2067.451754] should_fail.cold+0x5/0xa [ 2067.452363] ? create_object.isra.0+0x3a/0xa20 [ 2067.453091] should_failslab+0x5/0x20 [ 2067.453715] kmem_cache_alloc+0x5b/0x360 [ 2067.454339] create_object.isra.0+0x3a/0xa20 [ 2067.455035] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2067.455867] __kmalloc+0x16e/0x3f0 [ 2067.456406] alloc_pipe_info+0x1e0/0x580 [ 2067.457044] splice_direct_to_actor+0x774/0x980 [ 2067.458436] ? _cond_resched+0x12/0x80 [ 2067.459058] ? inode_security+0x107/0x140 [ 2067.459708] ? pipe_to_sendpage+0x380/0x380 [ 2067.460397] ? selinux_file_permission+0x36/0x510 [ 2067.461156] ? do_splice_to+0x160/0x160 [ 2067.461741] ? security_file_permission+0x24e/0x570 [ 2067.462485] do_splice_direct+0x1c4/0x290 08:02:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x188) creat(&(0x7f0000000000)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x10042, 0x1d0) fallocate(r1, 0x3, 0xe3ff, 0x8000) [ 2067.463090] ? splice_direct_to_actor+0x980/0x980 [ 2067.471402] ? selinux_file_permission+0x36/0x510 [ 2067.472118] ? security_file_permission+0x24e/0x570 [ 2067.472917] vfs_copy_file_range+0x57b/0x10f0 [ 2067.473610] ? generic_file_rw_checks+0x240/0x240 [ 2067.474344] ? __fget_files+0x296/0x480 [ 2067.474998] __do_sys_copy_file_range+0x176/0x420 [ 2067.475740] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2067.476469] ? ksys_write+0x1a9/0x260 [ 2067.477047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2067.477820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2067.478604] do_syscall_64+0x33/0x40 [ 2067.479200] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2067.480010] RIP: 0033:0x7f1ed311eb19 [ 2067.480598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2067.483436] RSP: 002b:00007f1ed0652188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2067.484612] RAX: ffffffffffffffda RBX: 00007f1ed32320e0 RCX: 00007f1ed311eb19 [ 2067.485664] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2067.486719] RBP: 00007f1ed06521d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2067.487791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2067.488885] R13: 00007fffc134e5ff R14: 00007f1ed0652300 R15: 0000000000022000 08:02:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000000000000000000003e00000008000300", @ANYRES32=r1, @ANYBLOB="0c007f000000000000000000"], 0x28}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r2, 0x0, 0x3) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x28, 0x0, 0x300, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x4, 0x65}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x2004c880}, 0x404d880) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@access_any}]}}) fchmod(r7, 0x129) 08:02:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc3) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000007c0)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f00000002c0)='./file0\x00', 0x6, 0x4, &(0x7f0000000640)=[{&(0x7f0000000300)="3ccdcf27d2a4915948b0cc96805a83da46dd5fc8151a38b8693eac535dce27cfafc5660ae4c6d0589e544c17f56cb721a2a582d676ceef200df0b46ccf6400192b0d099e8b3dce40ac027e3ba17f35e4702969fce72552001e00f318862e44e41c7ad7b6c37dcd8d03c0dab0a310f871538becbee324f0ee0ef550455aabfb74abe51cba8489de51719fa71e4e97025aa160c2c194b68c57d1", 0x99, 0x7}, {&(0x7f00000003c0)="67ca58dd24c9f0e849ba18254bab1423bbee48143b6af46c9cf885b3219f0f5eabe24ba1e1a32f6e14163e139252fe57a4f518fe40162cff78c34206279cc05b76df4f989753542126ef755ab986f4f594f16878c27724a23974fef4cb570f807bcf3aa31f527806422a3b6aa6a7d97cd4f60db7a4783dc6d4efdb77ba0444d05364f1fbd2301702ae2fa3570f8963a5f77c28a02ee616ffbd602840b62c9a864dc58d612edc3b9cbf2c74e50edfb7707d2b175c8fa3ed3b0e805056bde8f4563c776359e8ffb03d37d6dbe2d948c22785b60b2acc3d14c41cccd48e2c40fee023d4513cf462d54737db2e6bbd192ea5c9", 0xf1, 0x3}, {&(0x7f0000000540)="b9db0b10d6b5603bb50cce77c42caf76a1c9072eae025ce848b5d82d5edc0cdfc02f55191eb273dabb63816cd6705eaf6e799c7d10353899b184d1a65343a48b90cb31ade97d3354a92d565c4e5397aebe8f77e0ad76091c46a23b659792fa4299f6ca1dfb9c88c3cf907492d623a5b91ffc7f0ca29cc20ada08b6", 0x7b, 0x80000001}, {&(0x7f00000005c0)="ce0101576612d5e6c9703bccbd2dcdd206f83465636598c3dfded97f49548d7d47d96b5d7500da8ac938f833e53cc4e184fe51aafb7e8bf7e830040edf17f0f63fec78f33e4d53e90121fc36ecda16d0b141c23a349c40797321b81a7be32939b1011772ececc0eff19d95b31868e4c9fbe462a185a6aac70ae483e337", 0x7d, 0x8}], 0x1088000, &(0x7f0000000800)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x35, 0x33, 0x3a, 0x35]}}}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0xe6}}, {@mpol={'mpol', 0x3d, {'local', '=static', @void}}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@size={'size', 0x3d, [0x38, 0x74, 0x32, 0x38]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x25, 0x74, 0x65, 0x37, 0x65, 0x39, 0x25, 0x25]}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x18\'}.()'}}, {@uid_gt={'uid>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x0, 0x34, 0x33, 0x36, 0x31, 0x61, 0x39], 0x2d, [0x35, 0x37, 0x32, 0x31], 0x2d, [0x33, 0x36, 0x39, 0x66], 0x2d, [0x35, 0x0, 0x39], 0x2d, [0x38, 0x66, 0x64, 0x35, 0x62, 0x36, 0x35, 0x38]}}}, {@smackfsroot={'smackfsroot', 0x3d, '@}.}/&'}}, {@seclabel}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@dont_hash}, {@smackfshat={'smackfshat', 0x3d, '+*!+.,\xad&*\x8c,'}}]}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file1\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="58656dad9e1e8431a10f527063ff0952f117b06dcdd34ed88146742158073af0eb188bea37b8dbeec0c194e2a19a9053167996f68fc814b47b9deee7b280c54f367fb05749cd381b78be82aa5516885ed15eff9d68696c68b767c8395a6a6db40398f9ea4af85217f3928822564e0ed580b843efd7e69b00f866c7c597a89323c234f4bb01dca3f75d13988a53d9ee5bb262015c21b61a6fd5eae1555188614450138181bf16b39da64e6c5beb2b5b15fffaa7ee77d0daa8a1e202cedafb82295e612d947dc20b0daed16afb5a8de647f98a4e6ba43c4241645a597de93dde", 0xdf, 0x5}], 0x10, &(0x7f0000000280)={[{@shortname_win95}], [{@obj_user={'obj_user', 0x3d, 'ramfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'ramfs\x00'}}, {@measure}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0/file1\x00', 0x1000, 0x0) [ 2067.941976] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 08:02:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 9) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd3) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2068.121286] FAT-fs (loop6): Unrecognized mount option "obj_user=ramfs" or missing value [ 2068.195795] FAULT_INJECTION: forcing a failure. [ 2068.195795] name failslab, interval 1, probability 0, space 0, times 0 [ 2068.197603] CPU: 1 PID: 13070 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2068.198608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2068.199910] Call Trace: [ 2068.200315] dump_stack+0x107/0x167 [ 2068.200889] should_fail.cold+0x5/0xa [ 2068.201476] ? create_object.isra.0+0x3a/0xa20 [ 2068.202191] should_failslab+0x5/0x20 [ 2068.202768] kmem_cache_alloc+0x5b/0x360 [ 2068.203526] create_object.isra.0+0x3a/0xa20 [ 2068.204249] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2068.205946] kmem_cache_alloc+0x159/0x360 [ 2068.206584] alloc_buffer_head+0x20/0x110 [ 2068.207233] alloc_page_buffers+0x14d/0x6d0 [ 2068.207892] create_empty_buffers+0x2c/0x640 [ 2068.208585] create_page_buffers+0x1bb/0x230 [ 2068.209268] __block_write_begin_int+0x1d1/0x19c0 [ 2068.210014] ? fat_add_cluster+0x100/0x100 [ 2068.210667] ? add_to_page_cache_locked+0x40/0x40 [ 2068.211432] ? __page_cache_alloc+0x10d/0x360 [ 2068.212125] ? remove_inode_buffers+0x300/0x300 [ 2068.212834] ? pagecache_get_page+0x243/0xc80 [ 2068.213826] ? perf_trace_lock+0xac/0x490 [ 2068.214462] ? wait_for_stable_page+0x92/0xe0 [ 2068.215159] cont_write_begin+0x466/0x970 [ 2068.216391] ? fat_add_cluster+0x100/0x100 [ 2068.217045] ? nobh_write_begin+0xed0/0xed0 [ 2068.217733] ? __mark_inode_dirty+0x9dc/0xf10 [ 2068.218418] ? lock_downgrade+0x6d0/0x6d0 [ 2068.219057] ? do_raw_spin_lock+0x121/0x260 [ 2068.219718] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2068.220497] fat_write_begin+0x89/0x180 [ 2068.221121] ? fat_add_cluster+0x100/0x100 [ 2068.221781] generic_perform_write+0x1fe/0x4e0 [ 2068.222490] ? fat_direct_IO+0x1ef/0x380 [ 2068.223163] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2068.224295] ? generic_file_direct_write+0x368/0x560 [ 2068.225096] __generic_file_write_iter+0x2cd/0x5d0 [ 2068.225873] generic_file_write_iter+0xdb/0x230 [ 2068.226591] do_iter_readv_writev+0x476/0x750 [ 2068.227298] ? new_sync_write+0x660/0x660 [ 2068.227939] ? selinux_file_permission+0x36/0x510 [ 2068.228699] do_iter_write+0x191/0x670 [ 2068.229326] vfs_iter_write+0x70/0xa0 [ 2068.229914] iter_file_splice_write+0x721/0xbe0 [ 2068.230645] ? generic_splice_sendpage+0x140/0x140 [ 2068.231417] ? avc_policy_seqno+0x9/0x70 [ 2068.232035] ? selinux_file_permission+0x36/0x510 [ 2068.232779] ? lockdep_init_map_type+0x2c7/0x780 [ 2068.233501] ? generic_splice_sendpage+0x140/0x140 [ 2068.234233] direct_splice_actor+0x10f/0x170 [ 2068.234901] splice_direct_to_actor+0x387/0x980 [ 2068.235740] ? pipe_to_sendpage+0x380/0x380 [ 2068.236393] ? do_splice_to+0x160/0x160 [ 2068.237007] ? security_file_permission+0x24e/0x570 [ 2068.237759] do_splice_direct+0x1c4/0x290 [ 2068.238381] ? splice_direct_to_actor+0x980/0x980 [ 2068.239108] ? selinux_file_permission+0x36/0x510 [ 2068.239858] ? security_file_permission+0x24e/0x570 [ 2068.240624] vfs_copy_file_range+0x57b/0x10f0 [ 2068.241318] ? generic_file_rw_checks+0x240/0x240 [ 2068.242059] ? __fget_files+0x296/0x480 [ 2068.242693] __do_sys_copy_file_range+0x176/0x420 [ 2068.243478] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2068.244211] ? ksys_write+0x1a9/0x260 [ 2068.244804] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2068.245618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2068.246412] do_syscall_64+0x33/0x40 [ 2068.246978] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2068.247809] RIP: 0033:0x7f9dba2a1b19 [ 2068.248374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2068.251136] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2068.252284] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2068.253364] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2068.254444] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2068.255552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2068.256537] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:02:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc4) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3a7ea92ac27e65d3ede42956b835", @ANYRES16=r2, @ANYBLOB="090400000000000000002100000009001f00706879310000000005002000000000000c0005008100555555555555"], 0x34}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000140)={'wpan0\x00'}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), r1) sendmsg$IEEE802154_ADD_IFACE(r6, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r7, 0x40c, 0x70bd29, 0x5, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r8) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r10, 0x8933, &(0x7f0000000140)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r8, &(0x7f0000000340)={0x0, 0x500, &(0x7f0000000300)={&(0x7f0000000100)={0x34, r9, 0x609, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x3}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r11}]}, 0x34}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r8, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20000) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r3, &(0x7f0000000340)={0x0, 0x500, &(0x7f0000000300)={&(0x7f0000000100)={0x34, r4, 0x609, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x3}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r12}]}, 0x34}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r11}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r12}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x24004090) 08:02:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 10) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd4) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80) umount2(&(0x7f00000000c0)='./file0\x00', 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 08:02:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2084.853704] FAULT_INJECTION: forcing a failure. [ 2084.853704] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.855641] CPU: 1 PID: 13099 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2084.856635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2084.857856] Call Trace: [ 2084.858288] dump_stack+0x107/0x167 [ 2084.858803] should_fail.cold+0x5/0xa [ 2084.859474] ? create_object.isra.0+0x3a/0xa20 [ 2084.860243] should_failslab+0x5/0x20 [ 2084.860768] kmem_cache_alloc+0x5b/0x360 [ 2084.861454] create_object.isra.0+0x3a/0xa20 [ 2084.862120] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2084.862830] kmem_cache_alloc+0x159/0x360 [ 2084.863487] alloc_buffer_head+0x20/0x110 [ 2084.864148] alloc_page_buffers+0x14d/0x6d0 [ 2084.864743] create_empty_buffers+0x2c/0x640 [ 2084.865414] create_page_buffers+0x1bb/0x230 [ 2084.866018] __block_write_begin_int+0x1d1/0x19c0 [ 2084.866714] ? fat_add_cluster+0x100/0x100 [ 2084.867398] ? add_to_page_cache_locked+0x40/0x40 [ 2084.868179] ? __page_cache_alloc+0x10d/0x360 [ 2084.868801] ? remove_inode_buffers+0x300/0x300 [ 2084.869504] ? pagecache_get_page+0x243/0xc80 [ 2084.870177] ? perf_trace_lock+0xac/0x490 [ 2084.870733] ? wait_for_stable_page+0x92/0xe0 [ 2084.871400] cont_write_begin+0x466/0x970 [ 2084.871960] ? fat_add_cluster+0x100/0x100 [ 2084.872625] ? nobh_write_begin+0xed0/0xed0 [ 2084.873403] ? __mark_inode_dirty+0x9dc/0xf10 [ 2084.874006] ? lock_downgrade+0x6d0/0x6d0 [ 2084.874627] ? do_raw_spin_lock+0x121/0x260 [ 2084.875262] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2084.875963] fat_write_begin+0x89/0x180 [ 2084.876627] ? fat_add_cluster+0x100/0x100 [ 2084.877257] generic_perform_write+0x1fe/0x4e0 [ 2084.877874] ? fat_direct_IO+0x1ef/0x380 [ 2084.879827] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2084.880911] ? generic_file_direct_write+0x368/0x560 [ 2084.881733] __generic_file_write_iter+0x2cd/0x5d0 [ 2084.882503] generic_file_write_iter+0xdb/0x230 [ 2084.883296] do_iter_readv_writev+0x476/0x750 [ 2084.883903] ? new_sync_write+0x660/0x660 [ 2084.884499] ? selinux_file_permission+0x36/0x510 [ 2084.885208] do_iter_write+0x191/0x670 [ 2084.885724] ? quarantine_reduce+0x1ad/0x210 [ 2084.886386] vfs_iter_write+0x70/0xa0 [ 2084.886888] iter_file_splice_write+0x721/0xbe0 [ 2084.887593] ? generic_splice_sendpage+0x140/0x140 [ 2084.888294] ? avc_policy_seqno+0x9/0x70 [ 2084.888825] ? selinux_file_permission+0x36/0x510 [ 2084.889665] ? lockdep_init_map_type+0x2c7/0x780 [ 2084.890467] ? generic_splice_sendpage+0x140/0x140 [ 2084.891261] direct_splice_actor+0x10f/0x170 [ 2084.891930] splice_direct_to_actor+0x387/0x980 [ 2084.892679] ? pipe_to_sendpage+0x380/0x380 [ 2084.893382] ? do_splice_to+0x160/0x160 [ 2084.893972] ? security_file_permission+0x24e/0x570 [ 2084.894828] do_splice_direct+0x1c4/0x290 [ 2084.895531] ? splice_direct_to_actor+0x980/0x980 [ 2084.896207] ? selinux_file_permission+0x36/0x510 [ 2084.896822] ? security_file_permission+0x24e/0x570 [ 2084.897539] vfs_copy_file_range+0x57b/0x10f0 [ 2084.898204] ? generic_file_rw_checks+0x240/0x240 [ 2084.898821] ? __fget_files+0x296/0x480 [ 2084.899486] __do_sys_copy_file_range+0x176/0x420 [ 2084.900180] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2084.900782] ? ksys_write+0x1a9/0x260 [ 2084.901409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2084.902176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2084.902841] do_syscall_64+0x33/0x40 [ 2084.903388] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2084.904043] RIP: 0033:0x7f9dba2a1b19 [ 2084.904595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2084.907161] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2084.909404] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2084.910385] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2084.911370] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2084.912782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2084.915023] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:02:53 executing program 3: clock_gettime(0x6, &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f00000015c0)=[{{&(0x7f0000000040)=@hci, 0x80, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/149, 0x95}, {&(0x7f0000001180)=""/249, 0xf9}, {&(0x7f0000001280)=""/97, 0x61}, {&(0x7f0000001600)=""/65, 0x41}, {&(0x7f0000001340)=""/237, 0xed}], 0x6, &(0x7f00000014c0)=""/248, 0xf8}, 0x2}], 0x1, 0x2000, 0x0) 08:02:53 executing program 6: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) sendmsg$IEEE802154_ADD_IFACE(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001980)={0x0, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x80188, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x4}, 0x41880, 0x5, 0x5d4, 0x5, 0xee45, 0x10000, 0x9, 0x0, 0xff, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x0) 08:02:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xfe) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:02:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x79) r1 = socket$netlink(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x4000007ffffffc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d667266426e6f3900003341ca77717b7e8f0e5d0609e0a3fab1796aa834ddba41c66074db", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',cache=none,\x00']) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000180)) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) r5 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_procfs(r5, &(0x7f0000000040)='net/packet\x00') r6 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_procfs(r6, &(0x7f0000000040)='net/packet\x00') kcmp(r5, r6, 0x0, r4, r1) ftruncate(r4, 0x5) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x9, 0x6, 0x5}) connect$netlink(r1, &(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) 08:02:54 executing program 6: r0 = inotify_init1(0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000300000018000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) r4 = inotify_init1(0x0) r5 = inotify_add_watch(r4, &(0x7f0000000040)='.\x00', 0x2000003) r6 = inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r8 = inotify_add_watch(r7, &(0x7f0000000100)='./file0\x00', 0xa4000004) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x1) r9 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x103082, 0x0) r10 = dup2(r9, r6) inotify_rm_watch(r10, r5) inotify_rm_watch(r3, r8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc118, 0x80, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000140)={r1, 0x4, 0x5, 0x1}) fallocate(r11, 0x1, 0x3f, 0x6) creat(&(0x7f00000000c0)='./file0\x00', 0x50) [ 2085.255317] audit: type=1400 audit(1666771374.254:15): avc: denied { watch_reads } for pid=13135 comm="syz-executor.6" path="/syzkaller-testdir438248416/syzkaller.fwkQAz/315/file0" dev="sda" ino=16033 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 08:02:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000005c0), 0x6, 0x14282) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000001780)={{r1}, 0x2e, 0x2, 0x5}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) ftruncate(r4, 0x100) sendmmsg$inet6(r4, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x80000001, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000100)="5ddc83586dc2f5a6d2c73ab2c3563ccc0b81c8359943ed3360a48dad824f075340d0c16983433d898d4aaffe7ce00d418275322d5ff702583cf90fbcd5f092a5ee134a19661d8b652a3c52677db177c57b4919e8f29e0356a120c0d8e52e2bb896a4fb21f9f48ee3a06d2b7dd4cbfe72caa4df43525e7aeb1ad296cecdbe380884", 0x81}], 0x1, &(0x7f0000000200)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x9e, 0x4, 0x0, 0x8, 0x0, [@remote, @ipv4={'\x00', '\xff\xff', @loopback}]}}}, @hopopts_2292={{0x138, 0x29, 0x36, {0x73, 0x23, '\x00', [@enc_lim, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @enc_lim={0x4, 0x1, 0x4}, @generic={0x20, 0xe8, "77bd5b53561594563c9aa11563f3e79b69df1874708c4f6ccabebd00e21dabcdf4d5879959615602dc0e932b01caa550eadc21cc18125b88e5a1b7b82e01e56d2c56212e6953c958f08d623a994579a11c3555af868b32c523eec292dd8e29cb3c78429554af7ed23948f3c8b0d5a3e8eaf004a8685e34511658d04f23ac77df804e3ea6344ee7bae10be45f990857bd31bf566060ded935ca1d543a7c51d947e127678f76bff8d188708ac3c200a7cc9d9937323dcc022eaf59fc7f663640717e17deaebb01600145fb6a65e2679cf5c151029e7138ead68df4ff5571e600100e892f21e7a30a12"}, @calipso={0x7, 0x18, {0x2, 0x4, 0x9, 0xffff, [0x6, 0x57f]}}]}}}], 0x170}}, {{&(0x7f0000000380)={0xa, 0x4e22, 0xfe, @mcast2, 0x7}, 0x1c, &(0x7f0000000440)=[{&(0x7f00000003c0)="5657e0d5a6d87456b3700a79e144cb3cbed4d467da4ff7246859a8536ed2019ed57ce8ccdc7c56479bcce4d5dbbdcc3985e6c8c497912df7a0", 0x39}, {&(0x7f0000000640)="87fe3e7fbc693324663203bdb3f39be96e69ad576f3e0963f5f0c7864a68be2832a738f759f3b689e9102ac53ab8aa831bc5f6f574b19244a57a7340cfb0ef7b4fd292faade46bb30f5eb3a1af9b9e4e6091c4099c89465d0875d0f8352bffe8688d1bfefab688728ac9d72ce04c47167788e4907393d8fbc85574374a79e9389a6dbb83875dcea67f2d5707dde6f886e98e3811532b8de3542e93b148e955489f4d8ef40772774f5ccfce2a3367f37453ffff7451d7b4b4ea8b97422c092f542dab191554c23741c0ea4bcb73a04aab02ad1a6328dd3ecfefd3a5a96554e10325b1755e1162cb533b9f88659bb3cc353d74acf04edb4c2fa144766f181935e1a645fda021fda32418eda6c14ddc0059a5ebf2261b26494c99d6bf522a7db158e950865825641491fc4f511e88277751543471de4744cfd7550122854e1f59613b49c6db62a007b3720ecd3c98c03e52b6e8170b9bca1ac06296eae667d28961e03e20eed4d80188f35c244fcb6f73f2b11862bfe7e5a78d1bf2270c7df6a517659a345b6ff3e216a2fda45cf12c85ce9734761341b81d2407e00c313da8034cc165df11583553f572cbee8c83d05adf0b624e36c0a40cae81999cd159e2c1eff4b93640e5cfee9263a68cf74471059aba0f12b60b161439e0312336a100954a0074931a7437666ef1d676afbb5b96b3a6ffe551079300621ae17517a940c86bf6fdb52219fb56c2621b3e786037543fe8721c17c5f59f42798b14307ca063336da924487dfcfcf0240d2d72c234f7939cb58d452df9cbeee0f373b977317ae52356d2465a2f11ac54ab49bd5232f5341e08834cc22b659f459f056da25050c551f468d475cfef80f365539dd902bbf8ca8e96902dde3cf778bae26eb88998a69ae90fbcb29d6e909d45b862c5277ac0dd5b8fa90d02378791163d740ce1a7d4a02a2f24f8ac6c2c83bb81bbccdcf664dd866f7b9b9e925b6a43c423b783b9c26c276048ed4917967759c57c1da0f83878d849a9d3bdcbb7e8d8ddd7712da9a00876939a13d9bd94663738001c99867ed83986e646021abb9c8588be9911a4360135f3edc47ee25c32e90ca87f9cb51b6bf57107facdaf414df95e6a82908c82ea028771dafc365f2cc55787d1c64c65e0880d4c26bccbebc3c9b692c7a4371c4412139ea8f84c068d68590e6c4466b85ad0462122a65fb2f0cb1b61d688149b7a1ca8a44a65507e8cec61534aa3a9f6b0431b84fabf1b8857b2b77d1b8a5aa54851e6bbf4416f3846cad86b952fdbedda0cc756008275c392c0cb06821e89b60aa437f24914b6a9965f53d5344a335dbdb835caee126dcec26da1e88e563dd7a2fe7444549c2786b78e928f932b766adacfe6482d94d732899f664373c2b85dd3ad34b99cb5d46eb48c34cf03f7fc41d47e89d55330fec474736876a81fe647e3b84ade1c99f78c868a110c8ff3f0af984f6bb491d12d64f6ceba658b408ca9d5a13556d7e85f13e7daf1a2db882a4792fdb99387ee3516914ffbf88766104dda74a282838d2abdc23a7972ee5d57de1c2a641a32a95b67e80380024f35af5db60ff35f1c7869c2cd2e447b992bc7fd0d96336e99e9a7c909a01cddf4add7169fd48c9880f7af409684257ab1131df75bd69713b4bf30502cba84509c1015ff43ad532286112eca6fdb7d1e397753a7bf8df1f91dafb4fb499ccdf52684108552268cab9ade936033160b7beb494e0865398ea1239094a0409afd4a192bd11054ea8c99e69b24747841022b6bed8396b9635641bbd43d6584f10040b0abcb9d6b03a28281bf5d8180f52e35529e84c4cd5334e57daef462cf4aaec88f49b55dd7f89758fda867a5bdbc4bd806847904821e4b0914a2a047ebc5b163d0852832bd2597cd6c44829c4eca5018920ee4e986605be8849d48c7424bf91283929359130f17299914058e50f4abff9f04511b532716ed2cccb9b6bb2c98c60c26adb20095080e6ad049d48f6128eda34113b89fad21b3554ce372094d17ec1ee930620a6e753f0c01c5beb885c9f19403c96fd08ace75c9e6c41e958a3d54a64d12cdc468313c5e6e2d40e7aaf01799cf7bc0c96daa876ab666ea13eb93270545ef975a4bf482e393c9da6a1906927af519ac1c1c418c1b5c5fb63443488449f4a48e3bf055a056717ed3c5d7c7358be3098855a1ce9195ef8d20ef22debc8b8f7526c242978982a535acf062da41f305b3902dbe41c5ecd4dbf14424ffbe9bbfe24cb1b7d8e7bee81154d42094b55accc7fdb147faeafd6a09f710b740f8387855c8a1d13f77827c2acf515457880674422ca87ec3a8fac778fc5d0a59373f2bad26bd887eedd68cdfa191adce744f376d3fafb9288ffca0e7da248b59af54b48eed2c412fa4407f09a6ac83bf054a76c74c8c6f89a7e86868adc13888182644617f7ec3e9ebee32a8924cd906d67f6e4a1f64f8d6cb25063837e10488e4c471e61a9555062b7e19f6fc6f3866453b233d4a6df15fa94213e3f594ee69a3a38ff55c596f3ec89e4a26cf92b26281fb9d9c631b2de9734f0a6cc77092cdeeba9b695cafe14d696f284fc136fb9dc906da98db5f51e3bb1916457547edacf46dc516087ab957276111495333464f6aac1e559bb007f894bbfc4e9646d4604461266a320154c97ca95bec89ed3eec9297bc3c231cd6b7bd2677defa1a001ce7d1bcd219253fd7c151626c36b8a8e260bbb92f30450892939076d3cb6742109ffa786a2a65478694d47f3d35a475a3ecbd389e154e872ab34289464cf1a5964398decfdb5ba39823bbeef6b8a26d38271c7760b4a795b116b7a7e964bee5a013fd2c204ab56c06419b6fdbc79809f22c26d82985c7b7085c77628c004a8625842f6b8547b9e2316caa07d19c7b5edffea66cfec6e628e507ae6268bb5acf0608cf0e6a60cb4d6948e17d4b547260a967bd355c32ca5969b71fd61363acca23a20ff671f22754d3c64ee3f1af8f4e8026ea86723324bb467383c0c87e977bcb995e50ac918b05a74f053acf136e0e09eb286aafbfd4d0e65e6b377bdbabcbfb78220de2ff65b35f39625b24cf5cf54110ed854cffd86605c3962c53b15bb7677d1f9d06e1e71df0507ca1cba8ebfcf86b6cc1751b715f3284fedd764dece56ddb64130140e68efead2f6d5898a0492e9cb7da0a775a1f4c93ea34eb54c2fba47753ca9d1d3d258287a297497a118d59f04a6b6bd004ddfc02e2824a0052f2b946e0b4c655c7f75c49db81083983098b6ffaf7b812b7438a1ad513b593d50476064207ec7c8ad014d33a57f4b59561a68676192ecf58a2188f4e1ab52c58fa456ed8a44ff188d084e8d115d3829b120f5ec64d40dfe486fd15da31d9869ef9f124b6dfe3cca36383e4bda9905a31f9fdc736fab4c8be7579f75a720140a63bfcc38791c75ea121395587bbf8b1d749950253bbe84250496e7950a8d06bbc08e9afd6038ec6b9308d66d5df7f87f7aa22139c7538b6e8e0b1ac4ccb38117c4c415a91d6f477703bdcdbdfea67638cd9770497a1361d169d4b24240e677398bd31005889f42fb731e19df5576ba3fca55b5f3183fbe226cfb913fd7663b0bd222c5468b495d0178a72d18220b8ef75f6df767f7fc914ddf2aa9ed222cefadf194c234ecad214b54f664509cccb58000d2c937ea3bc93123be6cb7a23bbb29a3674a3b39664e33c5fe3b4fe2ae14e364a276b46012917a9902cfc4a5d151d08c1973fca4c95fac216f3a81daccd54e47ef79891b4a6caf4886b32472665ea2a3801ccd5a15b801527bd5b75a6c674a04fa3baf9e3c491b70ad9582c9a1ea57bfaeba4f8c5ad0f972410bd5c415760b93d2fd3364837b28200a310279d5e1702c34481644806c4bc9030b7e61cdfa620863869c54095c947569948135ac6132f88529a117aa09cd175d7ae8048ddc368dace1e86a489cc95bcf577ca4908c65b63227bfd3764e200162035b5c81e4eacb58d9816ded00730490e70aff86ea5d4e2d1438a80bfafa2dc9fda0b2bbb6e430db604fe58412d3302e2517af4208e53a5857f5e1cc1f9b995c28963c49dcd3ff426be0e1f6768c13961c636492a3441ef90071f0d57f10f05da087e5296982794309236825e4c3d4c30c8bbd33fa3585b853aa07d31309a095ba5893bdbfb4cd0be78e60370b4222eb60b752bd21e6fe5be7b5e49d54c623cf3ab6e001dbab88b59b2f239a49296943aeaee35c8f659ab61e6b31a14da1605e461bab7f88f10008a7a7c1910c53935888a29e85c85e21d4abffb8c9e37eb81ac20030b0c9e5cc48aa555fabdf0e540ee275650b49acc518aa522146b43fc2322cb574ad000717d77bef036ed4dc3b1c36c00edda9b9bed101f6e0a5541420d25ee5b175bfa7e4ce769e5c19dd54dee01c4e9739f542c750e0e8ef288f95e15a0d7a8e6971c33af05b60259ffe7c872a8c000c6745aef6c498e73a4f07ef3330ae4e6ef389f2a20661087e92234e4b9a3ad2b4c4c75b274b87f5c0896149ba4923a94872b3fb084ee03dd5c10436c81d5d6c844ee7631c074710f4be7ad1306e2b536577a09699650057d88617edd8f383d09831d267b50ca23fe873467a8893d5796bc8aac755143f39a59e4096281382c8820a223c711cd5f1bd79926ecf691fd30f05dfdd485d743a2bf1d5642c4dad8bb22b187984869836a03095514f6fd4b69aeb16ed7fc25c1ed59c7ee43a0344a69b661d3c3b5fedb07f7faa9ddf369a989df93fa21d357d55f04d49d97dc553848222a8a83d1e6f9e4865d6f4a249c810dc636072ffa9494b318be1eb6548c6a21b1adf280562b02ed663cfffee8a85d891f1521107d045f6d44ac21c702a3b9dc54940d82fc64f0904699c5118494afd8e7ba90836878b7d89e36ca177ef60d2eb5157fe435044d1f9e55cad82e0b389a66112e6b577f839176b4a8e675cc19fe608bbbf8f99e7012d4797083b797b6909f1c45baace200a65dd372b4d952f82bd55fe307fa8be370cc8a7f12bd27c167641beef38689b4638c8bbc54a3020729030fcde29301358c770b8092357048d9d8dd6913f2fb5bbd0f959fea4ee0ec8031a40a1939e2d9db0233ddf32802ef01624571d34d307af518bc33df657d9392e66475176c925262fe3bbf1f43fd594454c0874f0e763bf3a27643af394cf2d2c1600259b99fb6a91f5bba41d91fe4b5f1b11e70f7151b38dbb3ffb1c155a94b63bbb00e209c736ac385ef2eedf0ffd1384f13596a6549b22e1be6b312487d22773be706927707a9609795dfb7569ff3c6d1492fe9ec07a71e861e3d81ef0cff0fc0019ab4e6f22881f4a7dbf159b3083700b5db5f0a255934095d292764c302dc15cfb9732b3e093d726e164613e77f57151068f6fe6940810ff600e794f00555db4daf68f899ff4a3a9fc33759385ea30c786332987ebdedf6e80fcb7279ccf7fe58b9dd16fae2f1763e2927a677a80bde1a5b5d2c7c32bf0c965f2b548a0fa4850d83a1ac4c528e3fa92a7063ae83efe339fbefaf35127f547d84f91cb87cf5dc59d0b891e13efcf78b39ac85b5a0833038fe7f7a8d10700d9f5b7623889a17c474d46ed31c13328491f21a6bdf88de5edd8366f6fc773e601dcb83253921fbc2d2e43f634ad00f9d660a50935544597f6ae29a272a1f687f4de96c227750a0b952a05becd96de31e8407e5df782b1430d17e9e145337d4a2bca97fab35079d4483b1404f9a6cf2f91ae1bed73daabd6d9937322a03dc3f0889ec0d54429c95d7f9466c431e08954be8", 0x1000}, {&(0x7f0000000400)="2f56168346a52eec890fb3f3201490515899e95e057202a2aa52375d79a0a681", 0x20}], 0x3}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000500)="debc57b6632a177c20d24d08eee614e7409c49bd3f1f5487edbcee2b9279940d5510d8de4b944d2d778cb292bcc5ccfc253cad1effe6b2f442f591595fef4bcb144ef0d39ce1da1a9805e7458d4971e1585690444e01c85d6524ebe08898c104e9c835d06664f770adfec5ed54764916b958fab3fd8060c9dd698ee28311e05b7a57ec47534da057426617a55cd9248151d04a7b23c1260950d76801", 0x9c}, {&(0x7f0000001640)="b57624b521e2cf465c8e2adce7c53ef11b117e17bdc4d0a99a7e7c6d56b09ded178a02c987d9ad2d2a3cfab5e6a5732caf39d46474d4e74043ad47096edf07e33273ea3c8eb4886a14", 0x49}], 0x2}}], 0x3, 0x240008c1) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0xe803, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) [ 2085.381077] device lo entered promiscuous mode 08:03:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 6: r0 = inotify_init1(0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000300000018000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) r4 = inotify_init1(0x0) r5 = inotify_add_watch(r4, &(0x7f0000000040)='.\x00', 0x2000003) r6 = inotify_init1(0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r8 = inotify_add_watch(r7, &(0x7f0000000100)='./file0\x00', 0xa4000004) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x1) r9 = openat$hpet(0xffffffffffffff9c, &(0x7f00000001c0), 0x103082, 0x0) r10 = dup2(r9, r6) inotify_rm_watch(r10, r5) inotify_rm_watch(r3, r8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc118, 0x80, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000140)={r1, 0x4, 0x5, 0x1}) fallocate(r11, 0x1, 0x3f, 0x6) creat(&(0x7f00000000c0)='./file0\x00', 0x50) 08:03:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x3) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f00000012c0)=ANY=[@ANYBLOB="2f0a02590000000000000000000000000000000000000000fc0200000000000000000000000000000000000000000000000000000000000100000000000000000000ffffac141426fe880000000000000000000000000001f7485832dd2c99ced09eddffc487d4d97f80dc2d609894d0414f2c"], 0x58) listen(r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}]}}) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000011c0)=@dstopts={0x2c, 0x1d, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x80}, @ra, @calipso={0x7, 0x20, {0x1, 0x6, 0x5c, 0x2, [0x2, 0xfffffffffffffa57, 0x0]}}, @generic={0x6, 0x6e, "fd24a6848223d1ca824b791fe884b230ee1d16e18949e2918f72254ae998dba10964036bb2cc33eb38a70fc4a4194b2d182a500a2181bc26b2a67651268cc25887039c5b5b53d0a84cee0c226cd49447976dc790ac453bae992ec3097cfac5105263cbb0c2c03e4ec834093fe5fa"}, @calipso={0x7, 0x50, {0x3, 0x12, 0xc0, 0x1, [0x1, 0x2, 0x0, 0x5, 0x2, 0xb3, 0x1, 0x3ed, 0x7]}}]}, 0xf8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = dup2(r0, r4) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) bind$inet6(r5, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev, 0x6}, 0x1c) pread64(r6, &(0x7f0000000040)=""/4117, 0x1015, 0x120000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@access_any}]}}) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r0, &(0x7f0000001100)={0x40000010}) accept$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x0) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) 08:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 11) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1da) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2101.417961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2101.503753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 2101.538868] FAULT_INJECTION: forcing a failure. [ 2101.538868] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.540565] CPU: 0 PID: 13169 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2101.541442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.542491] Call Trace: [ 2101.542835] dump_stack+0x107/0x167 [ 2101.543307] should_fail.cold+0x5/0xa [ 2101.543861] ? create_object.isra.0+0x3a/0xa20 [ 2101.544455] should_failslab+0x5/0x20 [ 2101.544948] kmem_cache_alloc+0x5b/0x360 [ 2101.545480] create_object.isra.0+0x3a/0xa20 [ 2101.546054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2101.546702] kmem_cache_alloc+0x159/0x360 [ 2101.547241] alloc_buffer_head+0x20/0x110 [ 2101.547801] alloc_page_buffers+0x14d/0x6d0 [ 2101.548359] create_empty_buffers+0x2c/0x640 [ 2101.548932] create_page_buffers+0x1bb/0x230 [ 2101.549504] __block_write_begin_int+0x1d1/0x19c0 [ 2101.550131] ? fat_add_cluster+0x100/0x100 [ 2101.550710] ? add_to_page_cache_locked+0x40/0x40 [ 2101.551312] ? __page_cache_alloc+0x10d/0x360 [ 2101.551955] ? remove_inode_buffers+0x300/0x300 [ 2101.552549] ? pagecache_get_page+0x243/0xc80 [ 2101.553113] ? perf_trace_lock+0xac/0x490 [ 2101.553641] ? wait_for_stable_page+0x92/0xe0 [ 2101.554222] cont_write_begin+0x466/0x970 [ 2101.554764] ? fat_add_cluster+0x100/0x100 [ 2101.555310] ? nobh_write_begin+0xed0/0xed0 [ 2101.555918] ? __mark_inode_dirty+0x9dc/0xf10 [ 2101.556490] ? lock_downgrade+0x6d0/0x6d0 [ 2101.557061] ? do_raw_spin_lock+0x121/0x260 [ 2101.557621] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2101.558281] fat_write_begin+0x89/0x180 [ 2101.558794] ? fat_add_cluster+0x100/0x100 [ 2101.559351] generic_perform_write+0x1fe/0x4e0 [ 2101.559976] ? fat_direct_IO+0x1ef/0x380 [ 2101.560503] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2101.561426] ? generic_file_direct_write+0x368/0x560 [ 2101.562097] __generic_file_write_iter+0x2cd/0x5d0 [ 2101.562731] generic_file_write_iter+0xdb/0x230 [ 2101.563337] do_iter_readv_writev+0x476/0x750 [ 2101.563950] ? new_sync_write+0x660/0x660 [ 2101.564498] ? selinux_file_permission+0x36/0x510 [ 2101.565147] do_iter_write+0x191/0x670 [ 2101.565706] vfs_iter_write+0x70/0xa0 [ 2101.566200] iter_file_splice_write+0x721/0xbe0 [ 2101.566814] ? generic_splice_sendpage+0x140/0x140 [ 2101.567446] ? avc_policy_seqno+0x9/0x70 [ 2101.567983] ? selinux_file_permission+0x36/0x510 [ 2101.568597] ? lockdep_init_map_type+0x2c7/0x780 [ 2101.569209] ? generic_splice_sendpage+0x140/0x140 [ 2101.569836] direct_splice_actor+0x10f/0x170 [ 2101.570401] splice_direct_to_actor+0x387/0x980 [ 2101.571020] ? pipe_to_sendpage+0x380/0x380 [ 2101.571587] ? do_splice_to+0x160/0x160 [ 2101.572125] ? security_file_permission+0x24e/0x570 [ 2101.572772] do_splice_direct+0x1c4/0x290 [ 2101.573303] ? splice_direct_to_actor+0x980/0x980 [ 2101.573945] ? selinux_file_permission+0x36/0x510 [ 2101.574580] ? security_file_permission+0x24e/0x570 [ 2101.575318] vfs_copy_file_range+0x57b/0x10f0 [ 2101.575930] ? generic_file_rw_checks+0x240/0x240 [ 2101.576560] ? __fget_files+0x296/0x480 [ 2101.577099] __do_sys_copy_file_range+0x176/0x420 [ 2101.577730] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2101.578342] ? ksys_write+0x1a9/0x260 [ 2101.578846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2101.579500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2101.580211] do_syscall_64+0x33/0x40 [ 2101.580691] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2101.581346] RIP: 0033:0x7f9dba2a1b19 [ 2101.581834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2101.584216] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2101.585189] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2101.586090] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2101.587012] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2101.587984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2101.588936] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:03:10 executing program 6: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat(0xffffffffffffff9c, 0x0, 0x19bf03, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x15}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x80002) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x5, 0x80, 0x8}) r3 = socket$inet(0x2, 0xa, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@access_any}]}}) dup3(r4, r5, 0x80000) dup3(r3, r0, 0x0) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000002c0)={0x0, 0x0, "43c073", 0x0, 0xa4}) 08:03:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x4) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x500) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:10 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 12) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2101.953633] FAULT_INJECTION: forcing a failure. [ 2101.953633] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.955347] CPU: 0 PID: 13210 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2101.956342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2101.957430] Call Trace: [ 2101.957789] dump_stack+0x107/0x167 [ 2101.958296] should_fail.cold+0x5/0xa [ 2101.958799] ? create_object.isra.0+0x3a/0xa20 [ 2101.959429] should_failslab+0x5/0x20 [ 2101.964047] kmem_cache_alloc+0x5b/0x360 [ 2101.964597] create_object.isra.0+0x3a/0xa20 [ 2101.965197] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2101.965889] kmem_cache_alloc+0x159/0x360 [ 2101.966459] alloc_buffer_head+0x20/0x110 [ 2101.967009] alloc_page_buffers+0x14d/0x6d0 [ 2101.967674] create_empty_buffers+0x2c/0x640 [ 2101.968289] create_page_buffers+0x1bb/0x230 [ 2101.968870] __block_write_begin_int+0x1d1/0x19c0 [ 2101.969535] ? fat_add_cluster+0x100/0x100 [ 2101.970105] ? add_to_page_cache_locked+0x40/0x40 [ 2101.970771] ? __page_cache_alloc+0x10d/0x360 [ 2101.971388] ? remove_inode_buffers+0x300/0x300 [ 2101.972670] ? pagecache_get_page+0x243/0xc80 [ 2101.973787] ? perf_trace_lock+0xac/0x490 [ 2101.974789] ? wait_for_stable_page+0x92/0xe0 [ 2101.975935] cont_write_begin+0x466/0x970 [ 2101.976824] ? fat_add_cluster+0x100/0x100 [ 2101.977854] ? nobh_write_begin+0xed0/0xed0 [ 2101.978923] ? __mark_inode_dirty+0x9dc/0xf10 [ 2101.981871] ? lock_downgrade+0x6d0/0x6d0 [ 2101.982916] ? do_raw_spin_lock+0x121/0x260 [ 2101.984265] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2101.985635] fat_write_begin+0x89/0x180 [ 2101.986699] ? fat_add_cluster+0x100/0x100 [ 2101.987747] generic_perform_write+0x1fe/0x4e0 [ 2101.988458] ? fat_direct_IO+0x1ef/0x380 [ 2101.989024] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2101.990116] ? generic_file_direct_write+0x368/0x560 [ 2101.990818] __generic_file_write_iter+0x2cd/0x5d0 [ 2101.991541] generic_file_write_iter+0xdb/0x230 [ 2101.992341] do_iter_readv_writev+0x476/0x750 [ 2101.992943] ? new_sync_write+0x660/0x660 [ 2101.993581] ? selinux_file_permission+0x36/0x510 [ 2101.994320] do_iter_write+0x191/0x670 [ 2101.994859] vfs_iter_write+0x70/0xa0 [ 2101.995449] iter_file_splice_write+0x721/0xbe0 [ 2101.996197] ? generic_splice_sendpage+0x140/0x140 [ 2101.996871] ? avc_policy_seqno+0x9/0x70 [ 2101.997511] ? selinux_file_permission+0x36/0x510 [ 2101.998210] ? lockdep_init_map_type+0x2c7/0x780 [ 2101.998863] ? generic_splice_sendpage+0x140/0x140 [ 2101.999586] direct_splice_actor+0x10f/0x170 [ 2102.000330] splice_direct_to_actor+0x387/0x980 [ 2102.000954] ? pipe_to_sendpage+0x380/0x380 [ 2102.001608] ? do_splice_to+0x160/0x160 [ 2102.002213] ? security_file_permission+0x24e/0x570 [ 2102.002889] do_splice_direct+0x1c4/0x290 [ 2102.003514] ? splice_direct_to_actor+0x980/0x980 [ 2102.004275] ? selinux_file_permission+0x36/0x510 [ 2102.004929] ? security_file_permission+0x24e/0x570 [ 2102.005668] vfs_copy_file_range+0x57b/0x10f0 [ 2102.006344] ? generic_file_rw_checks+0x240/0x240 [ 2102.006983] ? __fget_files+0x296/0x480 [ 2102.007601] __do_sys_copy_file_range+0x176/0x420 [ 2102.008346] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2102.008959] ? ksys_write+0x1a9/0x260 [ 2102.009554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2102.010301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2102.010995] do_syscall_64+0x33/0x40 [ 2102.011724] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2102.012527] RIP: 0033:0x7f9dba2a1b19 [ 2102.013019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2102.015501] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2102.016582] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2102.017553] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2102.018520] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2102.019488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2102.020510] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:03:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x600) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x5) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r1, &(0x7f0000000140)="ee", 0x1, 0x800000}]) fstatfs(r0, &(0x7f0000001f80)=""/4096) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r3 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/packet\x00') clone3(&(0x7f0000001e00)={0x0, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180), {0xa}, &(0x7f0000000240)=""/91, 0x5b, &(0x7f00000002c0)=""/69, &(0x7f00000001c0)=[r3, 0x0], 0x2, {r1}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="291953b51341a4f1157c1beff7d7c794deb72688c618258a62082ac4dc4ec4fe471b1fc362034a9306c69e99b63e9837e2320e4a5e3ab1063b82e81431d6ae8e2259b7a5fa920a7bad1952c5723fe84f0b46d3001cc61558be9c0a3f6169f3373abb77dafe10812adee9704e5f62b1d8ac3e31abef26645dbcc26707c9f97fa917cbaa7331e96840dec921a16901e36e06628facf753f2cbbaa1bddb4bd9c696a4", @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',access=any,\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@access_any}]}}) r10 = eventfd2(0xa0df, 0x80001) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000002f80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r11, @ANYBLOB="2c7766646e6f3d377cf8c8faa66558720d288350d2bd77e724f9f5f4c6ed54f897f241df55f327ada908bdae76a00246f97a4eae2fd26510373c9bffbe3ad0aa05f93ed7d629f43cd3edd417f6561c3042f7f6e7c982b54803ff6261228f58991c11b5b38581c86272ffc8bd9046c693ca64e6c0ed9b1f392f3aab045d3206fc9248051e390a9ac3a88139722ae2ddf70004d2b31ccace79bdd24f293da870195acc0e2e056c5639115b5169c52913f55d86179265c050fa9b3c2cc612f64b5e75eb", @ANYRESHEX=r12, @ANYBLOB=',access=any,\x00']) r13 = memfd_create(&(0x7f0000001b40)='syz1\x00', 0x0) io_submit(0x0, 0x9, &(0x7f0000001cc0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x400, r4, &(0x7f0000000400)="f5779520caef65e0be63c7dc424d3bd7bafd61103f1ab96c5e7a240460a3e35cd4e205a07f7fdd204f93306defaf73d90802146dca3b28cbe2bbc6fe1d42bc4c5aebb502b5f6097fe9b780074a26ce0dd086d7f39309ff09f707ae4d26d20e72ba3f557f6781eb903f047d36d4ecbcbf4ac6106c967d8cec91dc92495d038b17dee5307f84", 0x85, 0x7fffffff}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x3, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="268732e35957c741a81a6d0d8e5818d7a22bec6b61ca4e98ebde83436973cb2f78351c7b500b4a7eea9303eb5dab3db82bc2a80bb17b85f50b05cde07f8dc8e348fb466618a64b3ced2c59bb59e09fe22250cce785f206c3eed0cc01c19bf7545b7f73993518604823d50da7705046e835d9fdf27392c3ba29ae11b06a1424e7ca4c21b0ad7f6184", 0x88, 0xfffffffffffffc00, 0x0, 0x5, r4}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x40, 0xffffffffffffffff, &(0x7f0000000940)="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", 0x1000, 0x10000, 0x0, 0x2}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000680)="08d8b323528cc2d148e3bb8b25bd57858428ef0de7df1a88a530c281da001df7081011000af7a6ba57d228a5383a5870418f6d49707962f1348e35f77c450d91fdf5f319f7939cd634bc1e813d3657431de291167e2e4021d5960318bf8240dee006c7b7d175de69a70d5541bf09d2f38304834aefefbb291e904d78bfae863dd3e4d96c172615b72110a8e7744147b36ef20fe8aa428860e48e64a7a1e7bf2fbba2a10dc2d2da86dcef63815f7a96f6ad1c49d64872fdc91d98b7abb5131abab63ab032", 0xc4, 0x1, 0x0, 0x2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x6, r6, &(0x7f00000007c0)="da99d6c580d9599a48b51148c00849c3d9fa0e4e", 0x14, 0xfffffffffffffeff, 0x0, 0x1, r8}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x1, 0x8, r0, &(0x7f0000000840)="ae73e30573e49af8f285c88562584422b8949c66b0829f711a4522e5745a8245502c6c9f081107f3d58a735a611ecfa7286808e3715e2cc82a28882b5b8b1b42ba862c96f777a1891b85ee2a60c20bb8390b667f704ef146af476ac70f215986443d0b102649fd4b4428", 0x6a, 0x8001, 0x0, 0x2}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x6, 0x0, r5, &(0x7f0000001980)="0ed4e7f146f1b594f16b16ac3091ba4b3880e0abd85abd2f992ed8450f8b94cbea38021438149d6dc04fe4369143da39172892d091ecd689ad1215445802f02411e5", 0x42, 0x1, 0x0, 0x2, r10}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000001a40)="32e7cd20069b0475e8ae30ca057ce7690ee296569559716ed10e23dcdc4352bcd4759659a49cb129134392f9ebe374ddd5725ffea05cf8345db54a027ccfa595f1857ffbcda7f48e623e73325b3bedf346064d0d4abb5d1a5fa16dc93ed18e54f855b1f9f87b18734af1b20f6abc29c1c05dbc5496be0a6f4cc34ba410069f525572a2098888", 0x86, 0x9, 0x0, 0x2, r12}, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0xff, r13, &(0x7f0000001b80)="58fc075f4469ad193ec040bc9d23799d59375db20ad51dc99993c11fc518dff9011ef68f87fa9381b3b2e33de48728ff291c49012f4d0426318653b0e31eaeee2ef67cc88b32de74e9641183fa79a00c39d17e0c65daf9621af6cab0de5e134bd03ee73fa2a7fe2366b9b9821f4fab15c8685534e456acf18db2da9f5d0b270e490d3f225fc23cd81c84059f2ed955832025c845d7335fb78a703ab28a81a7c5c3b0f67e9934d216a16df059d674eaf7d7e8e155226404eca2d720640e93b28fd018ef7ada3cb1d41876d40b8b357b97edba66fb7d3557", 0xd7, 0xfff, 0x0, 0x1, r4}]) socket$nl_generic(0x10, 0x3, 0x10) 08:03:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:03:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x500) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:26 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 13) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2118.050763] FAULT_INJECTION: forcing a failure. [ 2118.050763] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.052654] CPU: 0 PID: 13237 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2118.053535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.054542] Call Trace: [ 2118.054896] dump_stack+0x107/0x167 [ 2118.055378] should_fail.cold+0x5/0xa [ 2118.055902] ? create_object.isra.0+0x3a/0xa20 [ 2118.056516] should_failslab+0x5/0x20 [ 2118.057017] kmem_cache_alloc+0x5b/0x360 [ 2118.057552] create_object.isra.0+0x3a/0xa20 [ 2118.058122] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2118.058783] kmem_cache_alloc+0x159/0x360 [ 2118.059327] alloc_buffer_head+0x20/0x110 [ 2118.059894] alloc_page_buffers+0x14d/0x6d0 [ 2118.060477] create_empty_buffers+0x2c/0x640 [ 2118.061069] create_page_buffers+0x1bb/0x230 [ 2118.061648] __block_write_begin_int+0x1d1/0x19c0 [ 2118.062283] ? fat_add_cluster+0x100/0x100 [ 2118.062829] ? add_to_page_cache_locked+0x40/0x40 [ 2118.063450] ? __page_cache_alloc+0x10d/0x360 [ 2118.064067] ? remove_inode_buffers+0x300/0x300 [ 2118.064674] ? pagecache_get_page+0x243/0xc80 [ 2118.065255] ? perf_trace_lock+0xac/0x490 [ 2118.065788] ? wait_for_stable_page+0x92/0xe0 [ 2118.066386] cont_write_begin+0x466/0x970 [ 2118.066932] ? fat_add_cluster+0x100/0x100 [ 2118.067484] ? nobh_write_begin+0xed0/0xed0 [ 2118.068057] ? __mark_inode_dirty+0x9dc/0xf10 [ 2118.068641] ? lock_downgrade+0x6d0/0x6d0 [ 2118.069180] ? do_raw_spin_lock+0x121/0x260 [ 2118.069739] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2118.070404] fat_write_begin+0x89/0x180 [ 2118.070922] ? fat_add_cluster+0x100/0x100 [ 2118.071486] generic_perform_write+0x1fe/0x4e0 [ 2118.072119] ? fat_direct_IO+0x1ef/0x380 [ 2118.072651] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2118.073582] ? generic_file_direct_write+0x368/0x560 [ 2118.074217] __generic_file_write_iter+0x2cd/0x5d0 [ 2118.074852] generic_file_write_iter+0xdb/0x230 [ 2118.075460] do_iter_readv_writev+0x476/0x750 [ 2118.076064] ? new_sync_write+0x660/0x660 [ 2118.076594] ? selinux_file_permission+0x36/0x510 [ 2118.077227] do_iter_write+0x191/0x670 [ 2118.077747] vfs_iter_write+0x70/0xa0 [ 2118.078244] iter_file_splice_write+0x721/0xbe0 [ 2118.078853] ? generic_splice_sendpage+0x140/0x140 [ 2118.079490] ? avc_policy_seqno+0x9/0x70 [ 2118.080042] ? selinux_file_permission+0x36/0x510 [ 2118.080668] ? lockdep_init_map_type+0x2c7/0x780 [ 2118.081275] ? generic_splice_sendpage+0x140/0x140 [ 2118.081900] direct_splice_actor+0x10f/0x170 [ 2118.082465] splice_direct_to_actor+0x387/0x980 [ 2118.083072] ? pipe_to_sendpage+0x380/0x380 [ 2118.083636] ? do_splice_to+0x160/0x160 [ 2118.084183] ? security_file_permission+0x24e/0x570 [ 2118.084832] do_splice_direct+0x1c4/0x290 [ 2118.085371] ? splice_direct_to_actor+0x980/0x980 [ 2118.085991] ? selinux_file_permission+0x36/0x510 [ 2118.086608] ? security_file_permission+0x24e/0x570 [ 2118.087255] vfs_copy_file_range+0x57b/0x10f0 [ 2118.087846] ? generic_file_rw_checks+0x240/0x240 [ 2118.088478] ? __fget_files+0x296/0x480 [ 2118.089011] __do_sys_copy_file_range+0x176/0x420 [ 2118.089636] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2118.090263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2118.090935] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2118.091597] do_syscall_64+0x33/0x40 [ 2118.092109] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2118.092763] RIP: 0033:0x7f9dba2a1b19 [ 2118.093244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.095528] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2118.096548] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2118.097457] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2118.098371] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2118.099275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2118.100197] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:03:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x6) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x600) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2118.220584] audit: type=1400 audit(1666771407.220:16): avc: denied { checkpoint_restore } for pid=13226 comm="syz-executor.3" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 2118.226935] 9pnet: Insufficient options for proto=fd [ 2118.233069] 9pnet: Insufficient options for proto=fd 08:03:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x700) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 14) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:03:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x700) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2118.419356] FAULT_INJECTION: forcing a failure. [ 2118.419356] name failslab, interval 1, probability 0, space 0, times 0 [ 2118.423314] CPU: 0 PID: 13263 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2118.425499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2118.428136] Call Trace: [ 2118.428968] dump_stack+0x107/0x167 [ 2118.432143] should_fail.cold+0x5/0xa [ 2118.432645] ? create_object.isra.0+0x3a/0xa20 [ 2118.433234] should_failslab+0x5/0x20 [ 2118.433729] kmem_cache_alloc+0x5b/0x360 [ 2118.434281] create_object.isra.0+0x3a/0xa20 [ 2118.434864] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2118.435530] kmem_cache_alloc+0x159/0x360 [ 2118.436146] alloc_buffer_head+0x20/0x110 [ 2118.436696] alloc_page_buffers+0x14d/0x6d0 [ 2118.437269] create_empty_buffers+0x2c/0x640 [ 2118.437858] create_page_buffers+0x1bb/0x230 [ 2118.438438] __block_write_begin_int+0x1d1/0x19c0 [ 2118.439069] ? fat_add_cluster+0x100/0x100 [ 2118.439623] ? add_to_page_cache_locked+0x40/0x40 [ 2118.440331] ? __page_cache_alloc+0x10d/0x360 [ 2118.440931] ? remove_inode_buffers+0x300/0x300 [ 2118.441550] ? pagecache_get_page+0x243/0xc80 [ 2118.442152] ? perf_trace_lock+0xac/0x490 [ 2118.442702] ? wait_for_stable_page+0x92/0xe0 [ 2118.443306] cont_write_begin+0x466/0x970 [ 2118.443899] ? fat_add_cluster+0x100/0x100 [ 2118.444550] ? nobh_write_begin+0xed0/0xed0 [ 2118.445212] ? __mark_inode_dirty+0x9dc/0xf10 [ 2118.446463] ? lock_downgrade+0x6d0/0x6d0 [ 2118.447014] ? do_raw_spin_lock+0x121/0x260 [ 2118.447596] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2118.448284] fat_write_begin+0x89/0x180 [ 2118.448793] ? fat_add_cluster+0x100/0x100 [ 2118.449364] generic_perform_write+0x1fe/0x4e0 [ 2118.449977] ? fat_direct_IO+0x1ef/0x380 [ 2118.450517] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2118.451463] ? generic_file_direct_write+0x368/0x560 [ 2118.452598] __generic_file_write_iter+0x2cd/0x5d0 [ 2118.453251] generic_file_write_iter+0xdb/0x230 [ 2118.454334] do_iter_readv_writev+0x476/0x750 [ 2118.454934] ? new_sync_write+0x660/0x660 [ 2118.455489] ? selinux_file_permission+0x36/0x510 [ 2118.456154] do_iter_write+0x191/0x670 [ 2118.456687] vfs_iter_write+0x70/0xa0 [ 2118.457192] iter_file_splice_write+0x721/0xbe0 [ 2118.457819] ? generic_splice_sendpage+0x140/0x140 [ 2118.458468] ? avc_policy_seqno+0x9/0x70 [ 2118.458996] ? selinux_file_permission+0x36/0x510 [ 2118.459635] ? lockdep_init_map_type+0x2c7/0x780 [ 2118.460865] ? generic_splice_sendpage+0x140/0x140 [ 2118.461972] direct_splice_actor+0x10f/0x170 [ 2118.462958] splice_direct_to_actor+0x387/0x980 [ 2118.464100] ? pipe_to_sendpage+0x380/0x380 [ 2118.465063] ? do_splice_to+0x160/0x160 [ 2118.465940] ? security_file_permission+0x24e/0x570 [ 2118.467067] do_splice_direct+0x1c4/0x290 [ 2118.467927] ? splice_direct_to_actor+0x980/0x980 [ 2118.468545] ? selinux_file_permission+0x36/0x510 [ 2118.469167] ? security_file_permission+0x24e/0x570 [ 2118.469820] vfs_copy_file_range+0x57b/0x10f0 [ 2118.470404] ? generic_file_rw_checks+0x240/0x240 [ 2118.471002] ? __fget_files+0x296/0x480 [ 2118.471534] __do_sys_copy_file_range+0x176/0x420 [ 2118.472655] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2118.473702] ? ksys_write+0x1a9/0x260 [ 2118.474553] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2118.475700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2118.477057] do_syscall_64+0x33/0x40 [ 2118.477865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2118.479052] RIP: 0033:0x7f9dba2a1b19 [ 2118.479864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2118.482195] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2118.483168] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2118.484144] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2118.485062] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2118.485978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2118.486889] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2118.610831] 9pnet: Insufficient options for proto=fd [ 2118.630539] 9pnet: Insufficient options for proto=fd 08:03:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 15) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:03:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x900) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x7) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x900) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:43 executing program 3: perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 08:03:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB='name=vfat\x00,name=vfat\x00,release_ag']) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2134.917127] FAULT_INJECTION: forcing a failure. [ 2134.917127] name failslab, interval 1, probability 0, space 0, times 0 [ 2134.919022] CPU: 1 PID: 13290 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2134.919898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2134.920949] Call Trace: [ 2134.921293] dump_stack+0x107/0x167 [ 2134.921766] should_fail.cold+0x5/0xa [ 2134.922264] ? create_object.isra.0+0x3a/0xa20 [ 2134.922853] should_failslab+0x5/0x20 [ 2134.923342] kmem_cache_alloc+0x5b/0x360 [ 2134.923891] create_object.isra.0+0x3a/0xa20 [ 2134.924659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2134.925334] kmem_cache_alloc+0x159/0x360 [ 2134.925873] alloc_buffer_head+0x20/0x110 [ 2134.926403] alloc_page_buffers+0x14d/0x6d0 [ 2134.926964] create_empty_buffers+0x2c/0x640 [ 2134.927539] create_page_buffers+0x1bb/0x230 [ 2134.928129] __block_write_begin_int+0x1d1/0x19c0 [ 2134.928763] ? fat_add_cluster+0x100/0x100 [ 2134.929304] ? add_to_page_cache_locked+0x40/0x40 [ 2134.929914] ? __page_cache_alloc+0x10d/0x360 [ 2134.930487] ? remove_inode_buffers+0x300/0x300 [ 2134.931091] ? pagecache_get_page+0x243/0xc80 [ 2134.931668] ? perf_trace_lock+0xac/0x490 [ 2134.932252] ? wait_for_stable_page+0x92/0xe0 [ 2134.932887] cont_write_begin+0x466/0x970 [ 2134.933424] ? fat_add_cluster+0x100/0x100 [ 2134.933952] ? nobh_write_begin+0xed0/0xed0 [ 2134.934500] ? __mark_inode_dirty+0x9dc/0xf10 [ 2134.935080] ? lock_downgrade+0x6d0/0x6d0 [ 2134.935613] ? do_raw_spin_lock+0x121/0x260 [ 2134.936235] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2134.936882] fat_write_begin+0x89/0x180 [ 2134.937398] ? fat_add_cluster+0x100/0x100 [ 2134.937942] generic_perform_write+0x1fe/0x4e0 [ 2134.938531] ? fat_direct_IO+0x1ef/0x380 [ 2134.939055] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2134.939979] ? generic_file_direct_write+0x368/0x560 [ 2134.940644] __generic_file_write_iter+0x2cd/0x5d0 [ 2134.941276] generic_file_write_iter+0xdb/0x230 [ 2134.941877] do_iter_readv_writev+0x476/0x750 [ 2134.942450] ? new_sync_write+0x660/0x660 [ 2134.942974] ? selinux_file_permission+0x36/0x510 [ 2134.943616] do_iter_write+0x191/0x670 [ 2134.944178] vfs_iter_write+0x70/0xa0 [ 2134.944699] iter_file_splice_write+0x721/0xbe0 [ 2134.945299] ? generic_splice_sendpage+0x140/0x140 [ 2134.945980] ? avc_policy_seqno+0x9/0x70 [ 2134.946506] ? selinux_file_permission+0x36/0x510 [ 2134.947118] ? lockdep_init_map_type+0x2c7/0x780 [ 2134.947742] ? generic_splice_sendpage+0x140/0x140 [ 2134.952416] direct_splice_actor+0x10f/0x170 [ 2134.952998] splice_direct_to_actor+0x387/0x980 [ 2134.953615] ? pipe_to_sendpage+0x380/0x380 [ 2134.954180] ? do_splice_to+0x160/0x160 [ 2134.954695] ? security_file_permission+0x24e/0x570 [ 2134.955350] do_splice_direct+0x1c4/0x290 [ 2134.955896] ? splice_direct_to_actor+0x980/0x980 [ 2134.960543] ? selinux_file_permission+0x36/0x510 [ 2134.961164] ? security_file_permission+0x24e/0x570 [ 2134.961834] vfs_copy_file_range+0x57b/0x10f0 [ 2134.962418] ? generic_file_rw_checks+0x240/0x240 [ 2134.963051] ? __fget_files+0x296/0x480 [ 2134.963599] __do_sys_copy_file_range+0x176/0x420 [ 2134.976285] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2134.976903] ? ksys_write+0x1a9/0x260 [ 2134.977415] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2134.978103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2134.978756] do_syscall_64+0x33/0x40 [ 2134.979215] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2134.979875] RIP: 0033:0x7f9dba2a1b19 [ 2134.980389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2134.982725] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2134.983694] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2134.988637] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2134.989562] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2134.990469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2134.991371] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:03:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) ftruncate(r0, 0x4) 08:03:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB='name=vfat\x00,name=vfat\x00,release_ag']) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) ftruncate(r0, 0x4) 08:03:44 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000080)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0400000002", 0x5a, 0x400}, {&(0x7f0000000280)="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", 0x10c, 0x53e}, {&(0x7f0000010400)="030003000000000005", 0x9, 0x7fd}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd1f4655fd1f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000080)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@access_any}]}}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f0000000240)={0x10002008}) splice(r4, &(0x7f0000000180)=0xc467, r0, &(0x7f0000000200)=0x1, 0x459, 0xb) sendfile(r1, 0xffffffffffffffff, &(0x7f00000003c0)=0x80000000000, 0x227) umount2(&(0x7f0000000040)='./file0\x00', 0x2) 08:03:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 16) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:03:44 executing program 3: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000000)=""/167, &(0x7f00000000c0)=0xa7) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7db}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="d50c00e9948d9799a0f91f26e75983010401a1250ceb86a28453bf608d278ffa4fea5ac69dbf26895d4de304ba65bee97330a0e5ba9fa1cd7808d37dc233d5e8a22a5d3bf6b4e4d86ac4665854d76343da282b98d02c0c0988b9e166650653e869b7918bb02994c729b72c5dedc40514149ec25b9b24cb8529398b8e4bab3cf027b0571d9fd3d79de6d16c7c137219ae41e0c60b1e00"/159], 0x1c}}, 0x0) [ 2135.377404] FAULT_INJECTION: forcing a failure. [ 2135.377404] name failslab, interval 1, probability 0, space 0, times 0 [ 2135.379333] CPU: 1 PID: 13337 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2135.380224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2135.381248] Call Trace: [ 2135.381600] dump_stack+0x107/0x167 [ 2135.382065] should_fail.cold+0x5/0xa [ 2135.382542] ? mempool_alloc+0x148/0x360 [ 2135.383038] ? mempool_free_pages+0x20/0x20 [ 2135.383576] should_failslab+0x5/0x20 [ 2135.388107] kmem_cache_alloc+0x5b/0x360 [ 2135.388618] ? mempool_free_pages+0x20/0x20 [ 2135.389163] mempool_alloc+0x148/0x360 [ 2135.389661] ? __lockdep_reset_lock+0x180/0x180 [ 2135.390256] ? mempool_resize+0x7d0/0x7d0 [ 2135.390792] ? find_held_lock+0x2c/0x110 [ 2135.391320] bio_alloc_bioset+0x36e/0x600 [ 2135.391841] ? bvec_alloc+0x2f0/0x2f0 [ 2135.392336] ? __brelse+0x84/0xa0 [ 2135.392787] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2135.393432] __bread_gfp+0x166/0x3a0 [ 2135.393904] fat12_ent_bread+0x144/0x420 [ 2135.394414] ? mark_lock+0xf5/0x2df0 [ 2135.394898] fat_alloc_clusters+0x571/0xf30 [ 2135.395458] ? is_dynamic_key+0x1c0/0x1c0 [ 2135.396016] ? fat_ent_write+0x1a0/0x1a0 [ 2135.396540] ? __lock_acquire+0xbb1/0x5b00 [ 2135.397080] ? __lock_acquire+0x1657/0x5b00 [ 2135.397648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2135.398312] ? SOFTIRQ_verbose+0x10/0x10 [ 2135.398832] ? perf_trace_lock+0xac/0x490 [ 2135.399369] fat_add_cluster+0x6d/0x100 [ 2135.399888] ? fat_fill_super+0x36e0/0x36e0 [ 2135.400455] ? fat_bmap+0x200/0x460 [ 2135.400924] fat_get_block+0x5b3/0x940 [ 2135.401432] ? fat_add_cluster+0x100/0x100 [ 2135.401959] ? create_empty_buffers+0x4a3/0x640 [ 2135.402555] ? create_page_buffers+0x139/0x230 [ 2135.403134] __block_write_begin_int+0x3d1/0x19c0 [ 2135.403749] ? fat_add_cluster+0x100/0x100 [ 2135.404315] ? remove_inode_buffers+0x300/0x300 [ 2135.404913] ? pagecache_get_page+0x243/0xc80 [ 2135.405480] ? perf_trace_lock+0xac/0x490 [ 2135.406036] ? wait_for_stable_page+0x92/0xe0 [ 2135.406607] cont_write_begin+0x466/0x970 [ 2135.407152] ? fat_add_cluster+0x100/0x100 [ 2135.407693] ? nobh_write_begin+0xed0/0xed0 [ 2135.408267] ? __mark_inode_dirty+0x9dc/0xf10 [ 2135.408842] ? lock_downgrade+0x6d0/0x6d0 [ 2135.409364] ? do_raw_spin_lock+0x121/0x260 [ 2135.409923] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2135.410567] fat_write_begin+0x89/0x180 [ 2135.411069] ? fat_add_cluster+0x100/0x100 [ 2135.411603] generic_perform_write+0x1fe/0x4e0 [ 2135.412225] ? fat_direct_IO+0x1ef/0x380 [ 2135.412750] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2135.413646] ? generic_file_direct_write+0x368/0x560 [ 2135.414282] __generic_file_write_iter+0x2cd/0x5d0 [ 2135.414908] generic_file_write_iter+0xdb/0x230 [ 2135.415500] do_iter_readv_writev+0x476/0x750 [ 2135.420151] ? new_sync_write+0x660/0x660 [ 2135.420681] ? selinux_file_permission+0x36/0x510 [ 2135.421314] do_iter_write+0x191/0x670 [ 2135.421825] vfs_iter_write+0x70/0xa0 [ 2135.422324] iter_file_splice_write+0x721/0xbe0 [ 2135.422929] ? generic_splice_sendpage+0x140/0x140 [ 2135.423569] ? avc_policy_seqno+0x9/0x70 [ 2135.424101] ? selinux_file_permission+0x36/0x510 [ 2135.424725] ? lockdep_init_map_type+0x2c7/0x780 [ 2135.425317] ? generic_splice_sendpage+0x140/0x140 [ 2135.425935] direct_splice_actor+0x10f/0x170 [ 2135.426492] splice_direct_to_actor+0x387/0x980 [ 2135.427087] ? pipe_to_sendpage+0x380/0x380 [ 2135.427654] ? do_splice_to+0x160/0x160 [ 2135.428187] ? security_file_permission+0x24e/0x570 [ 2135.428840] do_splice_direct+0x1c4/0x290 [ 2135.429365] ? splice_direct_to_actor+0x980/0x980 [ 2135.429971] ? selinux_file_permission+0x36/0x510 [ 2135.430578] ? security_file_permission+0x24e/0x570 [ 2135.431224] vfs_copy_file_range+0x57b/0x10f0 [ 2135.431802] ? generic_file_rw_checks+0x240/0x240 [ 2135.432442] ? __fget_files+0x296/0x480 [ 2135.432974] __do_sys_copy_file_range+0x176/0x420 [ 2135.433582] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2135.434176] ? ksys_write+0x1a9/0x260 [ 2135.434669] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2135.435339] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2135.436019] do_syscall_64+0x33/0x40 [ 2135.436509] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2135.437152] RIP: 0033:0x7f9dba2a1b19 [ 2135.437643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2135.439926] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2135.444943] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2135.445850] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2135.446752] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2135.447651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2135.448586] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:03:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) ftruncate(r0, 0x4) 08:04:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x1043, 0x103) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB='name=vfat\x00,name=vfat\x00,release_ag']) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 3: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.pending_reads\x00', 0x0, 0x58) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ftruncate(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6092bb756897ecfd, @perf_config_ext={0x0, 0x400}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x40, 0x20, 0x3, 0x8, 0x0, 0x81, 0x14404, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x5, 0x6}, 0x4000, 0x81, 0x3, 0x6, 0x3f, 0x5, 0x2, 0x0, 0x800, 0x0, 0x8}, 0x0, 0x5, r1, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) fcntl$setstatus(r2, 0x4, 0x6400) write(r2, &(0x7f0000001200), 0xffffff45) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file1/file0\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x2) 08:04:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xb00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 17) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) syz_io_uring_complete(r1) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2151.751557] FAULT_INJECTION: forcing a failure. [ 2151.751557] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.753288] CPU: 1 PID: 13373 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2151.754155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2151.755189] Call Trace: [ 2151.755539] dump_stack+0x107/0x167 [ 2151.756009] should_fail.cold+0x5/0xa [ 2151.756537] ? create_object.isra.0+0x3a/0xa20 [ 2151.757119] should_failslab+0x5/0x20 [ 2151.757606] kmem_cache_alloc+0x5b/0x360 [ 2151.758130] create_object.isra.0+0x3a/0xa20 [ 2151.758690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2151.759336] kmem_cache_alloc+0x159/0x360 [ 2151.759869] ? mempool_free_pages+0x20/0x20 [ 2151.760436] mempool_alloc+0x148/0x360 [ 2151.760938] ? __lockdep_reset_lock+0x180/0x180 [ 2151.761527] ? mempool_resize+0x7d0/0x7d0 [ 2151.762054] ? find_held_lock+0x2c/0x110 [ 2151.762590] bio_alloc_bioset+0x36e/0x600 [ 2151.763126] ? bvec_alloc+0x2f0/0x2f0 [ 2151.763618] ? __brelse+0x84/0xa0 [ 2151.764066] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 2151.764731] __bread_gfp+0x166/0x3a0 [ 2151.765216] fat12_ent_bread+0x144/0x420 [ 2151.765731] ? mark_lock+0xf5/0x2df0 [ 2151.766216] fat_alloc_clusters+0x571/0xf30 [ 2151.766783] ? is_dynamic_key+0x1c0/0x1c0 [ 2151.767318] ? fat_ent_write+0x1a0/0x1a0 [ 2151.767844] ? __lock_acquire+0xbb1/0x5b00 [ 2151.768403] ? __lock_acquire+0x1657/0x5b00 [ 2151.768972] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2151.769634] ? SOFTIRQ_verbose+0x10/0x10 [ 2151.770159] ? perf_trace_lock+0xac/0x490 [ 2151.770697] fat_add_cluster+0x6d/0x100 [ 2151.771206] ? fat_fill_super+0x36e0/0x36e0 [ 2151.771754] ? fat_bmap+0x200/0x460 [ 2151.772254] fat_get_block+0x5b3/0x940 [ 2151.772767] ? fat_add_cluster+0x100/0x100 [ 2151.773304] ? create_empty_buffers+0x4a3/0x640 [ 2151.773901] ? create_page_buffers+0x139/0x230 [ 2151.774485] __block_write_begin_int+0x3d1/0x19c0 [ 2151.775102] ? fat_add_cluster+0x100/0x100 [ 2151.775655] ? remove_inode_buffers+0x300/0x300 [ 2151.776258] ? pagecache_get_page+0x243/0xc80 [ 2151.776834] ? perf_trace_lock+0xac/0x490 [ 2151.777364] ? wait_for_stable_page+0x92/0xe0 [ 2151.777936] cont_write_begin+0x466/0x970 [ 2151.778477] ? fat_add_cluster+0x100/0x100 [ 2151.779014] ? nobh_write_begin+0xed0/0xed0 [ 2151.779564] ? __mark_inode_dirty+0x9dc/0xf10 [ 2151.780145] ? lock_downgrade+0x6d0/0x6d0 [ 2151.780714] ? do_raw_spin_lock+0x121/0x260 [ 2151.781290] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2151.781954] fat_write_begin+0x89/0x180 [ 2151.782460] ? fat_add_cluster+0x100/0x100 [ 2151.783007] generic_perform_write+0x1fe/0x4e0 [ 2151.783593] ? fat_direct_IO+0x1ef/0x380 [ 2151.784116] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2151.785065] ? generic_file_direct_write+0x368/0x560 [ 2151.785720] __generic_file_write_iter+0x2cd/0x5d0 [ 2151.786347] generic_file_write_iter+0xdb/0x230 [ 2151.786945] do_iter_readv_writev+0x476/0x750 [ 2151.787520] ? new_sync_write+0x660/0x660 [ 2151.788049] ? selinux_file_permission+0x36/0x510 [ 2151.788715] do_iter_write+0x191/0x670 [ 2151.789228] vfs_iter_write+0x70/0xa0 [ 2151.789719] iter_file_splice_write+0x721/0xbe0 [ 2151.790328] ? generic_splice_sendpage+0x140/0x140 [ 2151.790957] ? avc_policy_seqno+0x9/0x70 [ 2151.791478] ? selinux_file_permission+0x36/0x510 [ 2151.792096] ? lockdep_init_map_type+0x2c7/0x780 [ 2151.792720] ? generic_splice_sendpage+0x140/0x140 [ 2151.793343] direct_splice_actor+0x10f/0x170 [ 2151.793903] splice_direct_to_actor+0x387/0x980 [ 2151.794495] ? pipe_to_sendpage+0x380/0x380 [ 2151.795046] ? do_splice_to+0x160/0x160 [ 2151.795558] ? security_file_permission+0x24e/0x570 [ 2151.796222] do_splice_direct+0x1c4/0x290 [ 2151.796759] ? splice_direct_to_actor+0x980/0x980 [ 2151.797367] ? selinux_file_permission+0x36/0x510 [ 2151.797982] ? security_file_permission+0x24e/0x570 [ 2151.798627] vfs_copy_file_range+0x57b/0x10f0 [ 2151.799206] ? generic_file_rw_checks+0x240/0x240 [ 2151.799822] ? __fget_files+0x296/0x480 [ 2151.800372] __do_sys_copy_file_range+0x176/0x420 [ 2151.800996] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2151.801594] ? ksys_write+0x1a9/0x260 [ 2151.802086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2151.802755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2151.803415] do_syscall_64+0x33/0x40 [ 2151.803891] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2151.804560] RIP: 0033:0x7f9dba2a1b19 [ 2151.805031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2151.807306] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2151.808320] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2151.809209] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2151.810142] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2151.811039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2151.811929] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:01 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 18) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751d"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2152.155738] FAT-fs (loop4): Unrecognized mount option "./file1" or missing value 08:04:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2152.239911] FAULT_INJECTION: forcing a failure. [ 2152.239911] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2152.241590] CPU: 0 PID: 13398 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2152.242483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2152.243547] Call Trace: [ 2152.243899] dump_stack+0x107/0x167 [ 2152.244442] should_fail.cold+0x5/0xa [ 2152.245046] __alloc_pages_nodemask+0x182/0x680 [ 2152.245661] ? xas_start+0x156/0x530 [ 2152.246133] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 2152.246902] ? xas_load+0x66/0x2c0 [ 2152.247373] ? find_get_entry+0x2d9/0x6e0 [ 2152.247911] ? perf_trace_lock+0xac/0x490 [ 2152.248501] ? lock_chain_count+0x20/0x20 [ 2152.249045] alloc_pages_current+0x187/0x280 [ 2152.249616] __page_cache_alloc+0x2d2/0x360 [ 2152.250215] pagecache_get_page+0x2c7/0xc80 [ 2152.250771] ? unlock_page_memcg+0x96/0x160 [ 2152.251370] grab_cache_page_write_begin+0x64/0xa0 [ 2152.252009] cont_write_begin+0x43c/0x970 [ 2152.256636] ? fat_add_cluster+0x100/0x100 [ 2152.257222] ? nobh_write_begin+0xed0/0xed0 [ 2152.257794] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2152.258451] ? generic_write_end+0x20e/0x3f0 [ 2152.259025] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2152.259683] fat_write_begin+0x89/0x180 [ 2152.260209] ? fat_add_cluster+0x100/0x100 [ 2152.260746] generic_perform_write+0x1fe/0x4e0 [ 2152.261347] ? fat_direct_IO+0x1ef/0x380 [ 2152.261839] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2152.262755] ? generic_file_direct_write+0x368/0x560 [ 2152.263378] __generic_file_write_iter+0x2cd/0x5d0 [ 2152.263992] generic_file_write_iter+0xdb/0x230 [ 2152.264626] do_iter_readv_writev+0x476/0x750 [ 2152.265212] ? new_sync_write+0x660/0x660 [ 2152.265746] ? selinux_file_permission+0x36/0x510 [ 2152.266390] do_iter_write+0x191/0x670 [ 2152.266919] vfs_iter_write+0x70/0xa0 [ 2152.267460] iter_file_splice_write+0x721/0xbe0 [ 2152.268072] ? generic_splice_sendpage+0x140/0x140 [ 2152.268763] ? avc_policy_seqno+0x9/0x70 [ 2152.269272] ? selinux_file_permission+0x36/0x510 [ 2152.269881] ? lockdep_init_map_type+0x2c7/0x780 [ 2152.270471] ? generic_splice_sendpage+0x140/0x140 [ 2152.271090] direct_splice_actor+0x10f/0x170 [ 2152.271670] splice_direct_to_actor+0x387/0x980 [ 2152.272339] ? pipe_to_sendpage+0x380/0x380 [ 2152.272913] ? do_splice_to+0x160/0x160 [ 2152.273478] ? security_file_permission+0x24e/0x570 [ 2152.274136] do_splice_direct+0x1c4/0x290 [ 2152.274677] ? splice_direct_to_actor+0x980/0x980 [ 2152.275304] ? selinux_file_permission+0x36/0x510 [ 2152.275933] ? security_file_permission+0x24e/0x570 [ 2152.276601] vfs_copy_file_range+0x57b/0x10f0 [ 2152.277191] ? generic_file_rw_checks+0x240/0x240 [ 2152.277831] ? __fget_files+0x296/0x480 [ 2152.278437] __do_sys_copy_file_range+0x176/0x420 [ 2152.279075] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2152.279688] ? ksys_write+0x1a9/0x260 [ 2152.280216] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2152.280913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2152.281565] do_syscall_64+0x33/0x40 [ 2152.282067] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2152.282737] RIP: 0033:0x7f9dba2a1b19 [ 2152.283279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2152.285565] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2152.286503] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2152.287432] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000007 [ 2152.288396] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2152.289288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2152.290185] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xb) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xd00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751d"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 19) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}]}}) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000002f80)=ANY=[@ANYRES64, @ANYBLOB="2f27a49f7f62c1ab14dcdd5db246f39a862c0d72208eb58f450507b9d2c30a2c431ebaa478f898b4d653729abc367bc823a0c71bf9fca005176720c8108fe13d07373116de08b9aac2d49f842fb9064441aa79bd98e09a6606d0d8e3ff9aeca20171a3ca8b44b3d37e6ab654ff26f44fae7daf3f4696b148524fe20983eea72b8400d9", @ANYRES64=r1, @ANYRESOCT, @ANYRESOCT, @ANYBLOB="b45dc8f591afcc304c8bd962b11d42c9ff3fc0b0a99a5d8861872575ee1478165bb178574fdb11c692b313e8d97b2dd2c5a8ba2ed15e836888e3416ca5008979e183286bb137155c1840964d12bf73bb182fff36e18ededac13a4cf4f16b1116bc9de63eb4a03e8e4aaabaab10fd2ddb22be5b94b8aa7f2ce0a19de037687882075cf8f297d2983264f95afc5be9d4f8b0cc37f3b898906c411fd774c6a065", @ANYBLOB="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", @ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) socket$unix(0x1, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x0) 08:04:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2168.994667] FAULT_INJECTION: forcing a failure. [ 2168.994667] name failslab, interval 1, probability 0, space 0, times 0 [ 2168.998354] CPU: 1 PID: 13436 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2169.000347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2169.002778] Call Trace: [ 2169.003543] dump_stack+0x107/0x167 [ 2169.004705] should_fail.cold+0x5/0xa [ 2169.005798] ? xas_alloc+0x336/0x440 [ 2169.006838] should_failslab+0x5/0x20 [ 2169.007962] kmem_cache_alloc+0x5b/0x360 [ 2169.009163] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2169.010714] xas_alloc+0x336/0x440 [ 2169.011723] xas_create+0x60b/0x1040 [ 2169.012851] xas_store+0x90/0x1c40 [ 2169.013688] ? xas_find_conflict+0x4a6/0x9f0 [ 2169.014354] __add_to_page_cache_locked+0x708/0xcf0 [ 2169.015143] ? find_get_pages_contig+0x940/0x940 [ 2169.015897] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2169.016669] ? find_get_entry+0x2d9/0x6e0 [ 2169.017290] add_to_page_cache_lru+0xe6/0x2e0 [ 2169.017997] ? add_to_page_cache_locked+0x40/0x40 [ 2169.018790] ? __page_cache_alloc+0x10d/0x360 [ 2169.019443] pagecache_get_page+0x38b/0xc80 [ 2169.020159] ? unlock_page_memcg+0x96/0x160 [ 2169.020834] grab_cache_page_write_begin+0x64/0xa0 [ 2169.022243] cont_write_begin+0x43c/0x970 [ 2169.022912] ? fat_add_cluster+0x100/0x100 [ 2169.024118] ? nobh_write_begin+0xed0/0xed0 [ 2169.024806] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2169.025691] ? generic_write_end+0x20e/0x3f0 [ 2169.026330] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2169.027146] fat_write_begin+0x89/0x180 [ 2169.027761] ? fat_add_cluster+0x100/0x100 [ 2169.028407] generic_perform_write+0x1fe/0x4e0 [ 2169.029126] ? fat_direct_IO+0x1ef/0x380 [ 2169.029768] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2169.031859] ? generic_file_direct_write+0x368/0x560 [ 2169.033310] __generic_file_write_iter+0x2cd/0x5d0 [ 2169.034770] generic_file_write_iter+0xdb/0x230 [ 2169.036144] do_iter_readv_writev+0x476/0x750 [ 2169.037441] ? new_sync_write+0x660/0x660 [ 2169.038651] ? selinux_file_permission+0x36/0x510 [ 2169.040051] do_iter_write+0x191/0x670 [ 2169.041232] vfs_iter_write+0x70/0xa0 [ 2169.041888] iter_file_splice_write+0x721/0xbe0 [ 2169.043232] ? generic_splice_sendpage+0x140/0x140 [ 2169.044655] ? avc_policy_seqno+0x9/0x70 [ 2169.045300] ? selinux_file_permission+0x36/0x510 [ 2169.046657] ? lockdep_init_map_type+0x2c7/0x780 [ 2169.047369] ? generic_splice_sendpage+0x140/0x140 [ 2169.048825] direct_splice_actor+0x10f/0x170 [ 2169.049489] splice_direct_to_actor+0x387/0x980 [ 2169.050874] ? pipe_to_sendpage+0x380/0x380 [ 2169.051567] ? do_splice_to+0x160/0x160 [ 2169.052728] ? security_file_permission+0x24e/0x570 [ 2169.053519] do_splice_direct+0x1c4/0x290 [ 2169.054706] ? splice_direct_to_actor+0x980/0x980 [ 2169.056123] ? selinux_file_permission+0x36/0x510 [ 2169.056928] ? security_file_permission+0x24e/0x570 [ 2169.058386] vfs_copy_file_range+0x57b/0x10f0 [ 2169.059116] ? generic_file_rw_checks+0x240/0x240 [ 2169.060509] ? __fget_files+0x296/0x480 [ 2169.061693] __do_sys_copy_file_range+0x176/0x420 [ 2169.063100] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2169.063876] ? ksys_write+0x1a9/0x260 [ 2169.065007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2169.066498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2169.067981] do_syscall_64+0x33/0x40 [ 2169.069376] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2169.070879] RIP: 0033:0x7f9dba2a1b19 [ 2169.071449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2169.076796] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2169.077956] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2169.079091] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2169.080179] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2169.081289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2169.082406] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751d"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xe00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xb) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xd) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xf00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff6) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x80) lseek(r0, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 08:04:34 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 20) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:34 executing program 6: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) [ 2185.850320] FAULT_INJECTION: forcing a failure. [ 2185.850320] name failslab, interval 1, probability 0, space 0, times 0 [ 2185.851752] CPU: 0 PID: 13502 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2185.852634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2185.853845] Call Trace: [ 2185.854198] dump_stack+0x107/0x167 [ 2185.854673] should_fail.cold+0x5/0xa [ 2185.855162] ? create_object.isra.0+0x3a/0xa20 [ 2185.855745] should_failslab+0x5/0x20 [ 2185.856230] kmem_cache_alloc+0x5b/0x360 [ 2185.856794] create_object.isra.0+0x3a/0xa20 [ 2185.857355] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2185.858005] kmem_cache_alloc+0x159/0x360 [ 2185.858537] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2185.859211] xas_alloc+0x336/0x440 [ 2185.859783] xas_create+0x60b/0x1040 [ 2185.860290] xas_store+0x90/0x1c40 [ 2185.860793] ? xas_find_conflict+0x4a6/0x9f0 [ 2185.861369] __add_to_page_cache_locked+0x708/0xcf0 [ 2185.862023] ? find_get_pages_contig+0x940/0x940 [ 2185.862632] ? memcg_drain_all_list_lrus+0x6d0/0x6d0 [ 2185.863277] ? find_get_entry+0x2d9/0x6e0 [ 2185.863812] add_to_page_cache_lru+0xe6/0x2e0 08:04:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xff6) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2185.864386] ? add_to_page_cache_locked+0x40/0x40 [ 2185.865204] ? __page_cache_alloc+0x10d/0x360 [ 2185.865799] pagecache_get_page+0x38b/0xc80 [ 2185.866364] ? unlock_page_memcg+0x96/0x160 [ 2185.866935] grab_cache_page_write_begin+0x64/0xa0 [ 2185.867581] cont_write_begin+0x43c/0x970 [ 2185.868141] ? fat_add_cluster+0x100/0x100 [ 2185.868714] ? nobh_write_begin+0xed0/0xed0 [ 2185.869286] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2185.869950] ? generic_write_end+0x20e/0x3f0 [ 2185.870543] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2185.871221] fat_write_begin+0x89/0x180 [ 2185.871759] ? fat_add_cluster+0x100/0x100 [ 2185.872326] generic_perform_write+0x1fe/0x4e0 [ 2185.872977] ? fat_direct_IO+0x1ef/0x380 [ 2185.873525] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2185.874487] ? generic_file_direct_write+0x368/0x560 [ 2185.875155] __generic_file_write_iter+0x2cd/0x5d0 [ 2185.875816] generic_file_write_iter+0xdb/0x230 [ 2185.876437] do_iter_readv_writev+0x476/0x750 [ 2185.877086] ? new_sync_write+0x660/0x660 [ 2185.877631] ? selinux_file_permission+0x36/0x510 [ 2185.878303] do_iter_write+0x191/0x670 [ 2185.878885] vfs_iter_write+0x70/0xa0 [ 2185.879411] iter_file_splice_write+0x721/0xbe0 [ 2185.880052] ? generic_splice_sendpage+0x140/0x140 [ 2185.880736] ? avc_policy_seqno+0x9/0x70 [ 2185.881286] ? selinux_file_permission+0x36/0x510 [ 2185.881925] ? lockdep_init_map_type+0x2c7/0x780 [ 2185.882606] ? generic_splice_sendpage+0x140/0x140 [ 2185.883256] direct_splice_actor+0x10f/0x170 [ 2185.883846] splice_direct_to_actor+0x387/0x980 [ 2185.884479] ? pipe_to_sendpage+0x380/0x380 [ 2185.885090] ? do_splice_to+0x160/0x160 [ 2185.885630] ? security_file_permission+0x24e/0x570 [ 2185.886302] do_splice_direct+0x1c4/0x290 [ 2185.886865] ? splice_direct_to_actor+0x980/0x980 [ 2185.887499] ? selinux_file_permission+0x36/0x510 [ 2185.888147] ? security_file_permission+0x24e/0x570 [ 2185.888854] vfs_copy_file_range+0x57b/0x10f0 [ 2185.889453] ? generic_file_rw_checks+0x240/0x240 [ 2185.890108] ? __fget_files+0x296/0x480 [ 2185.890713] __do_sys_copy_file_range+0x176/0x420 [ 2185.891450] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2185.892116] ? ksys_write+0x1a9/0x260 [ 2185.892643] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2185.893368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2185.894056] do_syscall_64+0x33/0x40 [ 2185.894573] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2185.895255] RIP: 0033:0x7f9dba2a1b19 [ 2185.895760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2185.898285] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2185.899303] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2185.900249] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2185.901270] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2185.902241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2185.903190] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x4000000000400}, {&(0x7f00000000c0)="0200000003000a6000000000d2690f", 0xf, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}]}}) openat(r1, &(0x7f0000000140)='./file0\x00', 0x84c00, 0x88) creat(&(0x7f0000000000)='./file0\x00', 0x0) 08:04:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xe) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:35 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 21) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:35 executing program 6: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) [ 2186.208739] FAULT_INJECTION: forcing a failure. [ 2186.208739] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.210409] CPU: 0 PID: 13529 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2186.211248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2186.212298] Call Trace: [ 2186.212683] dump_stack+0x107/0x167 [ 2186.213176] should_fail.cold+0x5/0xa [ 2186.213682] ? create_object.isra.0+0x3a/0xa20 [ 2186.214284] should_failslab+0x5/0x20 [ 2186.214792] kmem_cache_alloc+0x5b/0x360 [ 2186.215346] create_object.isra.0+0x3a/0xa20 [ 2186.215921] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2186.216624] kmem_cache_alloc+0x159/0x360 [ 2186.217225] alloc_buffer_head+0x20/0x110 [ 2186.217747] alloc_page_buffers+0x14d/0x6d0 [ 2186.218326] create_empty_buffers+0x2c/0x640 [ 2186.218900] create_page_buffers+0x1bb/0x230 [ 2186.219484] __block_write_begin_int+0x1d1/0x19c0 [ 2186.220109] ? fat_add_cluster+0x100/0x100 [ 2186.220683] ? add_to_page_cache_locked+0x40/0x40 [ 2186.221319] ? __page_cache_alloc+0x10d/0x360 [ 2186.221908] ? remove_inode_buffers+0x300/0x300 [ 2186.222505] ? pagecache_get_page+0x243/0xc80 [ 2186.223092] ? unlock_page_memcg+0x96/0x160 [ 2186.223650] ? wait_for_stable_page+0x92/0xe0 [ 2186.224242] cont_write_begin+0x466/0x970 [ 2186.224810] ? fat_add_cluster+0x100/0x100 [ 2186.225361] ? nobh_write_begin+0xed0/0xed0 [ 2186.225923] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2186.226581] ? generic_write_end+0x20e/0x3f0 [ 2186.227165] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2186.227821] fat_write_begin+0x89/0x180 [ 2186.228344] ? fat_add_cluster+0x100/0x100 [ 2186.228934] generic_perform_write+0x1fe/0x4e0 [ 2186.229544] ? fat_direct_IO+0x1ef/0x380 [ 2186.230072] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2186.231018] ? generic_file_direct_write+0x368/0x560 [ 2186.231697] __generic_file_write_iter+0x2cd/0x5d0 [ 2186.232338] generic_file_write_iter+0xdb/0x230 [ 2186.232973] do_iter_readv_writev+0x476/0x750 [ 2186.233551] ? new_sync_write+0x660/0x660 [ 2186.234097] ? selinux_file_permission+0x36/0x510 [ 2186.234748] do_iter_write+0x191/0x670 [ 2186.235272] vfs_iter_write+0x70/0xa0 [ 2186.235767] iter_file_splice_write+0x721/0xbe0 [ 2186.236395] ? generic_splice_sendpage+0x140/0x140 [ 2186.237074] ? avc_policy_seqno+0x9/0x70 [ 2186.237601] ? selinux_file_permission+0x36/0x510 [ 2186.238239] ? lockdep_init_map_type+0x2c7/0x780 [ 2186.238851] ? generic_splice_sendpage+0x140/0x140 [ 2186.239510] direct_splice_actor+0x10f/0x170 [ 2186.240078] splice_direct_to_actor+0x387/0x980 [ 2186.240732] ? pipe_to_sendpage+0x380/0x380 [ 2186.241308] ? do_splice_to+0x160/0x160 [ 2186.241829] ? security_file_permission+0x24e/0x570 [ 2186.242502] do_splice_direct+0x1c4/0x290 [ 2186.243035] ? splice_direct_to_actor+0x980/0x980 [ 2186.243674] ? selinux_file_permission+0x36/0x510 [ 2186.244297] ? security_file_permission+0x24e/0x570 [ 2186.245006] vfs_copy_file_range+0x57b/0x10f0 [ 2186.245596] ? generic_file_rw_checks+0x240/0x240 [ 2186.246234] ? __fget_files+0x296/0x480 [ 2186.246789] __do_sys_copy_file_range+0x176/0x420 [ 2186.247426] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2186.248052] ? ksys_write+0x1a9/0x260 [ 2186.248552] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2186.249262] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2186.249923] do_syscall_64+0x33/0x40 [ 2186.250431] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2186.251095] RIP: 0033:0x7f9dba2a1b19 [ 2186.251574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2186.253939] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2186.254922] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2186.255843] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2186.256754] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2186.257653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2186.258572] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:50 executing program 6: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) 08:04:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 22) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',=\x00\x00\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',access=any,\x00']) dup2(r0, r2) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0xfe, 0x0, 0x10, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd, 0x8, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xf) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2202.135846] FAULT_INJECTION: forcing a failure. [ 2202.135846] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.137681] CPU: 0 PID: 13543 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2202.138596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.139678] Call Trace: [ 2202.140034] dump_stack+0x107/0x167 [ 2202.140611] should_fail.cold+0x5/0xa [ 2202.141206] ? create_object.isra.0+0x3a/0xa20 [ 2202.141804] should_failslab+0x5/0x20 [ 2202.142353] kmem_cache_alloc+0x5b/0x360 [ 2202.142889] create_object.isra.0+0x3a/0xa20 [ 2202.143525] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.144280] kmem_cache_alloc+0x159/0x360 [ 2202.144841] alloc_buffer_head+0x20/0x110 [ 2202.145455] alloc_page_buffers+0x14d/0x6d0 [ 2202.146023] create_empty_buffers+0x2c/0x640 [ 2202.146656] create_page_buffers+0x1bb/0x230 [ 2202.147294] __block_write_begin_int+0x1d1/0x19c0 [ 2202.147926] ? fat_add_cluster+0x100/0x100 [ 2202.148566] ? add_to_page_cache_locked+0x40/0x40 [ 2202.149276] ? __page_cache_alloc+0x10d/0x360 [ 2202.149851] ? remove_inode_buffers+0x300/0x300 [ 2202.150507] ? pagecache_get_page+0x243/0xc80 [ 2202.151151] ? unlock_page_memcg+0x96/0x160 [ 2202.151714] ? wait_for_stable_page+0x92/0xe0 [ 2202.152380] cont_write_begin+0x466/0x970 [ 2202.152954] ? fat_add_cluster+0x100/0x100 [ 2202.153623] ? nobh_write_begin+0xed0/0xed0 [ 2202.154229] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2202.154884] ? generic_write_end+0x20e/0x3f0 [ 2202.155518] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2202.156260] fat_write_begin+0x89/0x180 [ 2202.156775] ? fat_add_cluster+0x100/0x100 [ 2202.157423] generic_perform_write+0x1fe/0x4e0 [ 2202.158019] ? fat_direct_IO+0x1ef/0x380 [ 2202.158604] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2202.159599] ? generic_file_direct_write+0x368/0x560 [ 2202.160348] __generic_file_write_iter+0x2cd/0x5d0 [ 2202.161010] generic_file_write_iter+0xdb/0x230 [ 2202.161675] do_iter_readv_writev+0x476/0x750 [ 2202.162314] ? new_sync_write+0x660/0x660 [ 2202.162851] ? selinux_file_permission+0x36/0x510 [ 2202.163554] do_iter_write+0x191/0x670 [ 2202.164158] vfs_iter_write+0x70/0xa0 08:04:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2202.164668] iter_file_splice_write+0x721/0xbe0 [ 2202.165406] ? generic_splice_sendpage+0x140/0x140 [ 2202.166106] ? avc_policy_seqno+0x9/0x70 [ 2202.166647] ? selinux_file_permission+0x36/0x510 [ 2202.167523] ? lockdep_init_map_type+0x2c7/0x780 [ 2202.168231] ? generic_splice_sendpage+0x140/0x140 [ 2202.168909] direct_splice_actor+0x10f/0x170 [ 2202.169559] splice_direct_to_actor+0x387/0x980 [ 2202.170216] ? pipe_to_sendpage+0x380/0x380 [ 2202.170783] ? do_splice_to+0x160/0x160 [ 2202.171364] ? security_file_permission+0x24e/0x570 [ 2202.172027] do_splice_direct+0x1c4/0x290 [ 2202.172658] ? splice_direct_to_actor+0x980/0x980 [ 2202.173352] ? selinux_file_permission+0x36/0x510 [ 2202.173989] ? security_file_permission+0x24e/0x570 [ 2202.174763] vfs_copy_file_range+0x57b/0x10f0 [ 2202.175422] ? generic_file_rw_checks+0x240/0x240 [ 2202.176132] ? __fget_files+0x296/0x480 [ 2202.176679] __do_sys_copy_file_range+0x176/0x420 [ 2202.177390] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2202.178095] ? ksys_write+0x1a9/0x260 [ 2202.178806] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.179554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.180318] do_syscall_64+0x33/0x40 [ 2202.180818] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2202.181557] RIP: 0033:0x7f9dba2a1b19 [ 2202.182137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.184636] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2202.185721] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2202.186685] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2202.187661] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2202.190255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.191213] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:04:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x20, 0x4) gettid() pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x3a) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000800), 0x80000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000008c0)={0x6c, 0x24, '\x00', [@generic={0x9, 0x5d, "6548864e86ae5f41cd7e8836b470c5cdc0ed5520d2c76a7a1031f21bbc95bbb18d7f4bb6f92fe9bf8de85cb59983a45ee198b66b48dda9c0370e5f6917ab5b68c273beb14bb6348fbd06c4da298cf09b24eb5379b283d66843e2db0d77"}, @ra={0x5, 0x2, 0x99}, @generic={0xff, 0xbf, "11b94f4c9e311a1309eb66b1015ab4ebc8f8b5ee4d5dcea3b67d39af1cb3d5f8f129b38173d5d0029fb22cd796c48fb51d2d8912ce349643e34e3637a9c96b0c23c1dfb6155365b3f2d3818efd384ab7bf259f6857887c1fa6045def262c3d0b748bedb4d101b815bb0d091a82c886c4a62b1f76731688977e15928a76606fc322936418de67e7e68094995bfab9a5a61500afce6434eed48b18e92aa743eea8f8cebc436bd64a9fc4d08c32864c632c07aacd84bad6d0915f1ca17e0e49a3"}]}, 0x130) 08:04:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x10) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:04:51 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:04:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 3: stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, 0x0, r0) r3 = getuid() setresuid(r2, r0, r3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) r4 = fork() tkill(r4, 0x36) ptrace$setopts(0x4206, r4, 0x0, 0x0) fcntl$setown(r1, 0x8, r4) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="58e1616e", 0x4}], 0x1}, 0x10040011) 08:05:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x11) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3f00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 23) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x3f00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2218.765308] FAULT_INJECTION: forcing a failure. [ 2218.765308] name failslab, interval 1, probability 0, space 0, times 0 [ 2218.766843] CPU: 0 PID: 13625 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2218.769892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2218.770925] Call Trace: [ 2218.771275] dump_stack+0x107/0x167 [ 2218.771748] should_fail.cold+0x5/0xa [ 2218.772240] ? create_object.isra.0+0x3a/0xa20 [ 2218.772822] should_failslab+0x5/0x20 [ 2218.773327] kmem_cache_alloc+0x5b/0x360 [ 2218.773849] create_object.isra.0+0x3a/0xa20 [ 2218.774399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2218.775053] kmem_cache_alloc+0x159/0x360 [ 2218.775596] alloc_buffer_head+0x20/0x110 [ 2218.776131] alloc_page_buffers+0x14d/0x6d0 [ 2218.776699] create_empty_buffers+0x2c/0x640 [ 2218.777298] create_page_buffers+0x1bb/0x230 [ 2218.777873] __block_write_begin_int+0x1d1/0x19c0 [ 2218.778502] ? fat_add_cluster+0x100/0x100 [ 2218.779047] ? add_to_page_cache_locked+0x40/0x40 [ 2218.779663] ? __page_cache_alloc+0x10d/0x360 [ 2218.780226] ? remove_inode_buffers+0x300/0x300 [ 2218.780867] ? pagecache_get_page+0x243/0xc80 [ 2218.781467] ? unlock_page_memcg+0x96/0x160 [ 2218.782015] ? wait_for_stable_page+0x92/0xe0 [ 2218.782595] cont_write_begin+0x466/0x970 [ 2218.783142] ? fat_add_cluster+0x100/0x100 [ 2218.783684] ? nobh_write_begin+0xed0/0xed0 [ 2218.784241] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2218.784891] ? generic_write_end+0x20e/0x3f0 [ 2218.785487] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2218.786138] fat_write_begin+0x89/0x180 [ 2218.786659] ? fat_add_cluster+0x100/0x100 [ 2218.787208] generic_perform_write+0x1fe/0x4e0 [ 2218.787802] ? fat_direct_IO+0x1ef/0x380 [ 2218.788325] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2218.789252] ? generic_file_direct_write+0x368/0x560 [ 2218.789904] __generic_file_write_iter+0x2cd/0x5d0 [ 2218.790533] generic_file_write_iter+0xdb/0x230 [ 2218.791128] do_iter_readv_writev+0x476/0x750 [ 2218.791705] ? new_sync_write+0x660/0x660 [ 2218.792238] ? selinux_file_permission+0x36/0x510 [ 2218.792878] do_iter_write+0x191/0x670 [ 2218.793411] vfs_iter_write+0x70/0xa0 [ 2218.793905] iter_file_splice_write+0x721/0xbe0 [ 2218.794525] ? generic_splice_sendpage+0x140/0x140 [ 2218.795167] ? avc_policy_seqno+0x9/0x70 [ 2218.795684] ? selinux_file_permission+0x36/0x510 [ 2218.796312] ? lockdep_init_map_type+0x2c7/0x780 [ 2218.796929] ? generic_splice_sendpage+0x140/0x140 [ 2218.797583] direct_splice_actor+0x10f/0x170 [ 2218.798154] splice_direct_to_actor+0x387/0x980 [ 2218.798756] ? pipe_to_sendpage+0x380/0x380 [ 2218.799318] ? do_splice_to+0x160/0x160 [ 2218.799826] ? security_file_permission+0x24e/0x570 [ 2218.800480] do_splice_direct+0x1c4/0x290 [ 2218.801023] ? splice_direct_to_actor+0x980/0x980 [ 2218.801644] ? selinux_file_permission+0x36/0x510 [ 2218.802267] ? security_file_permission+0x24e/0x570 [ 2218.802923] vfs_copy_file_range+0x57b/0x10f0 [ 2218.803513] ? generic_file_rw_checks+0x240/0x240 [ 2218.804134] ? __fget_files+0x296/0x480 [ 2218.804666] __do_sys_copy_file_range+0x176/0x420 [ 2218.805298] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2218.805904] ? ksys_write+0x1a9/0x260 [ 2218.806406] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2218.807079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2218.807751] do_syscall_64+0x33/0x40 [ 2218.808231] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2218.808892] RIP: 0033:0x7f9dba2a1b19 [ 2218.809409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2218.811715] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2218.812686] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2218.813608] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2218.814513] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2218.815434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2218.816344] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:05:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x23) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000200000004f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x14400}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000080)='./file1\x00') chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8000) truncate(&(0x7f0000000140)='./file0\x00', 0x6) 08:05:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8008) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 24) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2219.223511] FAULT_INJECTION: forcing a failure. [ 2219.223511] name failslab, interval 1, probability 0, space 0, times 0 [ 2219.227303] CPU: 0 PID: 13671 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2219.229103] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2219.231717] Call Trace: [ 2219.232517] dump_stack+0x107/0x167 [ 2219.233454] should_fail.cold+0x5/0xa [ 2219.234433] ? create_object.isra.0+0x3a/0xa20 [ 2219.235607] should_failslab+0x5/0x20 [ 2219.236575] kmem_cache_alloc+0x5b/0x360 [ 2219.237787] create_object.isra.0+0x3a/0xa20 [ 2219.238944] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2219.240272] kmem_cache_alloc+0x159/0x360 [ 2219.241550] alloc_buffer_head+0x20/0x110 [ 2219.242613] alloc_page_buffers+0x14d/0x6d0 [ 2219.243729] create_empty_buffers+0x2c/0x640 [ 2219.244859] create_page_buffers+0x1bb/0x230 [ 2219.246233] __block_write_begin_int+0x1d1/0x19c0 [ 2219.247528] ? fat_add_cluster+0x100/0x100 [ 2219.248632] ? add_to_page_cache_locked+0x40/0x40 [ 2219.250087] ? __page_cache_alloc+0x10d/0x360 [ 2219.251196] ? remove_inode_buffers+0x300/0x300 [ 2219.252313] ? pagecache_get_page+0x243/0xc80 [ 2219.253265] ? unlock_page_memcg+0x96/0x160 [ 2219.253839] ? wait_for_stable_page+0x92/0xe0 [ 2219.254438] cont_write_begin+0x466/0x970 [ 2219.255008] ? fat_add_cluster+0x100/0x100 [ 2219.255568] ? nobh_write_begin+0xed0/0xed0 [ 2219.256139] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2219.256808] ? generic_write_end+0x20e/0x3f0 [ 2219.257903] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2219.259142] fat_write_begin+0x89/0x180 [ 2219.260115] ? fat_add_cluster+0x100/0x100 [ 2219.261150] generic_perform_write+0x1fe/0x4e0 [ 2219.262368] ? fat_direct_IO+0x1ef/0x380 [ 2219.263391] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2219.265267] ? generic_file_direct_write+0x368/0x560 [ 2219.266551] __generic_file_write_iter+0x2cd/0x5d0 [ 2219.267767] generic_file_write_iter+0xdb/0x230 [ 2219.268947] do_iter_readv_writev+0x476/0x750 [ 2219.270349] ? new_sync_write+0x660/0x660 [ 2219.271392] ? selinux_file_permission+0x36/0x510 [ 2219.272585] do_iter_write+0x191/0x670 [ 2219.273710] vfs_iter_write+0x70/0xa0 [ 2219.274676] iter_file_splice_write+0x721/0xbe0 [ 2219.275870] ? generic_splice_sendpage+0x140/0x140 [ 2219.277102] ? avc_policy_seqno+0x9/0x70 [ 2219.278355] ? selinux_file_permission+0x36/0x510 [ 2219.279739] ? lockdep_init_map_type+0x2c7/0x780 [ 2219.280889] ? generic_splice_sendpage+0x140/0x140 [ 2219.282402] direct_splice_actor+0x10f/0x170 [ 2219.283483] splice_direct_to_actor+0x387/0x980 [ 2219.284732] ? pipe_to_sendpage+0x380/0x380 [ 2219.285479] ? do_splice_to+0x160/0x160 [ 2219.286002] ? security_file_permission+0x24e/0x570 [ 2219.286674] do_splice_direct+0x1c4/0x290 [ 2219.287217] ? splice_direct_to_actor+0x980/0x980 [ 2219.287854] ? selinux_file_permission+0x36/0x510 [ 2219.288509] ? security_file_permission+0x24e/0x570 [ 2219.289340] vfs_copy_file_range+0x57b/0x10f0 [ 2219.290471] ? generic_file_rw_checks+0x240/0x240 [ 2219.291685] ? __fget_files+0x296/0x480 [ 2219.292688] __do_sys_copy_file_range+0x176/0x420 [ 2219.294089] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2219.295325] ? ksys_write+0x1a9/0x260 [ 2219.296349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2219.297403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2219.298093] do_syscall_64+0x33/0x40 [ 2219.298593] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2219.299272] RIP: 0033:0x7f9dba2a1b19 [ 2219.299769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2219.302230] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2219.303229] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2219.304167] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2219.305283] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2219.307090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2219.308837] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 [ 2234.961655] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 08:05:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8008) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 25) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xce00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:33 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}]}}) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0xb5, 0x25}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0xd0}, 0x40) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed", 0x81, 0xb800}, {&(0x7f0000010f00)="4552ed", 0x3, 0xc800}], 0x0, &(0x7f0000000040)={[{@check_strict}]}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x128, 0x0, 0x100, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0x7, 0x3d}}}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5}, @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "ac87c871cd76f901fe261af5c10c8eff3ab51ebf4f8b9f64"}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "ed25de296760d8462ff7ceffeb3605e6b2fc1557cfcabaaf"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "b05deb52f36da394134ebb052364407d522d0dc8989081fc"}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MNTR_FLAGS={0x2c, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x1}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x128}, 0x1, 0x0, 0x0, 0x8010}, 0x44000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000880)={'syztnl2\x00', &(0x7f0000000800)={'syztnl0\x00', 0x0, 0x2f, 0x86, 0x80, 0x20, 0x1, @remote, @dev={0xfe, 0x80, '\x00', 0x3c}, 0x7800, 0x700, 0x1, 0x800}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x2c, 0x5, 0x52, @empty, @remote, 0x1, 0x1, 0x6, 0x5}}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000140)="238e653328849672ba880496888e", 0xe, 0x0, &(0x7f0000000000)={0x11, 0x3, r6, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000a00)={'syztnl0\x00', &(0x7f0000000980)={'syztnl0\x00', 0x0, 0x29, 0x3, 0x40, 0x8000, 0x2, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x1, 0x1ff, 0x1}}) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@private0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}) setsockopt$inet6_mreq(r8, 0x29, 0x3, &(0x7f0000000340)={@mcast2, r10}, 0x14) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000ac0)={'syztnl2\x00', &(0x7f0000000a40)={'syztnl1\x00', 0x0, 0x4, 0x0, 0xf6, 0xfffffffe, 0x20, @mcast1, @dev={0xfe, 0x80, '\x00', 0x42}, 0x700, 0x8, 0x3ff, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001180)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001140)={&(0x7f0000000b00)={0x638, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffe00}}}]}}, {{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xd54e}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r3}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xb210a14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r7}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x118, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}]}}]}, 0x638}, 0x1, 0x0, 0x0, 0x20004000}, 0x20004000) 08:05:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8e) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2244.543508] FAULT_INJECTION: forcing a failure. [ 2244.543508] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.544895] CPU: 0 PID: 13691 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2244.545740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2244.546717] Call Trace: [ 2244.547040] dump_stack+0x107/0x167 [ 2244.547479] should_fail.cold+0x5/0xa [ 2244.547935] ? create_object.isra.0+0x3a/0xa20 [ 2244.548480] should_failslab+0x5/0x20 [ 2244.548935] kmem_cache_alloc+0x5b/0x360 [ 2244.549470] create_object.isra.0+0x3a/0xa20 [ 2244.549988] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2244.550639] kmem_cache_alloc+0x159/0x360 [ 2244.551148] alloc_buffer_head+0x20/0x110 [ 2244.551640] alloc_page_buffers+0x14d/0x6d0 [ 2244.552162] create_empty_buffers+0x2c/0x640 [ 2244.552689] create_page_buffers+0x1bb/0x230 [ 2244.553216] __block_write_begin_int+0x1d1/0x19c0 [ 2244.553819] ? fat_add_cluster+0x100/0x100 [ 2244.554326] ? add_to_page_cache_locked+0x40/0x40 [ 2244.554898] ? __page_cache_alloc+0x10d/0x360 [ 2244.555434] ? remove_inode_buffers+0x300/0x300 [ 2244.555987] ? pagecache_get_page+0x243/0xc80 [ 2244.556544] ? unlock_page_memcg+0x96/0x160 [ 2244.557064] ? wait_for_stable_page+0x92/0xe0 [ 2244.557655] cont_write_begin+0x466/0x970 [ 2244.558161] ? fat_add_cluster+0x100/0x100 [ 2244.558665] ? nobh_write_begin+0xed0/0xed0 [ 2244.559177] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2244.559779] ? generic_write_end+0x20e/0x3f0 [ 2244.560303] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2244.560912] fat_write_begin+0x89/0x180 [ 2244.565444] ? fat_add_cluster+0x100/0x100 [ 2244.565960] generic_perform_write+0x1fe/0x4e0 [ 2244.566520] ? fat_direct_IO+0x1ef/0x380 [ 2244.567014] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2244.567888] ? generic_file_direct_write+0x368/0x560 [ 2244.568505] __generic_file_write_iter+0x2cd/0x5d0 [ 2244.569104] generic_file_write_iter+0xdb/0x230 [ 2244.569696] do_iter_readv_writev+0x476/0x750 [ 2244.570246] ? new_sync_write+0x660/0x660 [ 2244.570746] ? selinux_file_permission+0x36/0x510 [ 2244.571369] do_iter_write+0x191/0x670 [ 2244.571850] vfs_iter_write+0x70/0xa0 [ 2244.572356] iter_file_splice_write+0x721/0xbe0 [ 2244.572925] ? generic_splice_sendpage+0x140/0x140 [ 2244.573548] ? avc_policy_seqno+0x9/0x70 [ 2244.574032] ? selinux_file_permission+0x36/0x510 [ 2244.574714] ? lockdep_init_map_type+0x2c7/0x780 [ 2244.575281] ? generic_splice_sendpage+0x140/0x140 [ 2244.575872] direct_splice_actor+0x10f/0x170 [ 2244.576408] splice_direct_to_actor+0x387/0x980 [ 2244.576978] ? pipe_to_sendpage+0x380/0x380 [ 2244.577521] ? do_splice_to+0x160/0x160 [ 2244.578006] ? security_file_permission+0x24e/0x570 [ 2244.578618] do_splice_direct+0x1c4/0x290 [ 2244.579134] ? splice_direct_to_actor+0x980/0x980 [ 2244.579745] ? selinux_file_permission+0x36/0x510 [ 2244.580330] ? security_file_permission+0x24e/0x570 [ 2244.580935] vfs_copy_file_range+0x57b/0x10f0 [ 2244.581503] ? generic_file_rw_checks+0x240/0x240 [ 2244.582081] ? __fget_files+0x296/0x480 [ 2244.582572] __do_sys_copy_file_range+0x176/0x420 [ 2244.583150] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2244.583708] ? ksys_write+0x1a9/0x260 [ 2244.584170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2244.584792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2244.585447] do_syscall_64+0x33/0x40 [ 2244.585890] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2244.586544] RIP: 0033:0x7f9dba2a1b19 [ 2244.586990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2244.589150] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2244.590071] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2244.590913] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2244.591755] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 08:05:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xcf00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2244.592594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2244.593489] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:05:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 26) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc200) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2261.620836] FAULT_INJECTION: forcing a failure. [ 2261.620836] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.622726] CPU: 0 PID: 13753 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2261.623657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.624770] Call Trace: [ 2261.625128] dump_stack+0x107/0x167 [ 2261.625624] should_fail.cold+0x5/0xa [ 2261.626134] ? create_object.isra.0+0x3a/0xa20 [ 2261.626740] should_failslab+0x5/0x20 [ 2261.627242] kmem_cache_alloc+0x5b/0x360 [ 2261.627779] create_object.isra.0+0x3a/0xa20 [ 2261.628381] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2261.629044] kmem_cache_alloc+0x159/0x360 [ 2261.629616] alloc_buffer_head+0x20/0x110 [ 2261.630167] alloc_page_buffers+0x14d/0x6d0 [ 2261.630740] create_empty_buffers+0x2c/0x640 [ 2261.631356] create_page_buffers+0x1bb/0x230 [ 2261.631931] __block_write_begin_int+0x1d1/0x19c0 [ 2261.632611] ? fat_add_cluster+0x100/0x100 [ 2261.633168] ? add_to_page_cache_locked+0x40/0x40 [ 2261.633814] ? __page_cache_alloc+0x10d/0x360 [ 2261.634403] ? remove_inode_buffers+0x300/0x300 [ 2261.635010] ? pagecache_get_page+0x243/0xc80 [ 2261.635597] ? unlock_page_memcg+0x96/0x160 [ 2261.636157] ? wait_for_stable_page+0x92/0xe0 [ 2261.636780] cont_write_begin+0x466/0x970 [ 2261.637336] ? fat_add_cluster+0x100/0x100 [ 2261.637925] ? nobh_write_begin+0xed0/0xed0 [ 2261.638492] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2261.639150] ? generic_write_end+0x20e/0x3f0 [ 2261.639773] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2261.640444] fat_write_begin+0x89/0x180 [ 2261.640965] ? fat_add_cluster+0x100/0x100 [ 2261.641530] generic_perform_write+0x1fe/0x4e0 [ 2261.642155] ? fat_direct_IO+0x1ef/0x380 [ 2261.642724] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2261.643671] ? generic_file_direct_write+0x368/0x560 [ 2261.644324] __generic_file_write_iter+0x2cd/0x5d0 [ 2261.644967] generic_file_write_iter+0xdb/0x230 [ 2261.645590] do_iter_readv_writev+0x476/0x750 [ 2261.646190] ? new_sync_write+0x660/0x660 [ 2261.646755] ? selinux_file_permission+0x36/0x510 [ 2261.647445] do_iter_write+0x191/0x670 [ 2261.647981] vfs_iter_write+0x70/0xa0 [ 2261.648487] iter_file_splice_write+0x721/0xbe0 [ 2261.649114] ? generic_splice_sendpage+0x140/0x140 [ 2261.653693] ? avc_policy_seqno+0x9/0x70 [ 2261.654219] ? selinux_file_permission+0x36/0x510 [ 2261.654896] ? lockdep_init_map_type+0x2c7/0x780 [ 2261.655514] ? generic_splice_sendpage+0x140/0x140 [ 2261.656152] direct_splice_actor+0x10f/0x170 [ 2261.656722] splice_direct_to_actor+0x387/0x980 [ 2261.657353] ? pipe_to_sendpage+0x380/0x380 [ 2261.657946] ? do_splice_to+0x160/0x160 [ 2261.658513] ? security_file_permission+0x24e/0x570 [ 2261.659177] do_splice_direct+0x1c4/0x290 [ 2261.659720] ? splice_direct_to_actor+0x980/0x980 [ 2261.660349] ? selinux_file_permission+0x36/0x510 [ 2261.660983] ? security_file_permission+0x24e/0x570 [ 2261.661727] vfs_copy_file_range+0x57b/0x10f0 [ 2261.662311] ? generic_file_rw_checks+0x240/0x240 [ 2261.662946] ? __fget_files+0x296/0x480 [ 2261.663470] __do_sys_copy_file_range+0x176/0x420 [ 2261.664101] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2261.664736] ? ksys_write+0x1a9/0x260 [ 2261.665229] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2261.665946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2261.666624] do_syscall_64+0x33/0x40 [ 2261.667112] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2261.667783] RIP: 0033:0x7f9dba2a1b19 [ 2261.668246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.670648] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2261.671619] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2261.672560] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 08:05:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2261.673505] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2261.674455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:05:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x91) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2261.675378] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:05:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 27) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:05:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd200) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:05:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2262.059844] FAULT_INJECTION: forcing a failure. [ 2262.059844] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.062181] CPU: 0 PID: 13781 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2262.063201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2262.064428] Call Trace: [ 2262.064790] dump_stack+0x107/0x167 [ 2262.065274] should_fail.cold+0x5/0xa [ 2262.066690] ? create_object.isra.0+0x3a/0xa20 [ 2262.067378] should_failslab+0x5/0x20 [ 2262.067880] kmem_cache_alloc+0x5b/0x360 [ 2262.068505] ? quarantine_put+0x8b/0x1a0 [ 2262.069036] create_object.isra.0+0x3a/0xa20 [ 2262.069686] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2262.070471] kmem_cache_alloc+0x159/0x360 [ 2262.071024] ? mempool_free_pages+0x20/0x20 [ 2262.071719] mempool_alloc+0x148/0x360 [ 2262.072241] ? mempool_resize+0x7d0/0x7d0 [ 2262.072844] ? lock_downgrade+0x6d0/0x6d0 [ 2262.073468] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2262.074161] bio_alloc_bioset+0x36e/0x600 [ 2262.074796] ? bvec_alloc+0x2f0/0x2f0 [ 2262.075417] ? iov_iter_npages+0x1fd/0xa70 [ 2262.075980] iomap_dio_bio_actor+0x518/0xef0 [ 2262.076625] iomap_dio_actor+0x36f/0x560 [ 2262.077167] iomap_apply+0x282/0x9e0 [ 2262.078566] ? iomap_dio_rw+0x90/0x90 [ 2262.079077] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2262.079935] ? mark_held_locks+0x9e/0xe0 [ 2262.080542] ? filemap_check_errors+0xa5/0x150 [ 2262.081176] __iomap_dio_rw+0x6cd/0x11a0 [ 2262.081778] ? iomap_dio_rw+0x90/0x90 [ 2262.082436] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2262.083041] ? ext4_orphan_add+0x253/0x9e0 [ 2262.083664] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2262.084367] ? ext4_empty_dir+0xa20/0xa20 [ 2262.084921] ? jbd2__journal_start+0xf3/0x890 [ 2262.086447] iomap_dio_rw+0x31/0x90 [ 2262.086941] ext4_file_write_iter+0xab3/0x1890 [ 2262.087613] ? stack_trace_consume_entry+0x160/0x160 [ 2262.088373] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2262.088980] ? kasan_save_stack+0x32/0x40 [ 2262.089637] ? kasan_save_stack+0x1b/0x40 [ 2262.090187] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2262.090937] ? iter_file_splice_write+0x16d/0xbe0 [ 2262.091630] ? direct_splice_actor+0x10f/0x170 [ 2262.092253] ? splice_direct_to_actor+0x387/0x980 [ 2262.092928] ? do_splice_direct+0x1c4/0x290 [ 2262.093603] ? vfs_copy_file_range+0x57b/0x10f0 [ 2262.094235] ? __do_sys_copy_file_range+0x176/0x420 [ 2262.094986] do_iter_readv_writev+0x476/0x750 [ 2262.095675] ? new_sync_write+0x660/0x660 [ 2262.096228] ? selinux_file_permission+0x36/0x510 [ 2262.096936] do_iter_write+0x191/0x670 [ 2262.097517] vfs_iter_write+0x70/0xa0 [ 2262.102076] iter_file_splice_write+0x721/0xbe0 [ 2262.102665] ? generic_splice_sendpage+0x140/0x140 [ 2262.103306] ? avc_policy_seqno+0x9/0x70 [ 2262.103809] ? selinux_file_permission+0x36/0x510 [ 2262.104449] ? lockdep_init_map_type+0x2c7/0x780 [ 2262.105027] ? generic_splice_sendpage+0x140/0x140 [ 2262.105636] direct_splice_actor+0x10f/0x170 [ 2262.106230] splice_direct_to_actor+0x387/0x980 [ 2262.106829] ? pipe_to_sendpage+0x380/0x380 [ 2262.107437] ? do_splice_to+0x160/0x160 [ 2262.107953] ? security_file_permission+0x24e/0x570 [ 2262.108603] do_splice_direct+0x1c4/0x290 [ 2262.109130] ? splice_direct_to_actor+0x980/0x980 [ 2262.113820] ? selinux_file_permission+0x36/0x510 [ 2262.114482] ? security_file_permission+0x24e/0x570 [ 2262.115141] vfs_copy_file_range+0x57b/0x10f0 [ 2262.115769] ? generic_file_rw_checks+0x240/0x240 [ 2262.116398] ? __fget_files+0x296/0x480 [ 2262.116930] __do_sys_copy_file_range+0x176/0x420 [ 2262.117570] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2262.118241] ? ksys_write+0x1a9/0x260 [ 2262.118743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2262.119463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2262.120133] do_syscall_64+0x33/0x40 [ 2262.120619] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2262.121310] RIP: 0033:0x7f9dba2a1b19 [ 2262.121823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2262.124181] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2262.125179] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2262.126157] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000003 [ 2262.127110] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2262.128021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2262.128930] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 28) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x92) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc400) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c73"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xd400) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xda01) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2278.719334] FAULT_INJECTION: forcing a failure. [ 2278.719334] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.721404] CPU: 1 PID: 13816 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2278.723788] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2278.724869] Call Trace: [ 2278.725318] dump_stack+0x107/0x167 [ 2278.725794] should_fail.cold+0x5/0xa [ 2278.730426] ? create_object.isra.0+0x3a/0xa20 [ 2278.731122] should_failslab+0x5/0x20 [ 2278.731612] kmem_cache_alloc+0x5b/0x360 [ 2278.732189] create_object.isra.0+0x3a/0xa20 [ 2278.732773] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2278.733528] kmem_cache_alloc+0x159/0x360 [ 2278.734174] alloc_buffer_head+0x20/0x110 [ 2278.734701] alloc_page_buffers+0x14d/0x6d0 [ 2278.735319] create_empty_buffers+0x2c/0x640 [ 2278.735884] create_page_buffers+0x1bb/0x230 [ 2278.736532] __block_write_begin_int+0x1d1/0x19c0 [ 2278.737290] ? fat_add_cluster+0x100/0x100 [ 2278.737881] ? add_to_page_cache_locked+0x40/0x40 [ 2278.738538] ? __page_cache_alloc+0x10d/0x360 [ 2278.739172] ? remove_inode_buffers+0x300/0x300 [ 2278.739794] ? pagecache_get_page+0x243/0xc80 [ 2278.740422] ? unlock_page_memcg+0x96/0x160 [ 2278.741021] ? wait_for_stable_page+0x92/0xe0 [ 2278.741695] cont_write_begin+0x466/0x970 [ 2278.742317] ? fat_add_cluster+0x100/0x100 [ 2278.742856] ? nobh_write_begin+0xed0/0xed0 [ 2278.743486] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2278.744190] ? generic_write_end+0x20e/0x3f0 [ 2278.744797] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2278.745547] fat_write_begin+0x89/0x180 [ 2278.746135] ? fat_add_cluster+0x100/0x100 [ 2278.746719] generic_perform_write+0x1fe/0x4e0 [ 2278.747370] ? fat_direct_IO+0x1ef/0x380 [ 2278.747938] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2278.748904] ? generic_file_direct_write+0x368/0x560 [ 2278.749667] __generic_file_write_iter+0x2cd/0x5d0 [ 2278.750370] generic_file_write_iter+0xdb/0x230 [ 2278.750998] do_iter_readv_writev+0x476/0x750 [ 2278.751666] ? new_sync_write+0x660/0x660 [ 2278.752256] ? selinux_file_permission+0x36/0x510 [ 2278.752874] do_iter_write+0x191/0x670 [ 2278.753493] vfs_iter_write+0x70/0xa0 [ 2278.754019] iter_file_splice_write+0x721/0xbe0 [ 2278.754725] ? generic_splice_sendpage+0x140/0x140 [ 2278.755415] ? avc_policy_seqno+0x9/0x70 [ 2278.755933] ? selinux_file_permission+0x36/0x510 [ 2278.756614] ? lockdep_init_map_type+0x2c7/0x780 [ 2278.757328] ? generic_splice_sendpage+0x140/0x140 [ 2278.757992] direct_splice_actor+0x10f/0x170 [ 2278.758677] splice_direct_to_actor+0x387/0x980 [ 2278.759341] ? pipe_to_sendpage+0x380/0x380 [ 2278.759895] ? do_splice_to+0x160/0x160 [ 2278.760463] ? security_file_permission+0x24e/0x570 [ 2278.761221] do_splice_direct+0x1c4/0x290 [ 2278.761776] ? splice_direct_to_actor+0x980/0x980 [ 2278.762454] ? selinux_file_permission+0x36/0x510 [ 2278.763131] ? security_file_permission+0x24e/0x570 [ 2278.763767] vfs_copy_file_range+0x57b/0x10f0 [ 2278.764395] ? generic_file_rw_checks+0x240/0x240 [ 2278.765041] ? __fget_files+0x296/0x480 [ 2278.765720] __do_sys_copy_file_range+0x176/0x420 [ 2278.766427] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2278.767026] ? ksys_write+0x1a9/0x260 [ 2278.767611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2278.768309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2278.769013] do_syscall_64+0x33/0x40 [ 2278.769592] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2278.774439] RIP: 0033:0x7f9dba2a1b19 [ 2278.774942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2278.777476] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2278.778516] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2278.779569] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2278.780511] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 08:06:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2278.781495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2278.782466] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x93) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000200)=@secondary) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000340)=""/131, 0x83) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r5, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000500)=@keyring) add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000500)=@keyring) r6 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='&#):\xceZ\x00', r3) r7 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r7, 0x1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) 08:06:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xda01) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xefff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 29) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000200)=@secondary) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000340)=""/131, 0x83) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r1, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r5, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000500)=@keyring) add_key$keyring(&(0x7f0000000280), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r5) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000500)=@keyring) r6 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='&#):\xceZ\x00', r3) r7 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r4, r6, r7, 0x1) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) 08:06:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x94) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(0x0, 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(0x0, 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2295.520606] FAULT_INJECTION: forcing a failure. [ 2295.520606] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.522442] CPU: 1 PID: 13871 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2295.523315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2295.524391] Call Trace: [ 2295.524747] dump_stack+0x107/0x167 [ 2295.525216] should_fail.cold+0x5/0xa [ 2295.525709] ? fat_cache_add.part.0+0x3c6/0x5d0 [ 2295.526330] should_failslab+0x5/0x20 [ 2295.526821] kmem_cache_alloc+0x5b/0x360 [ 2295.527347] fat_cache_add.part.0+0x3c6/0x5d0 [ 2295.527928] fat_get_cluster+0x91e/0xd40 [ 2295.528460] ? fat_cache_inval_inode+0x290/0x290 [ 2295.529119] fat_get_mapped_cluster+0x212/0x440 [ 2295.529721] ? fat_get_cluster+0xd40/0xd40 [ 2295.530331] ? perf_trace_lock+0xac/0x490 [ 2295.530875] fat_bmap+0x1f8/0x460 [ 2295.531351] fat_get_block+0x33a/0x940 [ 2295.531857] ? fat_add_cluster+0x100/0x100 [ 2295.532412] ? create_empty_buffers+0x4a3/0x640 [ 2295.533003] ? create_page_buffers+0x139/0x230 [ 2295.533609] __block_write_begin_int+0x3d1/0x19c0 [ 2295.534280] ? fat_add_cluster+0x100/0x100 [ 2295.534826] ? remove_inode_buffers+0x300/0x300 [ 2295.535412] ? pagecache_get_page+0x243/0xc80 [ 2295.535985] ? unlock_page_memcg+0x96/0x160 [ 2295.536521] ? wait_for_stable_page+0x92/0xe0 [ 2295.537098] cont_write_begin+0x466/0x970 [ 2295.537635] ? fat_add_cluster+0x100/0x100 [ 2295.538195] ? nobh_write_begin+0xed0/0xed0 [ 2295.538739] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2295.539389] ? generic_write_end+0x20e/0x3f0 [ 2295.539944] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2295.540631] fat_write_begin+0x89/0x180 [ 2295.541130] ? fat_add_cluster+0x100/0x100 [ 2295.541682] generic_perform_write+0x1fe/0x4e0 [ 2295.542291] ? fat_direct_IO+0x1ef/0x380 [ 2295.542810] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2295.543729] ? generic_file_direct_write+0x368/0x560 [ 2295.544374] __generic_file_write_iter+0x2cd/0x5d0 [ 2295.545007] generic_file_write_iter+0xdb/0x230 [ 2295.545644] do_iter_readv_writev+0x476/0x750 [ 2295.546256] ? new_sync_write+0x660/0x660 [ 2295.546814] ? selinux_file_permission+0x36/0x510 [ 2295.547445] do_iter_write+0x191/0x670 [ 2295.547967] vfs_iter_write+0x70/0xa0 [ 2295.548447] iter_file_splice_write+0x721/0xbe0 [ 2295.549062] ? generic_splice_sendpage+0x140/0x140 [ 2295.549689] ? avc_policy_seqno+0x9/0x70 [ 2295.550235] ? selinux_file_permission+0x36/0x510 [ 2295.550844] ? lockdep_init_map_type+0x2c7/0x780 [ 2295.551478] ? generic_splice_sendpage+0x140/0x140 [ 2295.552092] direct_splice_actor+0x10f/0x170 [ 2295.552703] splice_direct_to_actor+0x387/0x980 [ 2295.553333] ? pipe_to_sendpage+0x380/0x380 [ 2295.553893] ? do_splice_to+0x160/0x160 [ 2295.554441] ? security_file_permission+0x24e/0x570 [ 2295.555135] do_splice_direct+0x1c4/0x290 [ 2295.555692] ? splice_direct_to_actor+0x980/0x980 [ 2295.556347] ? selinux_file_permission+0x36/0x510 [ 2295.556953] ? security_file_permission+0x24e/0x570 [ 2295.557665] vfs_copy_file_range+0x57b/0x10f0 [ 2295.558266] ? generic_file_rw_checks+0x240/0x240 [ 2295.558890] ? __fget_files+0x296/0x480 [ 2295.559396] __do_sys_copy_file_range+0x176/0x420 [ 2295.559989] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2295.560582] ? ksys_write+0x1a9/0x260 [ 2295.561088] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2295.561776] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2295.562486] do_syscall_64+0x33/0x40 [ 2295.562961] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2295.563627] RIP: 0033:0x7f9dba2a1b19 [ 2295.564096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2295.566469] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2295.567473] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2295.568378] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2295.569289] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2295.570209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2295.571103] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:24 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(0x0, 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1da) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xf60f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 30) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, r1) inotify_rm_watch(r0, r1) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="232166696c650016400000"], 0xb) pwrite64(r0, &(0x7f00000000c0)="07a7549495ab7d6a46a7a417ec3a399efe79d84235458b58f904cad7f2e45ce3830895a80c821dfc477ab9705b0cd5cc1fb372daace411733f5b02ad6f9f77ff21e5bcbacfd328e67137b195889565562343d4df041943a39f00000000000000", 0x60, 0x10000) fallocate(r0, 0x3, 0x0, 0x18000) 08:06:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xefff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xfe00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:06:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2312.028405] FAULT_INJECTION: forcing a failure. [ 2312.028405] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.030243] CPU: 0 PID: 13926 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2312.031164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.032210] Call Trace: [ 2312.032564] dump_stack+0x107/0x167 [ 2312.033038] should_fail.cold+0x5/0xa [ 2312.033569] ? create_object.isra.0+0x3a/0xa20 [ 2312.034156] should_failslab+0x5/0x20 [ 2312.034675] kmem_cache_alloc+0x5b/0x360 [ 2312.035225] create_object.isra.0+0x3a/0xa20 [ 2312.035807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.036511] kmem_cache_alloc+0x159/0x360 [ 2312.037063] fat_cache_add.part.0+0x3c6/0x5d0 [ 2312.037651] fat_get_cluster+0x91e/0xd40 [ 2312.038248] ? fat_cache_inval_inode+0x290/0x290 [ 2312.038905] fat_get_mapped_cluster+0x212/0x440 [ 2312.039556] ? fat_get_cluster+0xd40/0xd40 [ 2312.040103] ? perf_trace_lock+0xac/0x490 [ 2312.040661] fat_bmap+0x1f8/0x460 [ 2312.041126] fat_get_block+0x33a/0x940 [ 2312.041651] ? fat_add_cluster+0x100/0x100 [ 2312.046360] ? create_empty_buffers+0x4a3/0x640 [ 2312.046968] ? create_page_buffers+0x139/0x230 [ 2312.047569] __block_write_begin_int+0x3d1/0x19c0 [ 2312.048195] ? fat_add_cluster+0x100/0x100 [ 2312.048804] ? remove_inode_buffers+0x300/0x300 [ 2312.049413] ? pagecache_get_page+0x243/0xc80 [ 2312.049994] ? unlock_page_memcg+0x96/0x160 [ 2312.050587] ? wait_for_stable_page+0x92/0xe0 [ 2312.051172] cont_write_begin+0x466/0x970 [ 2312.051773] ? fat_add_cluster+0x100/0x100 [ 2312.052327] ? nobh_write_begin+0xed0/0xed0 [ 2312.052886] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2312.053576] ? generic_write_end+0x20e/0x3f0 [ 2312.054148] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2312.054875] fat_write_begin+0x89/0x180 [ 2312.055395] ? fat_add_cluster+0x100/0x100 [ 2312.055956] generic_perform_write+0x1fe/0x4e0 [ 2312.056562] ? fat_direct_IO+0x1ef/0x380 [ 2312.057090] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2312.058057] ? generic_file_direct_write+0x368/0x560 [ 2312.058763] __generic_file_write_iter+0x2cd/0x5d0 [ 2312.059419] generic_file_write_iter+0xdb/0x230 [ 2312.060037] do_iter_readv_writev+0x476/0x750 [ 2312.060624] ? new_sync_write+0x660/0x660 [ 2312.061164] ? selinux_file_permission+0x36/0x510 [ 2312.061812] do_iter_write+0x191/0x670 [ 2312.062364] vfs_iter_write+0x70/0xa0 [ 2312.062865] iter_file_splice_write+0x721/0xbe0 [ 2312.063533] ? generic_splice_sendpage+0x140/0x140 [ 2312.064175] ? avc_policy_seqno+0x9/0x70 [ 2312.064725] ? selinux_file_permission+0x36/0x510 [ 2312.065361] ? lockdep_init_map_type+0x2c7/0x780 [ 2312.065984] ? generic_splice_sendpage+0x140/0x140 [ 2312.070726] direct_splice_actor+0x10f/0x170 [ 2312.071319] splice_direct_to_actor+0x387/0x980 [ 2312.071955] ? pipe_to_sendpage+0x380/0x380 [ 2312.072532] ? do_splice_to+0x160/0x160 [ 2312.073060] ? security_file_permission+0x24e/0x570 [ 2312.073757] do_splice_direct+0x1c4/0x290 [ 2312.074381] ? splice_direct_to_actor+0x980/0x980 [ 2312.075045] ? selinux_file_permission+0x36/0x510 [ 2312.075695] ? security_file_permission+0x24e/0x570 [ 2312.076409] vfs_copy_file_range+0x57b/0x10f0 [ 2312.077009] ? generic_file_rw_checks+0x240/0x240 [ 2312.077694] ? __fget_files+0x296/0x480 [ 2312.082322] __do_sys_copy_file_range+0x176/0x420 [ 2312.082990] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2312.083665] ? ksys_write+0x1a9/0x260 [ 2312.084190] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2312.084899] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.085622] do_syscall_64+0x33/0x40 [ 2312.086126] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2312.086871] RIP: 0033:0x7f9dba2a1b19 [ 2312.087374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.089854] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2312.090887] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2312.091857] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2312.092834] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2312.093778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2312.098820] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:41 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x507, 0x6, 0x6}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 08:06:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xff00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x500) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) 08:06:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xf60f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:41 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 31) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2312.382518] FAULT_INJECTION: forcing a failure. [ 2312.382518] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.388279] CPU: 0 PID: 13963 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2312.389160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.390232] Call Trace: [ 2312.390596] dump_stack+0x107/0x167 [ 2312.391084] should_fail.cold+0x5/0xa [ 2312.391593] ? create_object.isra.0+0x3a/0xa20 [ 2312.392194] should_failslab+0x5/0x20 [ 2312.392687] kmem_cache_alloc+0x5b/0x360 [ 2312.393213] create_object.isra.0+0x3a/0xa20 [ 2312.393784] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.398327] kmem_cache_alloc+0x159/0x360 [ 2312.398889] fat_cache_add.part.0+0x3c6/0x5d0 [ 2312.399495] fat_get_cluster+0x91e/0xd40 [ 2312.400051] ? fat_cache_inval_inode+0x290/0x290 [ 2312.400710] fat_get_mapped_cluster+0x212/0x440 [ 2312.401329] ? fat_get_cluster+0xd40/0xd40 [ 2312.401897] ? perf_trace_lock+0xac/0x490 [ 2312.402489] fat_bmap+0x1f8/0x460 [ 2312.402980] fat_get_block+0x33a/0x940 [ 2312.403527] ? fat_add_cluster+0x100/0x100 [ 2312.404095] ? create_empty_buffers+0x4a3/0x640 [ 2312.404719] ? create_page_buffers+0x139/0x230 [ 2312.405335] __block_write_begin_int+0x3d1/0x19c0 [ 2312.405983] ? fat_add_cluster+0x100/0x100 [ 2312.406584] ? remove_inode_buffers+0x300/0x300 [ 2312.407206] ? pagecache_get_page+0x243/0xc80 [ 2312.407806] ? unlock_page_memcg+0x96/0x160 [ 2312.408387] ? wait_for_stable_page+0x92/0xe0 [ 2312.408988] cont_write_begin+0x466/0x970 [ 2312.409560] ? fat_add_cluster+0x100/0x100 [ 2312.410125] ? nobh_write_begin+0xed0/0xed0 [ 2312.410710] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2312.411353] ? generic_write_end+0x20e/0x3f0 [ 2312.411912] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2312.412558] fat_write_begin+0x89/0x180 [ 2312.413054] ? fat_add_cluster+0x100/0x100 [ 2312.413570] generic_perform_write+0x1fe/0x4e0 [ 2312.414159] ? fat_direct_IO+0x1ef/0x380 [ 2312.414712] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2312.415633] ? generic_file_direct_write+0x368/0x560 [ 2312.416300] __generic_file_write_iter+0x2cd/0x5d0 [ 2312.416933] generic_file_write_iter+0xdb/0x230 [ 2312.417539] do_iter_readv_writev+0x476/0x750 [ 2312.418122] ? new_sync_write+0x660/0x660 [ 2312.418690] ? selinux_file_permission+0x36/0x510 [ 2312.419326] do_iter_write+0x191/0x670 [ 2312.419849] vfs_iter_write+0x70/0xa0 [ 2312.420349] iter_file_splice_write+0x721/0xbe0 [ 2312.420963] ? generic_splice_sendpage+0x140/0x140 [ 2312.421600] ? avc_policy_seqno+0x9/0x70 [ 2312.422115] ? selinux_file_permission+0x36/0x510 [ 2312.422761] ? lockdep_init_map_type+0x2c7/0x780 [ 2312.423371] ? generic_splice_sendpage+0x140/0x140 [ 2312.423999] direct_splice_actor+0x10f/0x170 [ 2312.424570] splice_direct_to_actor+0x387/0x980 [ 2312.425173] ? pipe_to_sendpage+0x380/0x380 [ 2312.425732] ? do_splice_to+0x160/0x160 [ 2312.426257] ? security_file_permission+0x24e/0x570 [ 2312.426910] do_splice_direct+0x1c4/0x290 [ 2312.427459] ? splice_direct_to_actor+0x980/0x980 [ 2312.428096] ? selinux_file_permission+0x36/0x510 [ 2312.428740] ? security_file_permission+0x24e/0x570 [ 2312.429415] vfs_copy_file_range+0x57b/0x10f0 [ 2312.430040] ? generic_file_rw_checks+0x240/0x240 [ 2312.430749] ? __fget_files+0x296/0x480 [ 2312.431341] __do_sys_copy_file_range+0x176/0x420 [ 2312.431983] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2312.432660] ? ksys_write+0x1a9/0x260 [ 2312.433182] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2312.433886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2312.434600] do_syscall_64+0x33/0x40 [ 2312.435105] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2312.435788] RIP: 0033:0x7f9dba2a1b19 [ 2312.436323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.438774] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2312.439739] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2312.440638] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2312.441525] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2312.442465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2312.443378] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xff0f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x600) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x3f, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x1e}, 0x1c) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) setpriority(0x1, r2, 0x80) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r2) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x128c805111ea4ffa) r3 = gettid() process_vm_readv(r3, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) recvfrom$inet6(r0, &(0x7f0000000100)=""/73, 0x49, 0xaf35b2cb7ab6fa36, &(0x7f0000000040)={0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0xe34e, 0x0, 0x0, 0x6b4) 08:06:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) 08:06:57 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 32) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xff0f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(0xffffffffffffffff, 0x4) [ 2328.908871] FAULT_INJECTION: forcing a failure. [ 2328.908871] name failslab, interval 1, probability 0, space 0, times 0 [ 2328.910541] CPU: 1 PID: 13981 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2328.911421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2328.912498] Call Trace: [ 2328.912847] dump_stack+0x107/0x167 [ 2328.913279] should_fail.cold+0x5/0xa [ 2328.913754] ? create_object.isra.0+0x3a/0xa20 [ 2328.914336] should_failslab+0x5/0x20 [ 2328.914918] kmem_cache_alloc+0x5b/0x360 [ 2328.915447] create_object.isra.0+0x3a/0xa20 [ 2328.916011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2328.916658] kmem_cache_alloc+0x159/0x360 [ 2328.917204] alloc_buffer_head+0x20/0x110 [ 2328.917742] alloc_page_buffers+0x14d/0x6d0 [ 2328.918306] create_empty_buffers+0x2c/0x640 [ 2328.918912] create_page_buffers+0x1bb/0x230 [ 2328.919488] __block_write_begin_int+0x1d1/0x19c0 [ 2328.920117] ? fat_add_cluster+0x100/0x100 [ 2328.920665] ? add_to_page_cache_locked+0x40/0x40 [ 2328.921291] ? __page_cache_alloc+0x10d/0x360 [ 2328.921861] ? remove_inode_buffers+0x300/0x300 [ 2328.922489] ? pagecache_get_page+0x243/0xc80 [ 2328.923070] ? unlock_page_memcg+0x96/0x160 [ 2328.923628] ? wait_for_stable_page+0x92/0xe0 [ 2328.924208] cont_write_begin+0x466/0x970 [ 2328.924757] ? fat_add_cluster+0x100/0x100 [ 2328.925306] ? nobh_write_begin+0xed0/0xed0 [ 2328.925865] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2328.926551] ? generic_write_end+0x20e/0x3f0 [ 2328.927110] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2328.927770] fat_write_begin+0x89/0x180 [ 2328.928284] ? fat_add_cluster+0x100/0x100 [ 2328.928834] generic_perform_write+0x1fe/0x4e0 [ 2328.929430] ? fat_direct_IO+0x1ef/0x380 [ 2328.929961] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2328.930914] ? generic_file_direct_write+0x368/0x560 [ 2328.931586] __generic_file_write_iter+0x2cd/0x5d0 [ 2328.932222] generic_file_write_iter+0xdb/0x230 [ 2328.932830] do_iter_readv_writev+0x476/0x750 [ 2328.933418] ? new_sync_write+0x660/0x660 [ 2328.933955] ? selinux_file_permission+0x36/0x510 [ 2328.934668] do_iter_write+0x191/0x670 [ 2328.935190] vfs_iter_write+0x70/0xa0 [ 2328.935683] iter_file_splice_write+0x721/0xbe0 [ 2328.936304] ? generic_splice_sendpage+0x140/0x140 [ 2328.936941] ? avc_policy_seqno+0x9/0x70 [ 2328.937467] ? selinux_file_permission+0x36/0x510 [ 2328.938096] ? lockdep_init_map_type+0x2c7/0x780 [ 2328.938732] ? generic_splice_sendpage+0x140/0x140 [ 2328.939349] direct_splice_actor+0x10f/0x170 [ 2328.939914] splice_direct_to_actor+0x387/0x980 [ 2328.940509] ? pipe_to_sendpage+0x380/0x380 [ 2328.941055] ? do_splice_to+0x160/0x160 [ 2328.941568] ? security_file_permission+0x24e/0x570 [ 2328.942210] do_splice_direct+0x1c4/0x290 [ 2328.942762] ? splice_direct_to_actor+0x980/0x980 [ 2328.943370] ? selinux_file_permission+0x36/0x510 [ 2328.943988] ? security_file_permission+0x24e/0x570 [ 2328.944634] vfs_copy_file_range+0x57b/0x10f0 [ 2328.945208] ? generic_file_rw_checks+0x240/0x240 [ 2328.945824] ? __fget_files+0x296/0x480 [ 2328.946338] __do_sys_copy_file_range+0x176/0x420 [ 2328.946994] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2328.947603] ? ksys_write+0x1a9/0x260 [ 2328.948111] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2328.948789] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2328.949452] do_syscall_64+0x33/0x40 [ 2328.949942] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2328.950619] RIP: 0033:0x7f9dba2a1b19 [ 2328.951112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2328.953427] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2328.954417] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2328.955334] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2328.956233] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2328.957145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2328.958054] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xffef) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x700) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xffef) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x0) 08:06:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 33) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000000c0), 0x0, 0x81, 0x1, &(0x7f00000012c0)=[{&(0x7f00000001c0)="89dc41deec8f961bb93ac0b665ec5a333605d6dd03b5fd9d13a0cda74b7f0cc1f6ef5355a186e0b471d23565522746341d2f54ca101935d95fb6a46bd66566552a20f1cd178edf2cdb9605005c27007eff34f2c55811a3060244ff070000000000001c429823bb9550a5ad4af3c9790c3803b58c388dea32bb1679dfa323eb2688ac4a24b51f914481567d1004ff7fb13c5bd27a9f7b40f5e9999528cd248f4d17e3af3309245790fa120dfe045621bee255bdf37fda116badde7b9d832cdac414c49904d219207f90f44742a20b28e293af467a450a8812581c3c3eca", 0xdd, 0xeb}], 0x1880024, &(0x7f0000001500)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200001, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES64]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48}, 0x0, 0x3, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x2e) ftruncate(0xffffffffffffffff, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r2, 0x1) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)={0x800005}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket(0x22, 0x4, 0x7) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000001480), &(0x7f00000014c0)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x402002, 0x0) getdents(r4, &(0x7f0000000780)=""/232, 0xe8) 08:06:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x0) 08:06:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1517f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1517f) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2329.390747] FAULT_INJECTION: forcing a failure. [ 2329.390747] name failslab, interval 1, probability 0, space 0, times 0 [ 2329.392298] CPU: 1 PID: 14027 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2329.393147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2329.394159] Call Trace: [ 2329.394519] dump_stack+0x107/0x167 [ 2329.394982] should_fail.cold+0x5/0xa [ 2329.395462] ? create_object.isra.0+0x3a/0xa20 [ 2329.396030] should_failslab+0x5/0x20 [ 2329.396505] kmem_cache_alloc+0x5b/0x360 [ 2329.397014] create_object.isra.0+0x3a/0xa20 [ 2329.397548] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2329.398222] kmem_cache_alloc+0x159/0x360 [ 2329.398765] alloc_buffer_head+0x20/0x110 [ 2329.399279] alloc_page_buffers+0x14d/0x6d0 [ 2329.399817] create_empty_buffers+0x2c/0x640 [ 2329.400369] create_page_buffers+0x1bb/0x230 [ 2329.400911] __block_write_begin_int+0x1d1/0x19c0 [ 2329.401512] ? fat_add_cluster+0x100/0x100 [ 2329.402036] ? add_to_page_cache_locked+0x40/0x40 [ 2329.402649] ? __page_cache_alloc+0x10d/0x360 [ 2329.403208] ? remove_inode_buffers+0x300/0x300 [ 2329.403782] ? pagecache_get_page+0x243/0xc80 [ 2329.404333] ? unlock_page_memcg+0x96/0x160 [ 2329.404868] ? wait_for_stable_page+0x92/0xe0 [ 2329.405453] cont_write_begin+0x466/0x970 [ 2329.405969] ? fat_add_cluster+0x100/0x100 [ 2329.406523] ? nobh_write_begin+0xed0/0xed0 [ 2329.407054] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2329.407673] ? generic_write_end+0x20e/0x3f0 [ 2329.408214] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2329.408840] fat_write_begin+0x89/0x180 [ 2329.409328] ? fat_add_cluster+0x100/0x100 [ 2329.409855] generic_perform_write+0x1fe/0x4e0 [ 2329.410435] ? fat_direct_IO+0x1ef/0x380 [ 2329.410944] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2329.411827] ? generic_file_direct_write+0x368/0x560 [ 2329.412487] __generic_file_write_iter+0x2cd/0x5d0 [ 2329.413116] generic_file_write_iter+0xdb/0x230 [ 2329.413711] do_iter_readv_writev+0x476/0x750 [ 2329.414262] ? new_sync_write+0x660/0x660 [ 2329.414791] ? selinux_file_permission+0x36/0x510 [ 2329.415405] do_iter_write+0x191/0x670 [ 2329.415904] vfs_iter_write+0x70/0xa0 [ 2329.416379] iter_file_splice_write+0x721/0xbe0 [ 2329.416970] ? generic_splice_sendpage+0x140/0x140 [ 2329.417578] ? avc_policy_seqno+0x9/0x70 [ 2329.418079] ? selinux_file_permission+0x36/0x510 [ 2329.418790] ? lockdep_init_map_type+0x2c7/0x780 [ 2329.419523] ? generic_splice_sendpage+0x140/0x140 [ 2329.420277] direct_splice_actor+0x10f/0x170 [ 2329.420955] splice_direct_to_actor+0x387/0x980 [ 2329.421672] ? pipe_to_sendpage+0x380/0x380 [ 2329.422327] ? do_splice_to+0x160/0x160 [ 2329.422840] ? security_file_permission+0x24e/0x570 [ 2329.423463] do_splice_direct+0x1c4/0x290 [ 2329.423973] ? splice_direct_to_actor+0x980/0x980 [ 2329.424561] ? selinux_file_permission+0x36/0x510 [ 2329.425158] ? security_file_permission+0x24e/0x570 [ 2329.425777] vfs_copy_file_range+0x57b/0x10f0 [ 2329.426342] ? generic_file_rw_checks+0x240/0x240 [ 2329.426965] ? __fget_files+0x296/0x480 [ 2329.427479] __do_sys_copy_file_range+0x176/0x420 [ 2329.428079] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2329.428661] ? ksys_write+0x1a9/0x260 [ 2329.429140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2329.429787] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2329.430434] do_syscall_64+0x33/0x40 [ 2329.430899] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2329.431555] RIP: 0033:0x7f9dba2a1b19 [ 2329.432017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2329.434238] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2329.435179] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2329.436039] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2329.436900] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2329.437785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2329.438717] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:06:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x900) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x20000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x0) 08:06:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x20000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:06:58 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", ""]}, 0x14}}, 0x400c841) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic={0x1, 0x80}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000001c0)=""/197) r3 = openat(r2, &(0x7f00000002c0)='./file0\x00', 0x400, 0x8) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000300)=0x81) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000003c0)={'wlan0\x00'}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}]}, 0x20}}, 0x4000) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x44}, 0x1, 0x0, 0x0, 0x8c0}, 0x40) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000680)={{0x1, 0x1, 0x18, r1, {0x5, 0x1b3}}, './file0\x00'}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f00000006c0)) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000700), &(0x7f0000000740)=0x8) r6 = syz_genetlink_get_family_id$devlink(&(0x7f00000007c0), r3) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000a40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000800)={0x1f0, r6, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x5}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x1}, {0x8, 0xb, 0x4548}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7f1963dc}, {0x6, 0x16, 0x2}, {0x5}, {0x6, 0x11, 0x5}, {0x8, 0xb, 0x66f4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x69b}, {0x5}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x3ff}, {0x6, 0x16, 0x5}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x10000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x5}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3}, {0x8, 0xb, 0x1ff}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x80}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x5c}, {0x8, 0xb, 0x7ff}}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x40000}, 0x40001) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x70, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "37ba6d78420d33fbd62de589a8a16bd0"}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x58}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x50}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_PMKID={0x14, 0x55, "f3cdb191f02612e77201abcbf99f38c4"}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac}]}, 0x70}, 0x1, 0x0, 0x0, 0x4804}, 0x4000) ioctl$BTRFS_IOC_BALANCE_V2(r5, 0xc4009420, &(0x7f0000000fc0)={0x18, 0x5, {0x10000, @struct={0x390, 0x7}, 0x0, 0x400, 0x8, 0x1, 0x1ff, 0x5a, 0x400, @usage=0xffffffffffff8000, 0xfff, 0xbcb9, [0x4, 0x1, 0x3d6, 0x8, 0xfffffffffffff000, 0x4000000000]}, {0x80000001, @usage=0x3, 0x0, 0x800, 0x4f, 0x9, 0x7f, 0x3, 0x0, @struct={0xfff, 0x6}, 0x4, 0x2, [0xffffffffffffffff, 0x800000000000, 0x4, 0x7, 0x7fff, 0x200]}, {0x83a4, @struct={0x8001, 0x4}, 0x0, 0xffffffff, 0x9, 0x5, 0x3, 0x80, 0xc13bec3b64d7ab5e, @usage=0x1f, 0x0, 0x100, [0x100000000, 0x4, 0x0, 0xff, 0x80000001, 0x101]}, {0x6, 0xa61, 0x6}}) 08:07:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 34) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 1) 08:07:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0xc8000, 0x0) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040000}, 0x20000010) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a00290c000000180000d5cf7482fcd265a5e4212e6616ff0fdf000008003b81112e0000", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) 08:07:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x40000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x40000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2346.777803] FAULT_INJECTION: forcing a failure. [ 2346.777803] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.779834] CPU: 1 PID: 14088 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2346.780697] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.781714] Call Trace: [ 2346.782057] dump_stack+0x107/0x167 [ 2346.782519] should_fail.cold+0x5/0xa [ 2346.783423] ? jbd2__journal_start+0x190/0x890 [ 2346.784716] should_failslab+0x5/0x20 [ 2346.785785] kmem_cache_alloc+0x5b/0x360 [ 2346.786941] jbd2__journal_start+0x190/0x890 [ 2346.788213] __ext4_journal_start_sb+0x214/0x430 [ 2346.789483] ext4_setattr+0xe96/0x22c0 [ 2346.790580] ? current_time+0x1e6/0x2c0 [ 2346.791709] ? igrab+0xc0/0xc0 [ 2346.792625] ? ext4_journalled_write_end+0x1240/0x1240 [ 2346.794041] notify_change+0xba2/0x1080 [ 2346.795249] do_truncate+0x134/0x1f0 [ 2346.796342] ? file_open_root+0x440/0x440 [ 2346.797559] ? lock_release+0x6b0/0x6b0 [ 2346.798748] do_sys_ftruncate+0x4e2/0x830 [ 2346.799936] do_syscall_64+0x33/0x40 [ 2346.800980] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2346.802434] RIP: 0033:0x7fc401241b19 [ 2346.803501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.808666] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2346.810803] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2346.835912] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2346.837969] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2346.840221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2346.868203] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 [ 2346.870461] EXT4-fs error (device sda) in ext4_setattr:5585: Out of memory [ 2346.894441] FAULT_INJECTION: forcing a failure. [ 2346.894441] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.906342] CPU: 1 PID: 14107 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2346.907501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2346.908654] Call Trace: [ 2346.909037] dump_stack+0x107/0x167 [ 2346.909560] should_fail.cold+0x5/0xa [ 2346.910107] ? create_object.isra.0+0x3a/0xa20 [ 2346.910782] should_failslab+0x5/0x20 [ 2346.911332] kmem_cache_alloc+0x5b/0x360 [ 2346.911938] create_object.isra.0+0x3a/0xa20 [ 2346.912582] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2346.913307] kmem_cache_alloc+0x159/0x360 [ 2346.913900] alloc_buffer_head+0x20/0x110 [ 2346.914481] alloc_page_buffers+0x14d/0x6d0 [ 2346.915105] create_empty_buffers+0x2c/0x640 [ 2346.915717] create_page_buffers+0x1bb/0x230 [ 2346.916353] __block_write_begin_int+0x1d1/0x19c0 [ 2346.917056] ? fat_add_cluster+0x100/0x100 [ 2346.917669] ? add_to_page_cache_locked+0x40/0x40 [ 2346.918375] ? __page_cache_alloc+0x10d/0x360 [ 2346.919086] ? remove_inode_buffers+0x300/0x300 [ 2346.919752] ? pagecache_get_page+0x243/0xc80 [ 2346.920326] ? unlock_page_memcg+0x96/0x160 [ 2346.920874] ? wait_for_stable_page+0x92/0xe0 [ 2346.921451] cont_write_begin+0x466/0x970 [ 2346.921991] ? fat_add_cluster+0x100/0x100 [ 2346.922529] ? nobh_write_begin+0xed0/0xed0 [ 2346.923170] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2346.924676] ? generic_write_end+0x20e/0x3f0 [ 2346.925335] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2346.926716] fat_write_begin+0x89/0x180 [ 2346.927332] ? fat_add_cluster+0x100/0x100 [ 2346.928565] generic_perform_write+0x1fe/0x4e0 [ 2346.929319] ? fat_direct_IO+0x1ef/0x380 [ 2346.930406] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2346.932407] ? generic_file_direct_write+0x368/0x560 [ 2346.933892] __generic_file_write_iter+0x2cd/0x5d0 [ 2346.935274] generic_file_write_iter+0xdb/0x230 [ 2346.936529] do_iter_readv_writev+0x476/0x750 [ 2346.937850] ? new_sync_write+0x660/0x660 [ 2346.939092] ? selinux_file_permission+0x36/0x510 [ 2346.940565] do_iter_write+0x191/0x670 [ 2346.941191] vfs_iter_write+0x70/0xa0 [ 2346.942216] iter_file_splice_write+0x721/0xbe0 [ 2346.942954] ? generic_splice_sendpage+0x140/0x140 [ 2346.944467] ? avc_policy_seqno+0x9/0x70 [ 2346.945117] ? selinux_file_permission+0x36/0x510 [ 2346.946471] ? lockdep_init_map_type+0x2c7/0x780 [ 2346.947905] ? generic_splice_sendpage+0x140/0x140 [ 2346.949457] direct_splice_actor+0x10f/0x170 [ 2346.950818] splice_direct_to_actor+0x387/0x980 [ 2346.952262] ? pipe_to_sendpage+0x380/0x380 [ 2346.953598] ? do_splice_to+0x160/0x160 [ 2346.954842] ? security_file_permission+0x24e/0x570 [ 2346.956386] do_splice_direct+0x1c4/0x290 [ 2346.957642] ? splice_direct_to_actor+0x980/0x980 [ 2346.959103] ? selinux_file_permission+0x36/0x510 [ 2346.960557] ? security_file_permission+0x24e/0x570 [ 2346.962109] vfs_copy_file_range+0x57b/0x10f0 [ 2346.963509] ? generic_file_rw_checks+0x240/0x240 [ 2346.964971] ? __fget_files+0x296/0x480 [ 2346.966164] __do_sys_copy_file_range+0x176/0x420 [ 2346.967632] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2346.969078] ? ksys_write+0x1a9/0x260 [ 2346.970308] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2346.971947] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2346.973523] do_syscall_64+0x33/0x40 [ 2346.974629] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2346.976159] RIP: 0033:0x7f9dba2a1b19 [ 2346.977294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2346.987068] RSP: 002b:00007f9db77f6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2346.989388] RAX: ffffffffffffffda RBX: 00007f9dba3b5020 RCX: 00007f9dba2a1b19 [ 2346.991621] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000008 [ 2346.993902] RBP: 00007f9db77f61d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2346.996110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2346.998281] R13: 00007ffd0858541f R14: 00007f9db77f6300 R15: 0000000000022000 [ 2347.064613] FAT-fs (loop2): Unrecognized mount option "./file1" or missing value 08:07:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 2) 08:07:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x60000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2347.112881] FAT-fs (loop2): Unrecognized mount option "./file1" or missing value 08:07:16 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x4) sendfile(r0, r1, 0x0, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x0) [ 2347.182693] FAULT_INJECTION: forcing a failure. [ 2347.182693] name failslab, interval 1, probability 0, space 0, times 0 [ 2347.186248] CPU: 1 PID: 14130 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2347.188386] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.190874] Call Trace: [ 2347.191636] dump_stack+0x107/0x167 [ 2347.192612] should_fail.cold+0x5/0xa [ 2347.193635] ? create_object.isra.0+0x3a/0xa20 [ 2347.198953] should_failslab+0x5/0x20 [ 2347.200116] kmem_cache_alloc+0x5b/0x360 [ 2347.201352] create_object.isra.0+0x3a/0xa20 [ 2347.202649] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2347.204029] kmem_cache_alloc+0x159/0x360 [ 2347.205197] jbd2__journal_start+0x190/0x890 [ 2347.206431] __ext4_journal_start_sb+0x214/0x430 [ 2347.207755] ext4_setattr+0xe96/0x22c0 [ 2347.208912] ? current_time+0x1e6/0x2c0 [ 2347.210120] ? igrab+0xc0/0xc0 [ 2347.211113] ? ext4_journalled_write_end+0x1240/0x1240 [ 2347.212703] notify_change+0xba2/0x1080 [ 2347.213887] do_truncate+0x134/0x1f0 [ 2347.215052] ? file_open_root+0x440/0x440 [ 2347.216321] ? lock_release+0x6b0/0x6b0 [ 2347.217525] do_sys_ftruncate+0x4e2/0x830 [ 2347.218825] do_syscall_64+0x33/0x40 [ 2347.219971] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2347.221478] RIP: 0033:0x7fc401241b19 [ 2347.222598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.227315] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2347.228393] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2347.229406] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2347.230454] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.231527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2347.232550] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 08:07:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x60000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 35) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 3) 08:07:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xb00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x50200, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_setup(0x175d, &(0x7f0000001140)={0x0, 0x661b, 0x0, 0x0, 0x2e8}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000011c0), &(0x7f0000001200)) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000001380)=""/226, 0xe2) acct(&(0x7f0000000080)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@access_any}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000012c0), 0x1110425, &(0x7f0000001300)=ANY=[@ANYRES16=r2, @ANYRESOCT, @ANYRES32, @ANYRESHEX=r4, @ANYRESHEX=r7]) flistxattr(r3, &(0x7f0000000140)=""/4096, 0x1000) 08:07:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2363.562048] FAULT_INJECTION: forcing a failure. [ 2363.562048] name failslab, interval 1, probability 0, space 0, times 0 [ 2363.563647] CPU: 1 PID: 14151 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2363.564556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2363.565611] Call Trace: [ 2363.565970] dump_stack+0x107/0x167 [ 2363.566452] should_fail.cold+0x5/0xa [ 2363.574948] ? jbd2__journal_start+0x190/0x890 [ 2363.575551] should_failslab+0x5/0x20 [ 2363.576034] kmem_cache_alloc+0x5b/0x360 [ 2363.576567] jbd2__journal_start+0x190/0x890 [ 2363.577125] __ext4_journal_start_sb+0x214/0x430 [ 2363.577743] ext4_truncate+0x665/0x12b0 [ 2363.578242] ? unmap_mapping_pages+0x117/0x2a0 [ 2363.582891] ? ext4_punch_hole+0x1110/0x1110 [ 2363.583468] ext4_setattr+0x14c7/0x22c0 [ 2363.583981] ? current_time+0x1e6/0x2c0 [ 2363.584528] ? ext4_journalled_write_end+0x1240/0x1240 [ 2363.585216] notify_change+0xba2/0x1080 [ 2363.585734] do_truncate+0x134/0x1f0 [ 2363.586219] ? file_open_root+0x440/0x440 [ 2363.586743] ? lock_release+0x6b0/0x6b0 [ 2363.595303] do_sys_ftruncate+0x4e2/0x830 [ 2363.595839] do_syscall_64+0x33/0x40 [ 2363.596311] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2363.596956] RIP: 0033:0x7fc401241b19 [ 2363.597448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2363.607825] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2363.608819] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2363.609691] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2363.610560] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2363.615479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2363.616381] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 [ 2363.639623] FAULT_INJECTION: forcing a failure. [ 2363.639623] name failslab, interval 1, probability 0, space 0, times 0 [ 2363.641389] CPU: 1 PID: 14169 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2363.663550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2363.664742] Call Trace: [ 2363.665121] dump_stack+0x107/0x167 [ 2363.665632] should_fail.cold+0x5/0xa [ 2363.666164] ? create_object.isra.0+0x3a/0xa20 [ 2363.666841] should_failslab+0x5/0x20 [ 2363.675367] kmem_cache_alloc+0x5b/0x360 [ 2363.675965] create_object.isra.0+0x3a/0xa20 [ 2363.676621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2363.677352] kmem_cache_alloc+0x159/0x360 [ 2363.678007] alloc_buffer_head+0x20/0x110 [ 2363.678604] alloc_page_buffers+0x14d/0x6d0 [ 2363.681363] EXT4-fs error (device sda) in ext4_setattr:5585: Out of memory [ 2363.687273] create_empty_buffers+0x2c/0x640 [ 2363.687297] create_page_buffers+0x1bb/0x230 [ 2363.687320] __block_write_begin_int+0x1d1/0x19c0 [ 2363.687344] ? fat_add_cluster+0x100/0x100 [ 2363.687359] ? add_to_page_cache_locked+0x40/0x40 [ 2363.687376] ? __page_cache_alloc+0x10d/0x360 [ 2363.687393] ? remove_inode_buffers+0x300/0x300 [ 2363.687410] ? pagecache_get_page+0x243/0xc80 [ 2363.693905] ? unlock_page_memcg+0x96/0x160 [ 2363.694529] ? wait_for_stable_page+0x92/0xe0 [ 2363.695199] cont_write_begin+0x466/0x970 [ 2363.695839] ? fat_add_cluster+0x100/0x100 [ 2363.696438] ? nobh_write_begin+0xed0/0xed0 [ 2363.697096] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2363.697817] ? generic_write_end+0x20e/0x3f0 [ 2363.698451] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2363.699192] fat_write_begin+0x89/0x180 [ 2363.699761] ? fat_add_cluster+0x100/0x100 [ 2363.700375] generic_perform_write+0x1fe/0x4e0 [ 2363.701053] ? fat_direct_IO+0x1ef/0x380 [ 2363.701636] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2363.702674] ? generic_file_direct_write+0x368/0x560 [ 2363.703363] __generic_file_write_iter+0x2cd/0x5d0 [ 2363.704014] generic_file_write_iter+0xdb/0x230 [ 2363.704617] do_iter_readv_writev+0x476/0x750 [ 2363.705197] ? new_sync_write+0x660/0x660 [ 2363.705761] ? selinux_file_permission+0x36/0x510 [ 2363.706395] do_iter_write+0x191/0x670 [ 2363.706983] vfs_iter_write+0x70/0xa0 [ 2363.707484] iter_file_splice_write+0x721/0xbe0 [ 2363.708101] ? generic_splice_sendpage+0x140/0x140 [ 2363.708734] ? avc_policy_seqno+0x9/0x70 [ 2363.709255] ? selinux_file_permission+0x36/0x510 [ 2363.709879] ? lockdep_init_map_type+0x2c7/0x780 [ 2363.710487] ? generic_splice_sendpage+0x140/0x140 [ 2363.711171] direct_splice_actor+0x10f/0x170 [ 2363.711757] splice_direct_to_actor+0x387/0x980 [ 2363.712376] ? pipe_to_sendpage+0x380/0x380 [ 2363.712932] ? do_splice_to+0x160/0x160 [ 2363.713439] ? security_file_permission+0x24e/0x570 [ 2363.714085] do_splice_direct+0x1c4/0x290 [ 2363.714616] ? splice_direct_to_actor+0x980/0x980 [ 2363.715257] ? selinux_file_permission+0x36/0x510 [ 2363.715905] ? security_file_permission+0x24e/0x570 [ 2363.716551] vfs_copy_file_range+0x57b/0x10f0 [ 2363.717136] ? generic_file_rw_checks+0x240/0x240 [ 2363.717759] ? __fget_files+0x296/0x480 [ 2363.718290] __do_sys_copy_file_range+0x176/0x420 [ 2363.718959] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2363.719557] ? ksys_write+0x1a9/0x260 [ 2363.720055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2363.720735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2363.721420] do_syscall_64+0x33/0x40 [ 2363.721900] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2363.722547] RIP: 0033:0x7f9dba2a1b19 [ 2363.723068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2363.725382] RSP: 002b:00007f9db77f6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2363.726388] RAX: ffffffffffffffda RBX: 00007f9dba3b5020 RCX: 00007f9dba2a1b19 [ 2363.727315] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000008 [ 2363.728211] RBP: 00007f9db77f61d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2363.729112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2363.730032] R13: 00007ffd0858541f R14: 00007f9db77f6300 R15: 0000000000022000 [ 2363.736435] 9pnet: Insufficient options for proto=fd [ 2363.763764] Process accounting resumed 08:07:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 4) 08:07:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2364.034934] Process accounting resumed [ 2364.093530] FAULT_INJECTION: forcing a failure. 08:07:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="73efee808d4cce552c7266646e6f3d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=any,\x00']) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}]}}) set_mempolicy(0x2, &(0x7f0000000100)=0x80000001, 0x9) set_mempolicy(0x1, &(0x7f0000000080)=0x1, 0xffffffffffffffa0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) splice(r2, &(0x7f0000000140)=0x1, r4, &(0x7f0000000200)=0x80000000, 0x835, 0xe) ioctl$FS_IOC_READ_VERITY_METADATA(r4, 0xc0286687, &(0x7f0000000240)={0x2, 0x0, 0x1000, &(0x7f0000000300)=""/4096}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x11, r0, 0x4f9e3000) unshare(0x40000400) [ 2364.093530] name failslab, interval 1, probability 0, space 0, times 0 [ 2364.103105] CPU: 1 PID: 14197 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2364.103937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2364.104964] Call Trace: [ 2364.105307] dump_stack+0x107/0x167 [ 2364.105820] should_fail.cold+0x5/0xa [ 2364.106308] ? create_object.isra.0+0x3a/0xa20 [ 2364.114930] should_failslab+0x5/0x20 [ 2364.115421] kmem_cache_alloc+0x5b/0x360 [ 2364.115946] create_object.isra.0+0x3a/0xa20 [ 2364.116498] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2364.117137] kmem_cache_alloc+0x159/0x360 [ 2364.117670] jbd2__journal_start+0x190/0x890 [ 2364.118231] __ext4_journal_start_sb+0x214/0x430 [ 2364.122893] ext4_truncate+0x665/0x12b0 [ 2364.123400] ? unmap_mapping_pages+0x117/0x2a0 [ 2364.123984] ? ext4_punch_hole+0x1110/0x1110 [ 2364.124560] ext4_setattr+0x14c7/0x22c0 [ 2364.125061] ? current_time+0x1e6/0x2c0 [ 2364.125585] ? ext4_journalled_write_end+0x1240/0x1240 [ 2364.126238] notify_change+0xba2/0x1080 [ 2364.126795] do_truncate+0x134/0x1f0 [ 2364.131310] ? file_open_root+0x440/0x440 [ 2364.131831] ? lock_release+0x6b0/0x6b0 [ 2364.132352] do_sys_ftruncate+0x4e2/0x830 [ 2364.132910] do_syscall_64+0x33/0x40 [ 2364.133381] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2364.134069] RIP: 0033:0x7fc401241b19 [ 2364.134542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2364.136842] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2364.137799] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2364.138690] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2364.139640] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2364.140531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2364.141452] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 08:07:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 36) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2364.422586] FAULT_INJECTION: forcing a failure. [ 2364.422586] name failslab, interval 1, probability 0, space 0, times 0 [ 2364.424388] CPU: 1 PID: 14204 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2364.425241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2364.426263] Call Trace: [ 2364.426605] dump_stack+0x107/0x167 [ 2364.427089] should_fail.cold+0x5/0xa [ 2364.427581] ? create_object.isra.0+0x3a/0xa20 [ 2364.428160] should_failslab+0x5/0x20 [ 2364.428648] kmem_cache_alloc+0x5b/0x360 [ 2364.429192] create_object.isra.0+0x3a/0xa20 [ 2364.429741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2364.430420] kmem_cache_alloc+0x159/0x360 [ 2364.430967] alloc_buffer_head+0x20/0x110 [ 2364.431490] alloc_page_buffers+0x14d/0x6d0 [ 2364.432049] create_empty_buffers+0x2c/0x640 [ 2364.432614] create_page_buffers+0x1bb/0x230 [ 2364.433175] __block_write_begin_int+0x1d1/0x19c0 [ 2364.433781] ? fat_add_cluster+0x100/0x100 [ 2364.434326] ? add_to_page_cache_locked+0x40/0x40 [ 2364.434960] ? __page_cache_alloc+0x10d/0x360 [ 2364.435572] ? remove_inode_buffers+0x300/0x300 [ 2364.436174] ? pagecache_get_page+0x243/0xc80 [ 2364.436743] ? unlock_page_memcg+0x96/0x160 [ 2364.437302] ? wait_for_stable_page+0x92/0xe0 [ 2364.437871] cont_write_begin+0x466/0x970 [ 2364.438422] ? fat_add_cluster+0x100/0x100 [ 2364.438994] ? nobh_write_begin+0xed0/0xed0 [ 2364.439565] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2364.440257] ? generic_write_end+0x20e/0x3f0 [ 2364.440818] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2364.441478] fat_write_begin+0x89/0x180 [ 2364.441984] ? fat_add_cluster+0x100/0x100 [ 2364.442540] generic_perform_write+0x1fe/0x4e0 [ 2364.443148] ? fat_direct_IO+0x1ef/0x380 [ 2364.443674] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2364.444585] ? generic_file_direct_write+0x368/0x560 [ 2364.445269] __generic_file_write_iter+0x2cd/0x5d0 [ 2364.445902] generic_file_write_iter+0xdb/0x230 [ 2364.446505] do_iter_readv_writev+0x476/0x750 [ 2364.447120] ? new_sync_write+0x660/0x660 [ 2364.447646] ? selinux_file_permission+0x36/0x510 [ 2364.448286] do_iter_write+0x191/0x670 [ 2364.448799] vfs_iter_write+0x70/0xa0 [ 2364.449298] iter_file_splice_write+0x721/0xbe0 [ 2364.449905] ? generic_splice_sendpage+0x140/0x140 [ 2364.450568] ? avc_policy_seqno+0x9/0x70 [ 2364.451130] ? selinux_file_permission+0x36/0x510 [ 2364.451772] ? lockdep_init_map_type+0x2c7/0x780 [ 2364.452386] ? generic_splice_sendpage+0x140/0x140 [ 2364.453005] direct_splice_actor+0x10f/0x170 [ 2364.453577] splice_direct_to_actor+0x387/0x980 [ 2364.454172] ? pipe_to_sendpage+0x380/0x380 [ 2364.454736] ? do_splice_to+0x160/0x160 [ 2364.455260] ? security_file_permission+0x24e/0x570 [ 2364.455911] do_splice_direct+0x1c4/0x290 [ 2364.456437] ? splice_direct_to_actor+0x980/0x980 [ 2364.457049] ? selinux_file_permission+0x36/0x510 [ 2364.457717] ? security_file_permission+0x24e/0x570 [ 2364.458360] vfs_copy_file_range+0x57b/0x10f0 [ 2364.458980] ? generic_file_rw_checks+0x240/0x240 [ 2364.459593] ? __fget_files+0x296/0x480 [ 2364.460129] __do_sys_copy_file_range+0x176/0x420 [ 2364.460734] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2364.461368] ? ksys_write+0x1a9/0x260 [ 2364.461858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2364.462578] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2364.463244] do_syscall_64+0x33/0x40 [ 2364.463697] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2364.464333] RIP: 0033:0x7f9dba2a1b19 [ 2364.464808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2364.467174] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2364.468161] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2364.469062] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2364.469962] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2364.470870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2364.471780] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:07:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xc0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:49 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_RESP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_STATUS={0x5}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00') openat(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_any}]}}) signalfd4(r4, &(0x7f0000000000)={[0x81]}, 0x8, 0x800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:07:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 37) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 5) 08:07:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xd00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2380.725706] FAULT_INJECTION: forcing a failure. [ 2380.725706] name failslab, interval 1, probability 0, space 0, times 0 [ 2380.739872] CPU: 0 PID: 14230 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2380.740764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2380.741854] Call Trace: [ 2380.742210] dump_stack+0x107/0x167 [ 2380.742691] should_fail.cold+0x5/0xa [ 2380.743234] ? create_object.isra.0+0x3a/0xa20 [ 2380.743868] should_failslab+0x5/0x20 [ 2380.744437] kmem_cache_alloc+0x5b/0x360 [ 2380.745127] create_object.isra.0+0x3a/0xa20 [ 2380.745825] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2380.746641] kmem_cache_alloc+0x159/0x360 [ 2380.747294] ? mark_held_locks+0x9e/0xe0 [ 2380.747924] alloc_buffer_head+0x20/0x110 [ 2380.748533] alloc_page_buffers+0x14d/0x6d0 [ 2380.749183] create_empty_buffers+0x2c/0x640 [ 2380.749846] __ext4_block_zero_page_range+0x798/0x940 [ 2380.750612] ext4_truncate+0x1007/0x12b0 [ 2380.751231] ? unmap_mapping_pages+0x117/0x2a0 [ 2380.751872] ? ext4_punch_hole+0x1110/0x1110 [ 2380.752466] ext4_setattr+0x14c7/0x22c0 [ 2380.752998] ? current_time+0x1e6/0x2c0 [ 2380.753545] ? ext4_journalled_write_end+0x1240/0x1240 [ 2380.754236] notify_change+0xba2/0x1080 [ 2380.754770] do_truncate+0x134/0x1f0 [ 2380.755287] ? file_open_root+0x440/0x440 [ 2380.755825] ? lock_release+0x6b0/0x6b0 [ 2380.756369] do_sys_ftruncate+0x4e2/0x830 [ 2380.756957] do_syscall_64+0x33/0x40 [ 2380.757543] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2380.758498] RIP: 0033:0x7fc401241b19 [ 2380.759494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2380.764170] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2380.766068] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2380.768023] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2380.770182] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2380.772309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2380.774519] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 [ 2380.826820] FAULT_INJECTION: forcing a failure. [ 2380.826820] name failslab, interval 1, probability 0, space 0, times 0 [ 2380.832642] CPU: 0 PID: 14221 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2380.840000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2380.841082] Call Trace: [ 2380.841448] dump_stack+0x107/0x167 [ 2380.841920] should_fail.cold+0x5/0xa [ 2380.842409] ? create_object.isra.0+0x3a/0xa20 [ 2380.842995] should_failslab+0x5/0x20 [ 2380.843525] kmem_cache_alloc+0x5b/0x360 [ 2380.844081] create_object.isra.0+0x3a/0xa20 [ 2380.844637] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2380.845291] kmem_cache_alloc+0x159/0x360 [ 2380.845833] alloc_buffer_head+0x20/0x110 [ 2380.846371] alloc_page_buffers+0x14d/0x6d0 [ 2380.846934] create_empty_buffers+0x2c/0x640 [ 2380.847529] create_page_buffers+0x1bb/0x230 [ 2380.848127] __block_write_begin_int+0x1d1/0x19c0 [ 2380.848722] ? fat_add_cluster+0x100/0x100 [ 2380.849307] ? add_to_page_cache_locked+0x40/0x40 [ 2380.849936] ? __page_cache_alloc+0x10d/0x360 [ 2380.850527] ? remove_inode_buffers+0x300/0x300 [ 2380.851161] ? pagecache_get_page+0x243/0xc80 [ 2380.851752] ? unlock_page_memcg+0x96/0x160 [ 2380.852345] ? wait_for_stable_page+0x92/0xe0 [ 2380.852933] cont_write_begin+0x466/0x970 [ 2380.853536] ? fat_add_cluster+0x100/0x100 [ 2380.854091] ? nobh_write_begin+0xed0/0xed0 [ 2380.854658] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2380.855351] ? generic_write_end+0x20e/0x3f0 [ 2380.855943] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2380.856642] fat_write_begin+0x89/0x180 [ 2380.857217] ? fat_add_cluster+0x100/0x100 [ 2380.857781] generic_perform_write+0x1fe/0x4e0 [ 2380.858390] ? fat_direct_IO+0x1ef/0x380 [ 2380.858931] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2380.859899] ? generic_file_direct_write+0x368/0x560 [ 2380.860598] __generic_file_write_iter+0x2cd/0x5d0 [ 2380.861288] generic_file_write_iter+0xdb/0x230 [ 2380.861896] do_iter_readv_writev+0x476/0x750 [ 2380.862492] ? new_sync_write+0x660/0x660 [ 2380.863110] ? selinux_file_permission+0x36/0x510 [ 2380.863771] do_iter_write+0x191/0x670 [ 2380.864321] vfs_iter_write+0x70/0xa0 [ 2380.864809] iter_file_splice_write+0x721/0xbe0 [ 2380.865464] ? generic_splice_sendpage+0x140/0x140 [ 2380.866648] ? avc_policy_seqno+0x9/0x70 [ 2380.867742] ? selinux_file_permission+0x36/0x510 [ 2380.869127] ? lockdep_init_map_type+0x2c7/0x780 [ 2380.870471] ? generic_splice_sendpage+0x140/0x140 [ 2380.871436] direct_splice_actor+0x10f/0x170 [ 2380.872087] splice_direct_to_actor+0x387/0x980 [ 2380.872786] ? pipe_to_sendpage+0x380/0x380 [ 2380.873479] ? do_splice_to+0x160/0x160 [ 2380.874070] ? security_file_permission+0x24e/0x570 [ 2380.874823] do_splice_direct+0x1c4/0x290 [ 2380.875431] ? splice_direct_to_actor+0x980/0x980 [ 2380.876080] ? selinux_file_permission+0x36/0x510 [ 2380.876759] ? security_file_permission+0x24e/0x570 [ 2380.877428] vfs_copy_file_range+0x57b/0x10f0 [ 2380.878010] ? generic_file_rw_checks+0x240/0x240 [ 2380.878634] ? __fget_files+0x296/0x480 [ 2380.879288] __do_sys_copy_file_range+0x176/0x420 [ 2380.879905] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2380.880553] ? ksys_write+0x1a9/0x260 [ 2380.881054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2380.881790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2380.882526] do_syscall_64+0x33/0x40 [ 2380.883143] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2380.883913] RIP: 0033:0x7f9dba2a1b19 [ 2380.884526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2380.887055] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2380.888038] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2380.889002] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2380.889905] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2380.890809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2380.891819] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:07:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 6) 08:07:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="c2b34f62c38a0a673a15b1394407000000cf"]) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x3ff}}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e22, 0x800, @mcast2, 0x9}, 0x1c) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000e40)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000002f00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 08:07:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xe0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2381.006043] FAULT_INJECTION: forcing a failure. [ 2381.006043] name failslab, interval 1, probability 0, space 0, times 0 [ 2381.010193] CPU: 1 PID: 14250 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2381.012156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2381.014358] Call Trace: [ 2381.017854] dump_stack+0x107/0x167 [ 2381.018371] should_fail.cold+0x5/0xa 08:07:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xe00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:07:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2381.018887] ? create_object.isra.0+0x3a/0xa20 [ 2381.031583] should_failslab+0x5/0x20 [ 2381.032072] kmem_cache_alloc+0x5b/0x360 [ 2381.032647] create_object.isra.0+0x3a/0xa20 [ 2381.033209] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2381.033859] __kmalloc+0x16e/0x3f0 [ 2381.034357] ext4_ext_remove_space+0x15af/0x4010 [ 2381.034976] ? find_held_lock+0x2c/0x110 [ 2381.035568] ? do_raw_write_lock+0x11a/0x280 [ 2381.036132] ? do_raw_read_unlock+0x70/0x70 [ 2381.036686] ? ext4_ext_index_trans_blocks+0x170/0x170 [ 2381.037359] ? ext4_es_remove_extent+0x103/0x3f0 [ 2381.037977] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 2381.038609] ? down_write+0xe0/0x160 [ 2381.039093] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2381.039777] ext4_ext_truncate+0x1ea/0x250 [ 2381.040322] ext4_truncate+0xd5e/0x12b0 [ 2381.040833] ? unmap_mapping_pages+0x117/0x2a0 [ 2381.041454] ? ext4_punch_hole+0x1110/0x1110 [ 2381.042026] ext4_setattr+0x14c7/0x22c0 [ 2381.042580] ? current_time+0x1e6/0x2c0 [ 2381.055205] ? ext4_journalled_write_end+0x1240/0x1240 [ 2381.055896] notify_change+0xba2/0x1080 [ 2381.056443] do_truncate+0x134/0x1f0 [ 2381.056949] ? file_open_root+0x440/0x440 [ 2381.057503] ? lock_release+0x6b0/0x6b0 [ 2381.058068] do_sys_ftruncate+0x4e2/0x830 [ 2381.058630] do_syscall_64+0x33/0x40 [ 2381.059150] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2381.059816] RIP: 0033:0x7fc401241b19 [ 2381.060304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2381.062643] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2381.063656] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2381.064576] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2381.065496] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2381.066420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2381.067357] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 08:07:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 7) [ 2381.176660] FAULT_INJECTION: forcing a failure. [ 2381.176660] name failslab, interval 1, probability 0, space 0, times 0 [ 2381.178032] CPU: 1 PID: 14263 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2381.178823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2381.184406] Call Trace: [ 2381.184929] dump_stack+0x107/0x167 [ 2381.185642] should_fail.cold+0x5/0xa [ 2381.186387] ? jbd2__journal_start+0x190/0x890 [ 2381.187361] should_failslab+0x5/0x20 [ 2381.188161] kmem_cache_alloc+0x5b/0x360 [ 2381.189149] ? lock_downgrade+0x6d0/0x6d0 [ 2381.190162] jbd2__journal_start+0x190/0x890 [ 2381.191179] __ext4_journal_start_sb+0x214/0x430 [ 2381.191733] ext4_dirty_inode+0xbc/0x130 [ 2381.192202] ? ext4_setattr+0x22c0/0x22c0 [ 2381.192683] __mark_inode_dirty+0x492/0xf10 [ 2381.193188] ext4_setattr+0x1236/0x22c0 [ 2381.193646] ? current_time+0x1e6/0x2c0 [ 2381.194121] ? ext4_journalled_write_end+0x1240/0x1240 [ 2381.194724] notify_change+0xba2/0x1080 [ 2381.198209] do_truncate+0x134/0x1f0 [ 2381.198641] ? file_open_root+0x440/0x440 [ 2381.199250] ? lock_release+0x6b0/0x6b0 [ 2381.200048] do_sys_ftruncate+0x4e2/0x830 [ 2381.200864] do_syscall_64+0x33/0x40 [ 2381.201588] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2381.202588] RIP: 0033:0x7fc401241b19 [ 2381.203294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2381.207363] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2381.208931] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2381.210386] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2381.211867] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2381.213330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2381.214775] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 [ 2397.195025] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 08:08:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xfffff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 38) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xe0000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 8) 08:08:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xf00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000080), 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@routing={0x89, 0x2, 0x1, 0x81, 0x0, [@remote]}, 0x18) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext, 0x28, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}]}}) connect$inet6(r3, &(0x7f0000001100)={0xa, 0x4e23, 0x800, @private2={0xfc, 0x2, '\x00', 0x1}, 0xffffffff}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000980)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x6, 0x5, 0x1, 0xd92, 0x2, 0x3e, 0x3f, 0x36a, 0x40, 0x2e5, 0x0, 0x2, 0x38, 0x1, 0x1, 0x0, 0x6}, [{0x60000000, 0x100, 0x6, 0x0, 0x9, 0xf284, 0x8001, 0x4}, {0x7, 0xfcf3, 0x2, 0x0, 0x1, 0x8001, 0x3f, 0x6}], "da275e6fbc43420cb8e8cf2c19ca3df9a3568e713e8d138166b0df99b84746526cb99e1b453e4f6221917419c9344f22d0b46b1bcfa96ba93a4452cddd06158c51ef21a4823a5b879f8d43e5513dda73dc7331f7872b8997d4a14db4eb242563611b3ae1314634e64f987eb69541949d11db6c398aaae15d1d014693d97f10a55f2770337ad6c6816408ea6890a0f6b42a260552e774f79145846b0baefb27819d45f61da43c0614fe9a21398b782144cf61226db42ea465410515211265225d8e802b2cf7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x775) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) connect$inet6(r0, &(0x7f00000016c0)={0xa, 0x4e21, 0x9, @remote, 0xffffff48}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000540)=@srh={0xff, 0xe, 0x4, 0x7, 0x9a, 0x8, 0x2d7, [@mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @local]}, 0x78) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x800, @local}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000001180)={{0x1, 0x1, 0x18, r1, {0x86}}, './file1\x00'}) sendmmsg$inet6(r4, &(0x7f0000001680)=[{{&(0x7f00000011c0)={0xa, 0x4e24, 0x400, @remote, 0xcb}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000001200)="ea93d6e27d826f47475d1d529c1ad71dc24daada650c4e5fe9bed46d835d3d4b7386fef8338458019b19b59167db348b013c6a5be89ac115949bdabe0bbb7c2f379dff3bd2c4126b8adc5b309952da9e939d9a5041fe4e143125b25ba9be8de9e3229962f801d4f4be7b4de1f01e429c31ab45bc6959f4bf18cb6701135ec2b2c06f75ff48b6b84a239e7e3104012d9dbdaaa3b592e0c45c672f4d4ab0a402b1890461011afca83bb265b142b42c94216270f83431158e0b244e2fc66927b0c0f198e2cebadecaf2e5684180bad0", 0xce}, {&(0x7f0000001e00)="0f6b7f5fae05569ac4a6bbc3d8c8386fbc80e3d3b9094f785f0ff90653d25a2282b4b04d75559b13b661023af356984261e56da519847e43ed26492c0838c2ac97ded57d4c13eafd41abbbd67eeee5df550df822959cb3c292c702de5032dad07a7ff8e6e3f248a2500d8239ace91daa315e83c110f92efa8c02957bf398ab93f0573449027a2d9eb72d12ae63a4f246e4518a75bb67c18ff6da514c96c9e798b0b3f0295b816e86d1f7114f842f477e388e4b5538550e1281c1f3ffc29690fd73a296e7d6ae1bf2adb48d807ca2d61ccf08d0eca320ed6bade9e36cc42c4cf5b11090352ad75b70067121166955a750a023c967f4129e0de4073ac01746d2e9f6555ed2b1ac3ebafd63bd221ef99be7e2de533b2a872ecd3547cb50c71bb6a9c7251370eab67bc5d652bd833d3782b9e6e12e99e4b7e89285ec6264efe3e1cf0003cc4c0573b4d3853e32d16413b2f0e415193e0e9bae0b491839e2b25a5a1e7e8343dcf91f527c0f4e49978d1ca64a5fcd17826edff91b833ad5fef5ef76f19e6a0b8c6c1258fd8cd8e16c57c2823f6ad3d4b6b949c28abb0ac92d85816640f0bfb796c41b518064645eae8ae13c6e96a8e774825c1d883c635fec84103184e99377e6174de9aaec40ccae7bf1cd2efdae755bfa4238f84ddd4de05b1a3574b7204acf3bb851131d0893a1faad0f6f8f140991091e95d6bee7623f58058652965d8c225bb42a6a74e61b9882c906425ff69d158bfccfdd382e68bf50bbb6468b987134ff86ef5d1b80f86f5379a4bb0bc93f0f192568e1771907ea175e99f2b21a124327efdc37c14b568a14b0d57ab2cebdaa17f7581c1506f90319ea5cc25b6374c744643573b104dc11aaeaca169f6156fce64898b18c09549c6ae73e29ff101b8cd80af2af7c8575c8558e32d7d60b102411ea564523d504e9a51a6e1a1d405121caa347043676e0471c6b61bc4de9e14c3278dde3486742aee064b2b7ed8e8eca67cbfe6d95be9c0cd6a1ba62e26c5587df454876ad82bbc0462785be8531f877d627e0f025608cb1844d6019c641950537fd4848ed6e54296be145bf227f3e651378a567cecf37e76fa084bfe1e1b3c5786ac6ac2b67e5dd2f13c77ae5f6dd74c3a7ee7d91c6afe46127d8864f5c851454edf29c46feecbc9b9f6f56cc9bff6ae674966f52982f7040beae3a157b810756c6fdc03ffb0b6ed0e799cbcf10a16e5756b25680d32817fcb4d23fa1af9e9e4f73326bba7c55a42c6194913bb2d241b2610e6f04498c91d3eca1250a2da9ff43c09c789cdfe964ac365d33daa3581598c5bedb8356a668fd580b522f377f5fbc78ae901c6f5993a1768adf3f90c5da6c84f5ed3191fed0ca87af12840510fdaa60e681a76abd92fb4c9259cdeef9c19a3742d44e8eef1382c966f0915ae8b1c198b29bfaee8e1233eb8d50d87dd75920887eacac4b1dde0ba74fdb6709f4c1c13000e1ca2dbcbbf7a1246d5358c8ca136114b3ecf71661cffd41c5295a51d8b6fc9f3c5bdfa60afe969b8fa6992bc0cda60010a5daa0e669aa0efe6bd52d09887c4a5457b4d88876c7114497a29ddcbb803072a75a948e38d72af9c16d252d6a2733ea84e89279d3b2fb5ed712e39e253ed04eebb2eca91dd11c9f5b7bc2eb671a4285880b34a3f06dde53401c71d1ef20f85ec3f269fe1481b10f01984e700df1e2d3e17d59bf52591b67b5a4fec3c3f2eb6095f881047d6c8c2941968dab23043681f6862e68b809b0ae229f92e9089d0f63071d3313202e246964dd130aabf07d66a95278952ef0e48430e27bb255099ce812db36ab7d94a7db39baca09d2fe6cc614eef9fd43be5f3d6af6d45b8cc09e95a06739925cb20307daa8e0a7105bd7c136a8b75d8955bbc7f721d2270096ecc49de7902b585fb061d13c9f62be15eeed7ff9030bc7af6a317ea93a40812ee318248e9b4728fa86f3264b681646822d5cda8d38c3a100510fef9fe1e9d459a4c5b134cdf3a0ac384aba5c27378b17db174dd76f87498c28e83b5ae5a85ffd8a951db77c74629ea7f4cfc123c797ede03759cf603ae5ae4d8020a307a6c6bf4762a60a9455742598bc1654424d36f65ea6ddeb9dae6512fdc8db14d73f0d31733bcb821702555a2ebbdccc9fd5a9a515ab42f181e0497e61ff0dbdf2abd06acb00bd50ba75ed394214bbaf42382b0499b9586b6ed8210774e76cff94368ec7eb9e5713bfc485f2d0e3427bf47ebb724245005ef935dfef0bd0f6d3697adf522f265026bc3a27f0454d21dfd393c0b232e7b32bf9c416e6af89dfa896c0eb3cc29a399cd80fb3178bd13b726bfc71810fae46e04a93e94d67d94cee157b785b351954f0ef08c0e2c57a69407897e57395ffa4573fcb8a3b3cdee4e61cf5de8b2880f1edbdd932588b93be69636e25aa52e149f53ff23b74e33f966d9edf48c8608891ee5d981110a70eed46d171cdf9aacb4b398368086f836fcffaf2688c07444959c995ba7f82b258439e003f5a50b7fc46ff26086f33ae6ed84d9e8ff6a203d99dacef9661fa8e63985b2d009cb23dac7e16100dcf08a0f8b8ba73062a17642fb2d970ec44ae31b57ef9abb83bc448e224857c77ce36a1f383d464fc1ccbd5496333711963045870ae09dd156b5cb9d978c9bbea2a0b7476309d92289c5d9b44c2e9d67758bec1e943aab168bf5702d789339a1bcd1255f5c810cdf7bc0f16b0167f72a645ec5441822c9625d7501c6cc10c4e785e7caabc9c3b68782ed23832e73582972a3b9d0d1a8448da0bcc79a77af5f985889d89093df9aae59c09c27770e53d68ecc2670a8aff83e56175243a15cab2ff98621f97aecf30a5cb71bf5b00182d231440ba3dcbf6327d80681f9121c851de47a86bedb329465f3ce4e5d4b3c37489a617277d30fc15357dd6d95da8fee6d544ae7bae069f01f4bfe314e4b6136c853367c4b74cfb08aafc88bd411b4f87d5fe42770dca5639b8e9afff13653c87d1d2fdf17ebf23aa0ea23176183ae414bb98c404652da0b4ad7f365d7629333fa8246d1f302672d5bd2d3616f3b030c1f87fcda62de9d8e13f2fabf659ea49f71f0e9df69771bc8e8969fe55170e0fb4529550bd4a15eba7757807766d927d467568a4c9cc9c70cf292b60b9eb5ee1f9997ddac57db5b1453416ce67b2445204ad9d146fc57ba8f51b66acb70957ba7826b5549bb3f8a07bfb40978e782b04d373e25edd88d826661619607163b23fe4b85f511f9f23e8eb1009a8e8117fdfa28436d23b2a5717976c0a8fc62fcaf3b5affd8a57beeacfdb5dfedd5f6b4b0696f7e5ecbd69f5d711cfed69af601e3a7b74f5b6d694b13e6395b241d2170bb0090758b09abaabca959308a0ab46138b44f704806cc9cb5db2a0b0a50b14c42a7b75b626279cc15ba05160bde3db8d3a400eb1c465d7ea9a78ffd49166c8cd201c06a7b082242794911c04778d1adf66c1c656b090796cd5b9ab543f48b84b80291856eec06b54f30112d232e0ee364e687080dd1afa692e996b86c7a57cd5345952583fc408276719048c19a5f1e6de6ed1c0f20a37d549a0b22a7d5cce88ca61bd1309961de08fc6524b5d035084797d31ef8c1a7ac4409e94e85192599935d70ef3fd5e3a236cc2f7dd824f630678642a21c0db792301fc3375cd063614085ba2716594e1bd6db43cd222177436fe052f5a04846c38257ddc41adc4af784b5d90b5aff4a28ae3bce3fdd1d2f3df5c8f51afc49e4ee4f12ad278ee755f098714eb0e2bfd9cc5e1932f778903b413abffbf2431d42e3bc34f603474a299eef9bf7375767cb1d3f344758892d3811854f61b481ebd4d7a604c7acb048af357673793c3472e509c17e45cddcb58839d5f3bc1dd5a54ee0c08a181482fa80a2176f68cdda00d416c3eebc6a29cba55ac972dd81ffe6dade108a648b082738f3adefe7d6fb68a7bf464d309b080946bdd3d1cf70ed154ab0987053e59c1ca96cecaeee5d5b958b7ea9369c9f5a23df03a93cf55e9b87a13eb69a1d9c5443594b50b25013f90865722181c63df2dd65ef08d2f11f70d188d823868f5d4619a43790971e78d388d5c929e3b963cb31177ef5c03bde1d44e188a76f3c58ce5e351d281e1c623ebeef5657b5e34613e1d4053bf36127565eae76ba13e910dd7f54fbaaaa2e5ace29aca064d923dc9e4d4c0d36a6eb42a4c0a2df03688f6b65aa9df32225b4fcce3d868170ff4551b774a9d7f9b5e3c132f11faae4fb89402e8e01cad18d4f1e704f61549ad5a013e2c0b35446284a8504378f8dbe53ec05808658876c99dd489a22294417225abbf3e9c52f6fba4542d0030f651ae0f2849f838e0eb075573e5cf3da89f0b9ad77039b001e4363b6fc3f0b3c2e583fff0909a1e122594e52794adc1a27a046d2df26a351b7224dde6f449c85ba1c2ca47e13cfb5f29514a421b8d2bf91c488bb452d7b21fbcf63a6074a8b2519d313324e8cf0caaadc76bf7ba3f0e72854d6dd147dc49e9ca37ac0287ff6511f762afd30268743148af62a8770a47a75520de11b4244b2b4dc0d9fde9304ed3ef8429d4ea8e944d0b31fb23641fee9511ad1a85c8884e893cc2730b136a31bd5a41e16d4391d6542593876d6810cbd7db427f301e059cf3c7acd8f923bc3332d9990d8f76e0c5fa2f04d6f91ecdf44bec205ac7522b8a7ddc6de4e5f247ef9df58eedf1af4a31f3ba2e8e679c5b51cd0e350aecf3a17cd63f27c933cd39bd49b1408ce3071944d278dbc21810d1312000d14aa18c4bf0cba9536c0525015ba3ab214c1eaf65fa70f971a14d9c7ec4bcbf74cc7bc876a7d99c454859146f3934812187e4751d6e80eaabdc0f1acc5f9de407fb28c725c0473e7c1c55b03553f9db262633157c70fef5f039eb930d57872a13c68e00d8c765bf77c059b68f98cae0be15b2734f67c534bea86735768de1722b1a6687fb0584aa0feedcf7b337780b0572a66babda210a1d8897f601609738b87643ab61d129145ca6fcd352f8377819d38c071454579d6a9184dcbe873a7f6bd6d7734aa199649db8014628fbe58274171022fc0abd9f38bcb0c8cbaf07ace9e40968fae8b08f186aa196ad55ff1cc6ca0cd4d4be29ee1418b137c44f07f70b41cb0f134f8835fc83135b88ca0c063f92a2a9f2d367944727f6a848969d15d1cc0c5c4cb8f06b9dc6ce4dcd75166bcf9c1574015693e1f2b92e285118d8401bf9f81e261f53b7251ba0ffce8f4520e3f78cc3e538e6db24a3b00371d8cefd4953199d4b97e323d2d62d355b68f94af55ba7cafc37f0b609badbe7e189b4126b72688a266e24bb6e1f1c0fe8c82a12a54f033693a6b24b1607a91c0626bcc579d6ba82b495a458b71f0f975c1357fae78c78ac20931ad876041d071bf94d58562b87b1533fa21777687bb52b9176bea940c1650798adcb60c01d2034bd0c929cf9e0997085467f1343d01bfa880a488e57289a3f4f0d441686d2b2628530419bf7e91171c786d6c60d3b6e6bf728a1059ab7acd50d7e8c0bf6a2e050d3b62d6006e5cd3470b0d4792c1a3d97e58b2b03c27c578d40721ef90462299e9a834b75bb90b7f0d795baaa258767e59aca19ccfe011162f8972f793e2b7131ee8f166b8583d7b3b1e2394829c9b25e1483ef4a67037f97bc9154c42073abf918286e1671231d72d5d336ff63cf4b20160ad69950e886f8a658cf987e39e96e85ac310ece1629f6dbe42f676bb7df70ff01e3ecacec36f2b38a9592a3b31deee33e6bc0768d507386529298d0bbad9fe5da", 0x1000}, {&(0x7f0000001300)="9fd618187460c0de9d", 0x9}, {&(0x7f0000001340)="03a2d90fc7bd6b8c42bcba3c", 0xc}, {&(0x7f0000001380)="acc9120543658b7491906408aa3ad17b92c1c3bfd202896c686469ea135925aa99fd4a1527fefd66c865f0684beafaf5a5779477dc0e024d6e721c450d3ccadb36562a447128e1d8f10fe9912af5e6ed9f9275100c2b773f", 0x58}], 0x5, &(0x7f0000001480)=[@dstopts={{0x20, 0x29, 0x37, {0xff, 0x0, '\x00', [@padn={0x1, 0x1, [0x0]}]}}}, @dstopts_2292={{0x168, 0x29, 0x4, {0x3a, 0x29, '\x00', [@ra={0x5, 0x2, 0xf4d8}, @enc_lim={0x4, 0x1, 0x7}, @calipso={0x7, 0x10, {0x1, 0x2, 0x14, 0x3, [0x6]}}, @generic={0x5, 0xc3, "4f3888272e1a936d40200f83f70b2ce5247305b7c6ef2d8b2063f95625d0926e0ea54c5d7eeb387e0778b4a690289a92fc61ddb608d3176e28b73efd4b37064a38ced5d65d6bbfd80f86e82d33c667408988643c5c4d73b79c3654f8457dd693c5453dd4e27fdcee85ba6d1fa9f1dc465b631ed758c46359bef6157243e8bfc6192119e94784184196e5d38ca850377e231c8740db6e071a741ff8f254759cd9513c08e0dd58e301158b6c6320d43942169afa3ad2dc632d7087e8c9f324240b99661f"}, @generic={0x3, 0x6f, "f7e821cc38a76ac64d81e6115c4efd95b0df5241ff93012cfcf08cb70fcac843df8e97701244e222df78398a556dea87f16b56d68ddb63e65cefbf567c7b69f8d4272d1739ae508faaa721337dbd0cdaa45bf9b39be3d6fb09c061ec769571bb2e132324d1a3d1073d7cd7bc16a9af"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8267}}, @hoplimit_2292={{0x14}}, @rthdr={{0x48, 0x29, 0x39, {0x16, 0x6, 0x3, 0x8, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}], 0x200}}], 0x1, 0x4048000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000001140)=0x3f, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB="33c103000000f3cfc214d32bb61e000066646e6f3d", @ANYRESHEX=r6, @ANYBLOB=',access=any,\x00']) connect$inet6(r5, &(0x7f00000005c0)={0xa, 0x4e22, 0x53b, @local, 0x8}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f00000000c0)={0xa, 0x4e23, 0x3, @local, 0x7fffffff}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000100)="ecc6c0d9267c56bf142d65dd384aee558a10f9d5b89f4e65ef31fa490d2a6d79b0cda491e7", 0x25}, {&(0x7f0000000140)="4875cdc5214e7f292a31f40016ef28137bb993f8fb1e857b1eb3cea1ca39922b", 0x20}, {&(0x7f0000000180)="7dd8a08de82883a07c2e89c6633873d211bb7f1d2c378f2c56f6ac93d23b08ec23f5da157fcf8bcafce2b267585b12e6b6211fadc5305c5d7bc40d582b28544759fa53f0a923cc3d366aa7792a4ec77f1230c406b4cca875d41c66a801", 0x5d}, {&(0x7f0000000200)="b99622d514fcf60e4ce94d597a252a6a2819650cdaee9dccb337476b9f461b13bd1d3609e50f309c745720c1d136b04692c83100713998d13c4a31599bb7f698b73b8e89ebb6dfc4a040ce2e71325f6e055d0980e1c3b387c81d3da31f00b2", 0x5f}, {&(0x7f0000000280)="9a6ae229dd4147b59c5bb99aad4d4d1d92bc35339cb5e2f4bc95ca36336007452258e0b004f0211ee71b9c6570e2e1645e75a262b03dcdae8b60f6061056b84fdce94942dafdcfbec447a40b2447b1f48796fa090fbad99d86679892763d06ac68812e79a297610bb89d5585a537232d165f6e052aa4aefc7e3eb5fe79de0353c5195b61ea795d3573c3d0e6f59ccadb60168cdc19b1dd73c2b3f4dde9abd8d8b588c37bff04b798c33a3e08f39c16801eb0ad8480bbd10038af1c054092cb3dcb9f50e9e5b3a3ed84bc089eceb17352e23c8d7e28fa6b10e51577197c14ec81bd09e95237ada7c8c5e16841b435", 0xee}, {&(0x7f0000000380)="2de18d18e298af077651bd99dfa3b59fcec91f993ed1d03e9ae60d68b4935f649990b14b4428446a7d6a1794f1df6f5ae74e986af9a2a1f65d2124dfbf66bbc1e9da332fab6a7653b8fb591662cf4881b6c0f36fc0b904ec5a34aa17c8f6eea601d50f03b4244b15835bd270017ffce3dd200a03e57279ecec57c98cbf4b301ae132fb1d337e038dd8e5ca536b5871ac40899ffa2bbb9d2492b96f9272da21d941380f308c4496c79eda634472756a68493f0f7c96df663926eb67affb6758f6e2bf52a856fa642c957546f41692f0959d80384f7d9d8467910a2febf6b3eaeb90d0ad476078b145b0e55de528ab", 0xee}], 0x6, &(0x7f0000000640)=[@rthdrdstopts={{0x90, 0x29, 0x37, {0x3b, 0xe, '\x00', [@generic={0xf2, 0x72, "d592c70bc90e71c7275aa06eccacd2032ad89c65cbe509819b7b27c2f809c17abc67ec4d75183cdee0022126d2ca684aa8c04dbf9c48053cb31b5d26b91170cb20e769a744d4fb911418bd97fbf445aca0baf7d0eb39a5c5ea5ac71bbfd9c96379747a38ddf6a70b5ae607f4b79159882bb3"}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x825}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x812aa2bd122f84b9, 0x3, '\x00', [@hao={0xc9, 0x10, @empty}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @rthdrdstopts={{0x90, 0x29, 0x37, {0x2c, 0xe, '\x00', [@enc_lim={0x4, 0x1, 0x1}, @calipso={0x7, 0x10, {0x1, 0x2, 0x0, 0x5, [0x5]}}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @ra={0x5, 0x2, 0x7ff}, @jumbo, @enc_lim={0x4, 0x1, 0x3}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast2}}, @ra={0x5, 0x2, 0xfff}, @calipso={0x7, 0x20, {0x0, 0x6, 0x6, 0xffff, [0x10001, 0x8, 0x5]}}, @jumbo={0xc2, 0x4, 0x800}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xffffff01}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x2c, 0x12, 0x2, 0x2, 0x0, [@mcast2, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, @dev={0xfe, 0x80, '\x00', 0x33}, @private1, @private1, @dev={0xfe, 0x80, '\x00', 0x21}, @loopback]}}}, @hopopts_2292={{0x58, 0x29, 0x36, {0x6, 0x7, '\x00', [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @enc_lim, @ra={0x5, 0x2, 0x91}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0x800}, @hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x88, 0x29, 0x4, {0xc, 0xd, '\x00', [@pad1, @ra={0x5, 0x2, 0x7}, @jumbo={0xc2, 0x4, 0xffffffff}, @hao={0xc9, 0x10, @remote}, @calipso={0x7, 0x38, {0x1, 0xc, 0x0, 0x1, [0x4, 0x80, 0x4, 0x5, 0x3, 0x8]}}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}], 0x340}, 0x4008050) [ 2406.453203] FAULT_INJECTION: forcing a failure. [ 2406.453203] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.454687] CPU: 1 PID: 14283 Comm: syz-executor.6 Not tainted 5.10.149 #1 [ 2406.455581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2406.456612] Call Trace: [ 2406.456960] dump_stack+0x107/0x167 [ 2406.457426] should_fail.cold+0x5/0xa [ 2406.457916] ? jbd2__journal_start+0x190/0x890 [ 2406.458498] should_failslab+0x5/0x20 [ 2406.458982] kmem_cache_alloc+0x5b/0x360 [ 2406.463534] ? lock_downgrade+0x6d0/0x6d0 [ 2406.464073] jbd2__journal_start+0x190/0x890 [ 2406.464643] __ext4_journal_start_sb+0x214/0x430 [ 2406.465251] ext4_dirty_inode+0xbc/0x130 [ 2406.465766] ? ext4_setattr+0x22c0/0x22c0 [ 2406.466292] __mark_inode_dirty+0x492/0xf10 [ 2406.466846] ext4_setattr+0x1236/0x22c0 [ 2406.467384] ? current_time+0x1e6/0x2c0 [ 2406.467913] ? ext4_journalled_write_end+0x1240/0x1240 [ 2406.468614] notify_change+0xba2/0x1080 [ 2406.469131] do_truncate+0x134/0x1f0 [ 2406.469603] ? file_open_root+0x440/0x440 [ 2406.470127] ? lock_release+0x6b0/0x6b0 [ 2406.470659] do_sys_ftruncate+0x4e2/0x830 [ 2406.471192] do_syscall_64+0x33/0x40 [ 2406.471695] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2406.472340] RIP: 0033:0x7fc401241b19 [ 2406.472816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2406.475116] RSP: 002b:00007fc3fe7b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 2406.476130] RAX: ffffffffffffffda RBX: 00007fc401354f60 RCX: 00007fc401241b19 [ 2406.476993] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2406.477879] RBP: 00007fc3fe7b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2406.478766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2406.479680] R13: 00007ffe0d5d901f R14: 00007fc3fe7b7300 R15: 0000000000022000 [ 2406.518610] FAULT_INJECTION: forcing a failure. [ 2406.518610] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.520465] CPU: 0 PID: 14274 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2406.521362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2406.522428] Call Trace: [ 2406.522781] dump_stack+0x107/0x167 [ 2406.523257] should_fail.cold+0x5/0xa [ 2406.527682] ? create_object.isra.0+0x3a/0xa20 [ 2406.528270] ? create_object.isra.0+0x3a/0xa20 [ 2406.528878] should_failslab+0x5/0x20 [ 2406.529371] kmem_cache_alloc+0x5b/0x360 [ 2406.529939] create_object.isra.0+0x3a/0xa20 [ 2406.530513] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2406.531164] kmem_cache_alloc+0x159/0x360 [ 2406.531750] alloc_buffer_head+0x20/0x110 [ 2406.532286] alloc_page_buffers+0x14d/0x6d0 [ 2406.532852] create_empty_buffers+0x2c/0x640 [ 2406.533423] create_page_buffers+0x1bb/0x230 [ 2406.534000] __block_write_begin_int+0x1d1/0x19c0 [ 2406.534625] ? fat_add_cluster+0x100/0x100 [ 2406.535178] ? add_to_page_cache_locked+0x40/0x40 [ 2406.535804] ? __page_cache_alloc+0x10d/0x360 [ 2406.536374] ? remove_inode_buffers+0x300/0x300 [ 2406.536972] ? pagecache_get_page+0x243/0xc80 [ 2406.537554] ? unlock_page_memcg+0x96/0x160 [ 2406.538114] ? wait_for_stable_page+0x92/0xe0 [ 2406.538695] cont_write_begin+0x466/0x970 [ 2406.539241] ? fat_add_cluster+0x100/0x100 [ 2406.539805] ? nobh_write_begin+0xed0/0xed0 [ 2406.540357] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2406.541013] ? generic_write_end+0x20e/0x3f0 [ 2406.541576] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2406.542245] fat_write_begin+0x89/0x180 [ 2406.542765] ? fat_add_cluster+0x100/0x100 [ 2406.543311] generic_perform_write+0x1fe/0x4e0 [ 2406.543950] ? fat_direct_IO+0x1ef/0x380 [ 2406.544470] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2406.545399] ? generic_file_direct_write+0x368/0x560 [ 2406.546059] __generic_file_write_iter+0x2cd/0x5d0 [ 2406.546699] generic_file_write_iter+0xdb/0x230 [ 2406.547306] do_iter_readv_writev+0x476/0x750 [ 2406.547893] ? new_sync_write+0x660/0x660 [ 2406.548422] ? selinux_file_permission+0x36/0x510 [ 2406.549060] do_iter_write+0x191/0x670 [ 2406.549598] vfs_iter_write+0x70/0xa0 [ 2406.550089] iter_file_splice_write+0x721/0xbe0 [ 2406.550742] ? generic_splice_sendpage+0x140/0x140 [ 2406.551397] ? avc_policy_seqno+0x9/0x70 [ 2406.551927] ? selinux_file_permission+0x36/0x510 [ 2406.552556] ? lockdep_init_map_type+0x2c7/0x780 [ 2406.553172] ? generic_splice_sendpage+0x140/0x140 [ 2406.553806] direct_splice_actor+0x10f/0x170 [ 2406.554377] splice_direct_to_actor+0x387/0x980 [ 2406.554992] ? pipe_to_sendpage+0x380/0x380 [ 2406.555567] ? do_splice_to+0x160/0x160 [ 2406.556078] ? security_file_permission+0x24e/0x570 [ 2406.556729] do_splice_direct+0x1c4/0x290 [ 2406.557259] ? splice_direct_to_actor+0x980/0x980 [ 2406.557919] ? selinux_file_permission+0x36/0x510 [ 2406.558539] ? security_file_permission+0x24e/0x570 [ 2406.559234] vfs_copy_file_range+0x57b/0x10f0 [ 2406.559844] ? generic_file_rw_checks+0x240/0x240 [ 2406.560481] ? __fget_files+0x296/0x480 [ 2406.561015] __do_sys_copy_file_range+0x176/0x420 [ 2406.561647] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2406.562256] ? ksys_write+0x1a9/0x260 [ 2406.562769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2406.563475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2406.564142] do_syscall_64+0x33/0x40 [ 2406.564627] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2406.565296] RIP: 0033:0x7f9dba2a1b19 [ 2406.565784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2406.568101] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2406.569077] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2406.569981] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2406.570910] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2406.571850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2406.572759] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:08:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) (fail_nth: 9) 08:08:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 39) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xfffff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xff6) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x100000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2406.798802] FAULT_INJECTION: forcing a failure. [ 2406.798802] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.800507] CPU: 1 PID: 14301 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2406.801402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2406.802475] Call Trace: [ 2406.802823] dump_stack+0x107/0x167 [ 2406.803284] should_fail.cold+0x5/0xa 08:08:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2406.803907] ? create_object.isra.0+0x3a/0xa20 [ 2406.811502] should_failslab+0x5/0x20 [ 2406.811986] kmem_cache_alloc+0x5b/0x360 [ 2406.812507] create_object.isra.0+0x3a/0xa20 [ 2406.813056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2406.813690] kmem_cache_alloc+0x159/0x360 [ 2406.814256] alloc_buffer_head+0x20/0x110 [ 2406.814775] alloc_page_buffers+0x14d/0x6d0 [ 2406.815403] create_empty_buffers+0x2c/0x640 [ 2406.815978] create_page_buffers+0x1bb/0x230 [ 2406.816539] __block_write_begin_int+0x1d1/0x19c0 [ 2406.817139] ? fat_add_cluster+0x100/0x100 [ 2406.817673] ? add_to_page_cache_locked+0x40/0x40 [ 2406.818281] ? __page_cache_alloc+0x10d/0x360 [ 2406.818852] ? remove_inode_buffers+0x300/0x300 [ 2406.819471] ? pagecache_get_page+0x243/0xc80 [ 2406.820040] ? unlock_page_memcg+0x96/0x160 [ 2406.820599] ? wait_for_stable_page+0x92/0xe0 [ 2406.821195] cont_write_begin+0x466/0x970 [ 2406.821741] ? fat_add_cluster+0x100/0x100 [ 2406.822330] ? nobh_write_begin+0xed0/0xed0 [ 2406.822883] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2406.823548] ? generic_write_end+0x20e/0x3f0 [ 2406.824110] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2406.824789] fat_write_begin+0x89/0x180 [ 2406.825300] ? fat_add_cluster+0x100/0x100 [ 2406.825841] generic_perform_write+0x1fe/0x4e0 [ 2406.826440] ? fat_direct_IO+0x1ef/0x380 [ 2406.826957] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2406.827915] ? generic_file_direct_write+0x368/0x560 [ 2406.828553] __generic_file_write_iter+0x2cd/0x5d0 [ 2406.829220] generic_file_write_iter+0xdb/0x230 [ 2406.829821] do_iter_readv_writev+0x476/0x750 [ 2406.830388] ? new_sync_write+0x660/0x660 [ 2406.830914] ? selinux_file_permission+0x36/0x510 [ 2406.831588] do_iter_write+0x191/0x670 [ 2406.832110] vfs_iter_write+0x70/0xa0 [ 2406.832602] iter_file_splice_write+0x721/0xbe0 [ 2406.833217] ? generic_splice_sendpage+0x140/0x140 [ 2406.833856] ? avc_policy_seqno+0x9/0x70 [ 2406.834367] ? selinux_file_permission+0x36/0x510 [ 2406.835024] ? lockdep_init_map_type+0x2c7/0x780 [ 2406.835642] ? generic_splice_sendpage+0x140/0x140 [ 2406.836316] direct_splice_actor+0x10f/0x170 [ 2406.836875] splice_direct_to_actor+0x387/0x980 [ 2406.837497] ? pipe_to_sendpage+0x380/0x380 [ 2406.838048] ? do_splice_to+0x160/0x160 [ 2406.838572] ? security_file_permission+0x24e/0x570 [ 2406.839213] do_splice_direct+0x1c4/0x290 [ 2406.839785] ? splice_direct_to_actor+0x980/0x980 [ 2406.840404] ? selinux_file_permission+0x36/0x510 [ 2406.841028] ? security_file_permission+0x24e/0x570 [ 2406.841698] vfs_copy_file_range+0x57b/0x10f0 [ 2406.842298] ? generic_file_rw_checks+0x240/0x240 [ 2406.842931] ? __fget_files+0x296/0x480 [ 2406.843519] __do_sys_copy_file_range+0x176/0x420 [ 2406.844159] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2406.844763] ? ksys_write+0x1a9/0x260 [ 2406.845268] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2406.845945] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2406.846651] do_syscall_64+0x33/0x40 [ 2406.847121] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2406.851812] RIP: 0033:0x7f9dba2a1b19 [ 2406.852296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2406.854556] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2406.855553] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2406.856457] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2406.857357] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2406.858256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2406.859167] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:08:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:08:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x100000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1da688) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 40) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x2) 08:08:32 executing program 3: ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x10c, 0x0, 0x86d2bb0ddbdaa934, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffff000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}, @TIPC_NLA_NET={0x58, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9c}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x2000c016}, 0x48010) setns(0xffffffffffffffff, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) r3 = syz_io_uring_setup(0x2451, 0x0, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000480)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, r1, 0x80, &(0x7f0000000400)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x0, 0x0, 0x0, {0x0, r5}}, 0x8000000) epoll_create1(0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r6 = add_key$keyring(&(0x7f0000000780), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r6, 0xfffffffffffffffd) fsmount(0xffffffffffffffff, 0x1, 0xf7) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) 08:08:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1da688) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x3) [ 2423.245913] FAULT_INJECTION: forcing a failure. [ 2423.245913] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.248300] CPU: 1 PID: 14343 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2423.249095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2423.250045] Call Trace: [ 2423.250362] dump_stack+0x107/0x167 [ 2423.250788] should_fail.cold+0x5/0xa [ 2423.251232] ? create_object.isra.0+0x3a/0xa20 [ 2423.251843] should_failslab+0x5/0x20 [ 2423.252286] kmem_cache_alloc+0x5b/0x360 [ 2423.252761] create_object.isra.0+0x3a/0xa20 [ 2423.253269] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2423.253857] kmem_cache_alloc+0x159/0x360 [ 2423.254345] alloc_buffer_head+0x20/0x110 [ 2423.254826] alloc_page_buffers+0x14d/0x6d0 [ 2423.255332] create_empty_buffers+0x2c/0x640 [ 2423.256229] create_page_buffers+0x1bb/0x230 [ 2423.257149] __block_write_begin_int+0x1d1/0x19c0 [ 2423.258144] ? fat_add_cluster+0x100/0x100 [ 2423.259017] ? add_to_page_cache_locked+0x40/0x40 [ 2423.260141] ? __page_cache_alloc+0x10d/0x360 [ 2423.261046] ? remove_inode_buffers+0x300/0x300 [ 2423.261981] ? pagecache_get_page+0x243/0xc80 [ 2423.262902] ? unlock_page_memcg+0x96/0x160 [ 2423.263730] ? wait_for_stable_page+0x92/0xe0 [ 2423.264252] cont_write_begin+0x466/0x970 [ 2423.264745] ? fat_add_cluster+0x100/0x100 [ 2423.265233] ? nobh_write_begin+0xed0/0xed0 [ 2423.265731] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2423.266313] ? generic_write_end+0x20e/0x3f0 [ 2423.266818] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2423.267447] fat_write_begin+0x89/0x180 [ 2423.268378] ? fat_add_cluster+0x100/0x100 [ 2423.269256] generic_perform_write+0x1fe/0x4e0 [ 2423.270203] ? fat_direct_IO+0x1ef/0x380 [ 2423.271041] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2423.272805] ? generic_file_direct_write+0x368/0x560 [ 2423.273831] __generic_file_write_iter+0x2cd/0x5d0 [ 2423.274823] generic_file_write_iter+0xdb/0x230 [ 2423.275840] do_iter_readv_writev+0x476/0x750 [ 2423.276769] ? new_sync_write+0x660/0x660 [ 2423.277618] ? selinux_file_permission+0x36/0x510 [ 2423.278630] do_iter_write+0x191/0x670 [ 2423.279439] vfs_iter_write+0x70/0xa0 [ 2423.280448] iter_file_splice_write+0x721/0xbe0 [ 2423.281092] ? generic_splice_sendpage+0x140/0x140 [ 2423.281782] ? avc_policy_seqno+0x9/0x70 [ 2423.282360] ? selinux_file_permission+0x36/0x510 [ 2423.283061] ? lockdep_init_map_type+0x2c7/0x780 [ 2423.283756] ? generic_splice_sendpage+0x140/0x140 [ 2423.284544] direct_splice_actor+0x10f/0x170 [ 2423.285462] splice_direct_to_actor+0x387/0x980 [ 2423.286424] ? pipe_to_sendpage+0x380/0x380 [ 2423.287310] ? do_splice_to+0x160/0x160 [ 2423.288305] ? security_file_permission+0x24e/0x570 [ 2423.289365] do_splice_direct+0x1c4/0x290 [ 2423.290234] ? splice_direct_to_actor+0x980/0x980 [ 2423.291241] ? selinux_file_permission+0x36/0x510 [ 2423.291984] ? security_file_permission+0x24e/0x570 [ 2423.292574] vfs_copy_file_range+0x57b/0x10f0 [ 2423.293099] ? generic_file_rw_checks+0x240/0x240 [ 2423.293659] ? __fget_files+0x296/0x480 [ 2423.294141] __do_sys_copy_file_range+0x176/0x420 [ 2423.294741] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2423.295328] ? ksys_write+0x1a9/0x260 [ 2423.295913] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2423.296585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2423.297237] do_syscall_64+0x33/0x40 [ 2423.297713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2423.298354] RIP: 0033:0x7f9dba2a1b19 [ 2423.298822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2423.302953] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2423.304172] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2423.305683] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2423.307695] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2423.309681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2423.311721] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:08:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x9d0034, &(0x7f0000000240)={'trans=unix,', {[{@cache_loose}, {@version_L}, {@privport}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, 'configfs\x00'}}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+#'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x8, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) 08:08:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 41) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x5) [ 2423.533231] configfs: Unknown parameter 'trans' [ 2423.665434] FAULT_INJECTION: forcing a failure. [ 2423.665434] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.669103] CPU: 1 PID: 14390 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2423.671127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2423.673559] Call Trace: [ 2423.674351] dump_stack+0x107/0x167 [ 2423.675469] should_fail.cold+0x5/0xa [ 2423.676617] ? create_object.isra.0+0x3a/0xa20 [ 2423.677980] should_failslab+0x5/0x20 [ 2423.679111] kmem_cache_alloc+0x5b/0x360 [ 2423.680263] create_object.isra.0+0x3a/0xa20 [ 2423.681331] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2423.682735] kmem_cache_alloc+0x159/0x360 [ 2423.684007] alloc_buffer_head+0x20/0x110 [ 2423.685244] alloc_page_buffers+0x14d/0x6d0 [ 2423.686505] create_empty_buffers+0x2c/0x640 [ 2423.687868] create_page_buffers+0x1bb/0x230 [ 2423.689186] __block_write_begin_int+0x1d1/0x19c0 [ 2423.690641] ? fat_add_cluster+0x100/0x100 [ 2423.691964] ? add_to_page_cache_locked+0x40/0x40 [ 2423.693409] ? __page_cache_alloc+0x10d/0x360 [ 2423.694776] ? remove_inode_buffers+0x300/0x300 [ 2423.696204] ? pagecache_get_page+0x243/0xc80 [ 2423.697571] ? unlock_page_memcg+0x96/0x160 [ 2423.698888] ? wait_for_stable_page+0x92/0xe0 [ 2423.700283] cont_write_begin+0x466/0x970 [ 2423.701557] ? fat_add_cluster+0x100/0x100 [ 2423.702856] ? nobh_write_begin+0xed0/0xed0 [ 2423.704195] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2423.705775] ? generic_write_end+0x20e/0x3f0 [ 2423.707119] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2423.708714] fat_write_begin+0x89/0x180 [ 2423.709914] ? fat_add_cluster+0x100/0x100 [ 2423.711214] generic_perform_write+0x1fe/0x4e0 [ 2423.712643] ? fat_direct_IO+0x1ef/0x380 [ 2423.713901] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2423.716095] ? generic_file_direct_write+0x368/0x560 [ 2423.717640] __generic_file_write_iter+0x2cd/0x5d0 [ 2423.719164] generic_file_write_iter+0xdb/0x230 [ 2423.720596] do_iter_readv_writev+0x476/0x750 [ 2423.721964] ? new_sync_write+0x660/0x660 [ 2423.723215] ? selinux_file_permission+0x36/0x510 [ 2423.724714] do_iter_write+0x191/0x670 [ 2423.725952] vfs_iter_write+0x70/0xa0 [ 2423.727099] iter_file_splice_write+0x721/0xbe0 [ 2423.732207] ? generic_splice_sendpage+0x140/0x140 [ 2423.733755] ? avc_policy_seqno+0x9/0x70 [ 2423.739981] ? selinux_file_permission+0x36/0x510 [ 2423.741561] ? lockdep_init_map_type+0x2c7/0x780 [ 2423.743056] ? generic_splice_sendpage+0x140/0x140 [ 2423.744608] direct_splice_actor+0x10f/0x170 [ 2423.746071] splice_direct_to_actor+0x387/0x980 [ 2423.747803] ? pipe_to_sendpage+0x380/0x380 [ 2423.749242] ? do_splice_to+0x160/0x160 [ 2423.750566] ? security_file_permission+0x24e/0x570 [ 2423.752134] do_splice_direct+0x1c4/0x290 [ 2423.753461] ? splice_direct_to_actor+0x980/0x980 [ 2423.755000] ? selinux_file_permission+0x36/0x510 [ 2423.756554] ? security_file_permission+0x24e/0x570 [ 2423.758206] vfs_copy_file_range+0x57b/0x10f0 [ 2423.759700] ? generic_file_rw_checks+0x240/0x240 [ 2423.761248] ? __fget_files+0x296/0x480 [ 2423.762556] __do_sys_copy_file_range+0x176/0x420 [ 2423.764361] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2423.765869] ? ksys_write+0x1a9/0x260 [ 2423.767115] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2423.768829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2423.770482] do_syscall_64+0x33/0x40 [ 2423.771693] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2423.773396] RIP: 0033:0x7f9dba2a1b19 [ 2423.774589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2423.780750] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2423.783203] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2423.785448] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2423.787743] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2423.790034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2423.792342] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:08:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x3f00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, 0x1e, 0xc21, 0x0, 0x0, {0xc}, [@nested={0x10, 0x34, 0x0, 0x1, [@typed={0xc, 0xa, 0x0, 0x0, @u64=0x2}]}]}, 0x24}}, 0x0) 08:08:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:48 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 42) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0xb) 08:08:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x2000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 3: r0 = inotify_init1(0x0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) r2 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r2, &(0x7f0000000140)='./file0\x00', 0x12000440) rmdir(&(0x7f0000000000)='./file0\x00') getpeername$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000080)=0x1c) [ 2440.094711] FAULT_INJECTION: forcing a failure. [ 2440.094711] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.100712] CPU: 0 PID: 14412 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2440.101595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2440.102646] Call Trace: [ 2440.102998] dump_stack+0x107/0x167 [ 2440.103485] should_fail.cold+0x5/0xa [ 2440.104010] ? create_object.isra.0+0x3a/0xa20 [ 2440.104596] should_failslab+0x5/0x20 [ 2440.105071] kmem_cache_alloc+0x5b/0x360 [ 2440.105590] create_object.isra.0+0x3a/0xa20 [ 2440.106158] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2440.107106] kmem_cache_alloc+0x159/0x360 [ 2440.107652] alloc_buffer_head+0x20/0x110 [ 2440.108226] alloc_page_buffers+0x14d/0x6d0 [ 2440.108796] create_empty_buffers+0x2c/0x640 [ 2440.109380] create_page_buffers+0x1bb/0x230 [ 2440.110675] __block_write_begin_int+0x1d1/0x19c0 [ 2440.111397] ? fat_add_cluster+0x100/0x100 [ 2440.112032] ? add_to_page_cache_locked+0x40/0x40 [ 2440.112665] ? __page_cache_alloc+0x10d/0x360 [ 2440.113318] ? remove_inode_buffers+0x300/0x300 [ 2440.113996] ? pagecache_get_page+0x243/0xc80 [ 2440.114576] ? unlock_page_memcg+0x96/0x160 [ 2440.115204] ? wait_for_stable_page+0x92/0xe0 [ 2440.115906] cont_write_begin+0x466/0x970 [ 2440.116471] ? fat_add_cluster+0x100/0x100 [ 2440.117032] ? nobh_write_begin+0xed0/0xed0 [ 2440.117582] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2440.118244] ? generic_write_end+0x20e/0x3f0 [ 2440.118813] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2440.119485] fat_write_begin+0x89/0x180 [ 2440.120014] ? fat_add_cluster+0x100/0x100 [ 2440.120565] generic_perform_write+0x1fe/0x4e0 [ 2440.121159] ? fat_direct_IO+0x1ef/0x380 [ 2440.121685] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2440.122899] ? generic_file_direct_write+0x368/0x560 [ 2440.128509] __generic_file_write_iter+0x2cd/0x5d0 [ 2440.129155] generic_file_write_iter+0xdb/0x230 [ 2440.129807] do_iter_readv_writev+0x476/0x750 [ 2440.130395] ? new_sync_write+0x660/0x660 [ 2440.130986] ? selinux_file_permission+0x36/0x510 [ 2440.131652] do_iter_write+0x191/0x670 [ 2440.132211] vfs_iter_write+0x70/0xa0 [ 2440.132727] iter_file_splice_write+0x721/0xbe0 [ 2440.133338] ? generic_splice_sendpage+0x140/0x140 [ 2440.133976] ? avc_policy_seqno+0x9/0x70 [ 2440.134499] ? selinux_file_permission+0x36/0x510 [ 2440.135128] ? lockdep_init_map_type+0x2c7/0x780 [ 2440.135722] ? generic_splice_sendpage+0x140/0x140 [ 2440.136367] direct_splice_actor+0x10f/0x170 [ 2440.136934] splice_direct_to_actor+0x387/0x980 [ 2440.137536] ? pipe_to_sendpage+0x380/0x380 [ 2440.138400] ? do_splice_to+0x160/0x160 [ 2440.138913] ? security_file_permission+0x24e/0x570 [ 2440.139557] do_splice_direct+0x1c4/0x290 [ 2440.140105] ? splice_direct_to_actor+0x980/0x980 [ 2440.140714] ? selinux_file_permission+0x36/0x510 [ 2440.141333] ? security_file_permission+0x24e/0x570 [ 2440.142000] vfs_copy_file_range+0x57b/0x10f0 [ 2440.142590] ? generic_file_rw_checks+0x240/0x240 [ 2440.143211] ? __fget_files+0x296/0x480 [ 2440.143736] __do_sys_copy_file_range+0x176/0x420 [ 2440.144396] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2440.145001] ? ksys_write+0x1a9/0x260 [ 2440.145508] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2440.146172] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2440.146867] do_syscall_64+0x33/0x40 [ 2440.147338] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2440.148042] RIP: 0033:0x7f9dba2a1b19 [ 2440.148512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2440.150803] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2440.151769] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2440.152693] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2440.153893] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2440.154799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2440.155695] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:08:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0xf) 08:08:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x200f5ef) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x200f5ef) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x10) 08:08:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 43) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:08:49 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x1, './file1\x00'}, 0x6e) [ 2440.488779] FAULT_INJECTION: forcing a failure. [ 2440.488779] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.492208] CPU: 0 PID: 14452 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2440.494151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2440.496642] Call Trace: [ 2440.497666] dump_stack+0x107/0x167 [ 2440.498744] should_fail.cold+0x5/0xa [ 2440.499926] ? create_object.isra.0+0x3a/0xa20 [ 2440.501305] should_failslab+0x5/0x20 [ 2440.502503] kmem_cache_alloc+0x5b/0x360 [ 2440.503757] create_object.isra.0+0x3a/0xa20 [ 2440.505126] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2440.506650] kmem_cache_alloc+0x159/0x360 [ 2440.507926] alloc_buffer_head+0x20/0x110 [ 2440.509149] alloc_page_buffers+0x14d/0x6d0 [ 2440.510455] create_empty_buffers+0x2c/0x640 [ 2440.511769] create_page_buffers+0x1bb/0x230 [ 2440.513365] __block_write_begin_int+0x1d1/0x19c0 [ 2440.514780] ? fat_add_cluster+0x100/0x100 [ 2440.516048] ? add_to_page_cache_locked+0x40/0x40 [ 2440.517613] ? __page_cache_alloc+0x10d/0x360 [ 2440.518911] ? remove_inode_buffers+0x300/0x300 [ 2440.520292] ? pagecache_get_page+0x243/0xc80 [ 2440.521658] ? unlock_page_memcg+0x96/0x160 [ 2440.522947] ? wait_for_stable_page+0x92/0xe0 [ 2440.524307] cont_write_begin+0x466/0x970 [ 2440.525505] ? fat_add_cluster+0x100/0x100 [ 2440.526992] ? nobh_write_begin+0xed0/0xed0 [ 2440.528278] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2440.529942] ? generic_write_end+0x20e/0x3f0 [ 2440.531223] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2440.532752] fat_write_begin+0x89/0x180 [ 2440.533918] ? fat_add_cluster+0x100/0x100 [ 2440.535162] generic_perform_write+0x1fe/0x4e0 [ 2440.536544] ? fat_direct_IO+0x1ef/0x380 [ 2440.537743] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2440.539968] ? generic_file_direct_write+0x368/0x560 [ 2440.541527] __generic_file_write_iter+0x2cd/0x5d0 [ 2440.543008] generic_file_write_iter+0xdb/0x230 [ 2440.543739] do_iter_readv_writev+0x476/0x750 [ 2440.545415] ? new_sync_write+0x660/0x660 [ 2440.546633] ? selinux_file_permission+0x36/0x510 [ 2440.548096] do_iter_write+0x191/0x670 [ 2440.549256] vfs_iter_write+0x70/0xa0 [ 2440.550382] iter_file_splice_write+0x721/0xbe0 [ 2440.551740] ? generic_splice_sendpage+0x140/0x140 [ 2440.553212] ? avc_policy_seqno+0x9/0x70 [ 2440.554407] ? selinux_file_permission+0x36/0x510 [ 2440.555834] ? lockdep_init_map_type+0x2c7/0x780 [ 2440.557265] ? generic_splice_sendpage+0x140/0x140 [ 2440.558742] direct_splice_actor+0x10f/0x170 [ 2440.560248] splice_direct_to_actor+0x387/0x980 [ 2440.561616] ? pipe_to_sendpage+0x380/0x380 [ 2440.562883] ? do_splice_to+0x160/0x160 [ 2440.564069] ? security_file_permission+0x24e/0x570 [ 2440.565540] do_splice_direct+0x1c4/0x290 [ 2440.566757] ? splice_direct_to_actor+0x980/0x980 [ 2440.568200] ? selinux_file_permission+0x36/0x510 [ 2440.569611] ? security_file_permission+0x24e/0x570 [ 2440.571082] vfs_copy_file_range+0x57b/0x10f0 [ 2440.572444] ? generic_file_rw_checks+0x240/0x240 [ 2440.573872] ? __fget_files+0x296/0x480 [ 2440.575039] __do_sys_copy_file_range+0x176/0x420 [ 2440.576671] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2440.578040] ? ksys_write+0x1a9/0x260 [ 2440.579168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2440.580747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2440.582253] do_syscall_64+0x33/0x40 [ 2440.583344] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2440.584873] RIP: 0033:0x7f9dba2a1b19 [ 2440.585994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2440.591541] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2440.593778] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2440.595868] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2440.597953] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2440.600058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2440.602206] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:09:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8008) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 44) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c200000000000000000086dd6096153f00303a00fc020000000000000000000000400000ff0200000000000000000000000000010200907800000000600009e600000000000000000000f9000000ffffac1e0001fe8000000000000000000000000000bbeea22cc7b8dd7daa77d6f1e82f0a29459bdca637e814060e551f38"], 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, &(0x7f00000000c0)=0x2, 0x1f, 0x4) dup2(r1, r0) 08:09:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0xb657) 08:09:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x3000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x3000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2456.620613] FAULT_INJECTION: forcing a failure. [ 2456.620613] name failslab, interval 1, probability 0, space 0, times 0 [ 2456.623391] CPU: 1 PID: 14498 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2456.625783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2456.626821] Call Trace: [ 2456.627172] dump_stack+0x107/0x167 [ 2456.627633] should_fail.cold+0x5/0xa [ 2456.628542] ? create_object.isra.0+0x3a/0xa20 [ 2456.629983] should_failslab+0x5/0x20 [ 2456.631295] kmem_cache_alloc+0x5b/0x360 [ 2456.632662] create_object.isra.0+0x3a/0xa20 [ 2456.634178] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2456.635774] kmem_cache_alloc+0x159/0x360 [ 2456.637229] alloc_buffer_head+0x20/0x110 [ 2456.638527] alloc_page_buffers+0x14d/0x6d0 [ 2456.639838] create_empty_buffers+0x2c/0x640 [ 2456.641351] create_page_buffers+0x1bb/0x230 [ 2456.642750] __block_write_begin_int+0x1d1/0x19c0 [ 2456.644397] ? fat_add_cluster+0x100/0x100 [ 2456.645666] ? add_to_page_cache_locked+0x40/0x40 [ 2456.647145] ? __page_cache_alloc+0x10d/0x360 [ 2456.648578] ? remove_inode_buffers+0x300/0x300 [ 2456.650027] ? pagecache_get_page+0x243/0xc80 [ 2456.651491] ? unlock_page_memcg+0x96/0x160 [ 2456.653485] ? wait_for_stable_page+0x92/0xe0 [ 2456.654930] cont_write_begin+0x466/0x970 [ 2456.656429] ? fat_add_cluster+0x100/0x100 [ 2456.657848] ? nobh_write_begin+0xed0/0xed0 [ 2456.659346] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2456.661113] ? generic_write_end+0x20e/0x3f0 08:09:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x20000015, &(0x7f00000000c0)=[{0x2, 0x6, 0xcb, 0x5}, {0x2, 0x5, 0x31}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@flushsa={0x14, 0x1c, 0x4}, 0x14}}, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x8000, 0x88200) [ 2456.662699] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2456.664440] fat_write_begin+0x89/0x180 [ 2456.665703] ? fat_add_cluster+0x100/0x100 [ 2456.667109] generic_perform_write+0x1fe/0x4e0 [ 2456.668456] ? fat_direct_IO+0x1ef/0x380 [ 2456.669104] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2456.670121] ? generic_file_direct_write+0x368/0x560 [ 2456.670833] __generic_file_write_iter+0x2cd/0x5d0 [ 2456.671525] generic_file_write_iter+0xdb/0x230 [ 2456.672218] do_iter_readv_writev+0x476/0x750 [ 2456.672844] ? new_sync_write+0x660/0x660 [ 2456.673414] ? selinux_file_permission+0x36/0x510 [ 2456.674097] do_iter_write+0x191/0x670 [ 2456.674643] vfs_iter_write+0x70/0xa0 [ 2456.675168] iter_file_splice_write+0x721/0xbe0 [ 2456.675825] ? generic_splice_sendpage+0x140/0x140 [ 2456.676489] ? avc_policy_seqno+0x9/0x70 [ 2456.677002] ? selinux_file_permission+0x36/0x510 [ 2456.677612] ? lockdep_init_map_type+0x2c7/0x780 [ 2456.678206] ? generic_splice_sendpage+0x140/0x140 [ 2456.678815] direct_splice_actor+0x10f/0x170 [ 2456.679350] splice_direct_to_actor+0x387/0x980 [ 2456.679958] ? pipe_to_sendpage+0x380/0x380 [ 2456.680536] ? do_splice_to+0x160/0x160 [ 2456.681077] ? security_file_permission+0x24e/0x570 [ 2456.681780] do_splice_direct+0x1c4/0x290 [ 2456.682382] ? splice_direct_to_actor+0x980/0x980 [ 2456.683114] ? selinux_file_permission+0x36/0x510 [ 2456.683867] ? security_file_permission+0x24e/0x570 [ 2456.684599] vfs_copy_file_range+0x57b/0x10f0 [ 2456.685268] ? generic_file_rw_checks+0x240/0x240 [ 2456.685983] ? __fget_files+0x296/0x480 [ 2456.686599] __do_sys_copy_file_range+0x176/0x420 [ 2456.687334] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2456.688049] ? ksys_write+0x1a9/0x260 [ 2456.688621] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2456.689371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2456.690033] do_syscall_64+0x33/0x40 [ 2456.690519] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2456.691168] RIP: 0033:0x7f9dba2a1b19 [ 2456.691644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2456.693962] RSP: 002b:00007f9db77f6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2456.694921] RAX: ffffffffffffffda RBX: 00007f9dba3b5020 RCX: 00007f9dba2a1b19 [ 2456.695816] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000009 [ 2456.696822] RBP: 00007f9db77f61d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2456.698390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2456.700917] R13: 00007ffd0858541f R14: 00007f9db77f6300 R15: 0000000000022000 08:09:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0xffff8000) 08:09:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x4000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x4000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8e00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0xffffffffffffffff) 08:09:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 45) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2457.123325] FAULT_INJECTION: forcing a failure. [ 2457.123325] name failslab, interval 1, probability 0, space 0, times 0 [ 2457.125304] CPU: 0 PID: 14532 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2457.126192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2457.127248] Call Trace: [ 2457.127599] dump_stack+0x107/0x167 [ 2457.128103] should_fail.cold+0x5/0xa [ 2457.128607] ? create_object.isra.0+0x3a/0xa20 [ 2457.129234] should_failslab+0x5/0x20 [ 2457.129727] kmem_cache_alloc+0x5b/0x360 [ 2457.130303] create_object.isra.0+0x3a/0xa20 [ 2457.131043] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2457.132527] kmem_cache_alloc+0x159/0x360 [ 2457.133182] alloc_buffer_head+0x20/0x110 [ 2457.134277] alloc_page_buffers+0x14d/0x6d0 [ 2457.135565] create_empty_buffers+0x2c/0x640 [ 2457.136973] create_page_buffers+0x1bb/0x230 [ 2457.138306] __block_write_begin_int+0x1d1/0x19c0 [ 2457.139766] ? fat_add_cluster+0x100/0x100 [ 2457.145085] ? add_to_page_cache_locked+0x40/0x40 [ 2457.146541] ? __page_cache_alloc+0x10d/0x360 [ 2457.147914] ? remove_inode_buffers+0x300/0x300 [ 2457.149329] ? pagecache_get_page+0x243/0xc80 [ 2457.150676] ? unlock_page_memcg+0x96/0x160 [ 2457.151898] ? wait_for_stable_page+0x92/0xe0 [ 2457.153355] cont_write_begin+0x466/0x970 [ 2457.154687] ? fat_add_cluster+0x100/0x100 [ 2457.156047] ? nobh_write_begin+0xed0/0xed0 [ 2457.157426] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2457.159037] ? generic_write_end+0x20e/0x3f0 [ 2457.160446] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2457.162091] fat_write_begin+0x89/0x180 [ 2457.163355] ? fat_add_cluster+0x100/0x100 [ 2457.164648] generic_perform_write+0x1fe/0x4e0 [ 2457.165954] ? fat_direct_IO+0x1ef/0x380 [ 2457.167150] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2457.169288] ? generic_file_direct_write+0x368/0x560 [ 2457.170754] __generic_file_write_iter+0x2cd/0x5d0 [ 2457.172254] generic_file_write_iter+0xdb/0x230 [ 2457.173624] do_iter_readv_writev+0x476/0x750 [ 2457.174965] ? new_sync_write+0x660/0x660 [ 2457.176209] ? selinux_file_permission+0x36/0x510 [ 2457.177630] do_iter_write+0x191/0x670 [ 2457.178780] vfs_iter_write+0x70/0xa0 [ 2457.179908] iter_file_splice_write+0x721/0xbe0 [ 2457.181469] ? generic_splice_sendpage+0x140/0x140 [ 2457.183036] ? avc_policy_seqno+0x9/0x70 [ 2457.184349] ? selinux_file_permission+0x36/0x510 [ 2457.185914] ? lockdep_init_map_type+0x2c7/0x780 [ 2457.187457] ? generic_splice_sendpage+0x140/0x140 [ 2457.189023] direct_splice_actor+0x10f/0x170 [ 2457.190414] splice_direct_to_actor+0x387/0x980 [ 2457.191795] ? pipe_to_sendpage+0x380/0x380 [ 2457.193047] ? do_splice_to+0x160/0x160 [ 2457.194198] ? security_file_permission+0x24e/0x570 [ 2457.195642] do_splice_direct+0x1c4/0x290 [ 2457.196799] ? splice_direct_to_actor+0x980/0x980 [ 2457.198197] ? selinux_file_permission+0x36/0x510 [ 2457.199635] ? security_file_permission+0x24e/0x570 [ 2457.201201] vfs_copy_file_range+0x57b/0x10f0 [ 2457.202464] ? generic_file_rw_checks+0x240/0x240 [ 2457.203949] ? __fget_files+0x296/0x480 [ 2457.205179] __do_sys_copy_file_range+0x176/0x420 [ 2457.206724] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2457.208228] ? ksys_write+0x1a9/0x260 [ 2457.209413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2457.211038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2457.212621] do_syscall_64+0x33/0x40 [ 2457.213708] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2457.215142] RIP: 0033:0x7f9dba2a1b19 [ 2457.216225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2457.221512] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2457.223679] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2457.225883] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2457.228080] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2457.230325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2457.232651] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:09:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x5000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8001}, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = geteuid() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000540), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '#'}}, {@subj_type={'subj_type', 0x3d, 'access=any'}}, {@appraise}, {@dont_hash}, {@seclabel}, {@uid_lt={'uid<', r4}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r5}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@access_any}]}}) sendmsg$inet(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}, 0x0) sendmsg$AUDIT_USER_AVC(r7, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x8c, 0x453, 0xb08, 0x70bd26, 0x25dfdbfd, "8e5d2a802b435829a24144580baef9307589dc5125309f1df653faa8a75045187a0f2e736b132cd37b701274cc6f6d71cd0b02583645e3ae2dd5f02c7be53d1e38422942feee7b0b0b02ad2cb25cc58ef6b60381234c41f5add821f0c093e9572195f5ff906f9b7cd7a45f2b5324264c5461a94bd7b67fdb80eb", ["", "", "", "", "", "", "", ""]}, 0x8c}, 0x1, 0x0, 0x0, 0x100440c5}, 0x0) r9 = dup3(r6, r2, 0x0) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f0000000380)={0x3, 0xb, 0x43}) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="ff892e62f47adbd8f887ff042f23fbeb245b74ba3fc29cc3958f9a6cbe73a42613cc133fe515a06f70d99f54eaad8b553b3ef12b4db6c508c7ac810b1b384a0a8bec274a6952ffa18e289340bce7ada7287c3ee1fc5799c4fb9d426b380eb50ff6de87b67f0e59fe69ca3127810eaa30a016d901adbdb6e3c176c9a4d0067a42c0e8fae068c972321b8acc301b3062c8ceea1c6c873f581f9ef12699842c70925353b140d2c5d947c4bb6e5fc6a60bff44e9d1514b634926b5ab87af1e72154429cd5b95f34f3842942d4192eeb4d0a7fdf4d631", 0xd4}, {&(0x7f0000001540)="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", 0x4d9}], 0x2}}], 0x1, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000340)={@remote}, &(0x7f0000000300)=0x14) 08:09:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x9) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x9) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 08:09:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8f00) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 46) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x5000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x68000, 0x0) ftruncate(r1, 0xffffffffffffffc1) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2473.230832] FAULT_INJECTION: forcing a failure. [ 2473.230832] name failslab, interval 1, probability 0, space 0, times 0 [ 2473.232382] CPU: 1 PID: 14550 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2473.233231] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2473.234235] Call Trace: [ 2473.234557] dump_stack+0x107/0x167 [ 2473.235013] should_fail.cold+0x5/0xa [ 2473.235506] ? create_object.isra.0+0x3a/0xa20 [ 2473.236087] should_failslab+0x5/0x20 [ 2473.241024] kmem_cache_alloc+0x5b/0x360 [ 2473.241977] ? create_object.isra.0+0x3ad/0xa20 [ 2473.243079] create_object.isra.0+0x3a/0xa20 [ 2473.244117] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2473.244828] __kmalloc_node+0x1ae/0x4b0 [ 2473.245337] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2473.245986] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 2473.246625] ? trace_hardirqs_on+0x5b/0x180 [ 2473.247181] kmem_cache_alloc+0x171/0x360 [ 2473.247722] alloc_buffer_head+0x20/0x110 [ 2473.248300] alloc_page_buffers+0x14d/0x6d0 [ 2473.249558] create_empty_buffers+0x2c/0x640 [ 2473.250619] create_page_buffers+0x1bb/0x230 [ 2473.251680] __block_write_begin_int+0x1d1/0x19c0 [ 2473.252990] ? fat_add_cluster+0x100/0x100 [ 2473.254004] ? add_to_page_cache_locked+0x40/0x40 [ 2473.254960] ? __page_cache_alloc+0x10d/0x360 [ 2473.255843] ? remove_inode_buffers+0x300/0x300 [ 2473.256914] ? pagecache_get_page+0x243/0xc80 [ 2473.257796] ? unlock_page_memcg+0x96/0x160 [ 2473.258652] ? wait_for_stable_page+0x92/0xe0 [ 2473.259671] cont_write_begin+0x466/0x970 [ 2473.260839] ? fat_add_cluster+0x100/0x100 [ 2473.261800] ? nobh_write_begin+0xed0/0xed0 [ 2473.262804] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2473.264002] ? generic_write_end+0x20e/0x3f0 [ 2473.265246] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2473.266461] fat_write_begin+0x89/0x180 [ 2473.267402] ? fat_add_cluster+0x100/0x100 [ 2473.268466] generic_perform_write+0x1fe/0x4e0 [ 2473.269557] ? fat_direct_IO+0x1ef/0x380 [ 2473.270535] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2473.272269] ? generic_file_direct_write+0x368/0x560 [ 2473.273739] __generic_file_write_iter+0x2cd/0x5d0 [ 2473.274887] generic_file_write_iter+0xdb/0x230 [ 2473.275999] do_iter_readv_writev+0x476/0x750 [ 2473.277266] ? new_sync_write+0x660/0x660 [ 2473.278250] ? selinux_file_permission+0x36/0x510 [ 2473.279420] do_iter_write+0x191/0x670 [ 2473.280404] vfs_iter_write+0x70/0xa0 [ 2473.281202] iter_file_splice_write+0x721/0xbe0 [ 2473.282184] ? generic_splice_sendpage+0x140/0x140 [ 2473.283238] ? avc_policy_seqno+0x9/0x70 [ 2473.284076] ? selinux_file_permission+0x36/0x510 [ 2473.284736] ? lockdep_init_map_type+0x2c7/0x780 [ 2473.285296] ? generic_splice_sendpage+0x140/0x140 [ 2473.285869] direct_splice_actor+0x10f/0x170 [ 2473.286389] splice_direct_to_actor+0x387/0x980 [ 2473.286932] ? pipe_to_sendpage+0x380/0x380 [ 2473.287442] ? do_splice_to+0x160/0x160 [ 2473.287904] ? security_file_permission+0x24e/0x570 [ 2473.288559] do_splice_direct+0x1c4/0x290 [ 2473.289045] ? splice_direct_to_actor+0x980/0x980 [ 2473.289603] ? selinux_file_permission+0x36/0x510 [ 2473.290168] ? security_file_permission+0x24e/0x570 [ 2473.290768] vfs_copy_file_range+0x57b/0x10f0 [ 2473.291288] ? generic_file_rw_checks+0x240/0x240 [ 2473.291853] ? __fget_files+0x296/0x480 [ 2473.292423] __do_sys_copy_file_range+0x176/0x420 [ 2473.293023] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2473.293613] ? ksys_write+0x1a9/0x260 [ 2473.294107] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2473.294755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2473.295386] do_syscall_64+0x33/0x40 [ 2473.295863] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2473.296924] RIP: 0033:0x7f9dba2a1b19 [ 2473.297805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2473.302688] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2473.304802] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2473.306259] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2473.307719] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2473.309408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2473.310866] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:09:22 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f00000000c0)=""/104, 0x68}, {&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000200)=""/37, 0x25}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000000280)=""/32, 0x20}], 0x6, &(0x7f0000000340)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000400)=""/113, 0x71}, {&(0x7f0000000480)=""/255, 0xff}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000940)=[{&(0x7f0000000700)=""/8, 0x8}, {&(0x7f0000000740)=""/188, 0xbc}, {&(0x7f0000000800)=""/39, 0x27}, {&(0x7f0000000840)=""/214, 0xd6}], 0x4, &(0x7f0000000980)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f00000009c0)=@abs, 0x6e, &(0x7f0000000e00)=[{&(0x7f0000000a40)=""/77, 0x4d}, {&(0x7f0000000ac0)=""/87, 0x57}, {&(0x7f0000000b40)=""/105, 0x69}, {&(0x7f0000000bc0)=""/143, 0x8f}, {&(0x7f0000000c80)=""/110, 0x6e}, {&(0x7f0000000d00)=""/124, 0x7c}, {&(0x7f0000001080)=""/74, 0x4a}, {&(0x7f0000000dc0)=""/14, 0xe}], 0x8, &(0x7f0000000e80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x4, 0x2000, &(0x7f0000000fc0)={0x77359400}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x32, 0x0, @dev, @remote}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x7, 0x5}}}}}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000001040)={0x6, &(0x7f0000001000)=[{}, {}, {}, {}, {}, {}]}) ioctl$TIOCL_SETSEL(r0, 0x4b47, &(0x7f0000000000)={0x2, {0x4, 0x0, 0x7}}) 08:09:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x6000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x6000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 47) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x100) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x0, 0x8, 0x9a, 0x0, 0x4, 0xc0040, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x8000, 0x8, 0x823, 0x1, 0x4, 0x2cb1, 0x1, 0x0, 0x5, 0x0, 0x480}, 0xffffffffffffffff, 0xd, r0, 0x1) 08:09:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9100) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}]}}) copy_file_range(r2, &(0x7f0000000000)=0x2, r0, &(0x7f00000000c0), 0x3198, 0x0) 08:09:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x7000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2473.656297] FAULT_INJECTION: forcing a failure. [ 2473.656297] name failslab, interval 1, probability 0, space 0, times 0 [ 2473.662017] CPU: 0 PID: 14589 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2473.668781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2473.669849] Call Trace: [ 2473.670211] dump_stack+0x107/0x167 [ 2473.670698] should_fail.cold+0x5/0xa [ 2473.671210] ? create_object.isra.0+0x3a/0xa20 [ 2473.671817] should_failslab+0x5/0x20 [ 2473.672355] kmem_cache_alloc+0x5b/0x360 [ 2473.672878] ? create_object.isra.0+0x3ad/0xa20 [ 2473.673489] create_object.isra.0+0x3a/0xa20 [ 2473.674067] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2473.674727] __kmalloc_node+0x1ae/0x4b0 [ 2473.675260] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 2473.675920] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 2473.676591] ? trace_hardirqs_on+0x5b/0x180 [ 2473.677156] kmem_cache_alloc+0x171/0x360 [ 2473.677706] alloc_buffer_head+0x20/0x110 [ 2473.678248] alloc_page_buffers+0x14d/0x6d0 [ 2473.678815] create_empty_buffers+0x2c/0x640 [ 2473.679403] create_page_buffers+0x1bb/0x230 [ 2473.679985] __block_write_begin_int+0x1d1/0x19c0 [ 2473.680641] ? fat_add_cluster+0x100/0x100 [ 2473.681195] ? add_to_page_cache_locked+0x40/0x40 [ 2473.681819] ? __page_cache_alloc+0x10d/0x360 [ 2473.682405] ? remove_inode_buffers+0x300/0x300 [ 2473.683012] ? pagecache_get_page+0x243/0xc80 [ 2473.683596] ? unlock_page_memcg+0x96/0x160 [ 2473.684163] ? wait_for_stable_page+0x92/0xe0 [ 2473.684785] cont_write_begin+0x466/0x970 [ 2473.685338] ? fat_add_cluster+0x100/0x100 [ 2473.685890] ? nobh_write_begin+0xed0/0xed0 [ 2473.686454] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2473.687112] ? generic_write_end+0x20e/0x3f0 [ 2473.687685] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2473.688377] fat_write_begin+0x89/0x180 [ 2473.688906] ? fat_add_cluster+0x100/0x100 [ 2473.689485] generic_perform_write+0x1fe/0x4e0 [ 2473.690098] ? fat_direct_IO+0x1ef/0x380 [ 2473.690630] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2473.691576] ? generic_file_direct_write+0x368/0x560 [ 2473.692264] __generic_file_write_iter+0x2cd/0x5d0 [ 2473.692921] generic_file_write_iter+0xdb/0x230 [ 2473.693539] do_iter_readv_writev+0x476/0x750 [ 2473.694131] ? new_sync_write+0x660/0x660 [ 2473.694678] ? selinux_file_permission+0x36/0x510 [ 2473.695330] do_iter_write+0x191/0x670 [ 2473.695862] vfs_iter_write+0x70/0xa0 [ 2473.696408] iter_file_splice_write+0x721/0xbe0 [ 2473.697040] ? generic_splice_sendpage+0x140/0x140 [ 2473.697690] ? avc_policy_seqno+0x9/0x70 [ 2473.698227] ? selinux_file_permission+0x36/0x510 [ 2473.698849] ? lockdep_init_map_type+0x2c7/0x780 [ 2473.699471] ? generic_splice_sendpage+0x140/0x140 [ 2473.700120] direct_splice_actor+0x10f/0x170 [ 2473.700721] splice_direct_to_actor+0x387/0x980 [ 2473.701339] ? pipe_to_sendpage+0x380/0x380 [ 2473.701913] ? do_splice_to+0x160/0x160 [ 2473.702443] ? security_file_permission+0x24e/0x570 [ 2473.703106] do_splice_direct+0x1c4/0x290 [ 2473.703652] ? splice_direct_to_actor+0x980/0x980 [ 2473.704293] ? selinux_file_permission+0x36/0x510 [ 2473.704932] ? security_file_permission+0x24e/0x570 [ 2473.705602] vfs_copy_file_range+0x57b/0x10f0 08:09:22 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYRESHEX=r3, @ANYRESHEX=r3, @ANYRESHEX=r1]) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, r0, 0x800, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x5}, @NL80211_ATTR_STA_FLAGS={0xc, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}]}, @NL80211_ATTR_STA_SUPPORTED_RATES={0xd, 0x13, [{0x6c, 0x1}, {0x48}, {0x4}, {0x2, 0x1}, {0x48, 0x1}, {0x30}, {0x4}, {0x60}, {0x3}]}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x5}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x24, 0xac, "e201ac2770d6554187beaf92050bc67819ec0979990421c1b611659ef6fff7c4"}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x62d}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000000) [ 2473.706198] ? generic_file_rw_checks+0x240/0x240 [ 2473.712436] ? __fget_files+0x296/0x480 [ 2473.712982] __do_sys_copy_file_range+0x176/0x420 [ 2473.713623] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2473.714241] ? ksys_write+0x1a9/0x260 [ 2473.714757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2473.715441] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2473.716118] do_syscall_64+0x33/0x40 [ 2473.716639] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2473.717311] RIP: 0033:0x7f9dba2a1b19 [ 2473.717804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2473.720214] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2473.721216] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2473.722138] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2473.723065] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2473.723982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2473.724940] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:09:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x7000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9200) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x18001, 0x80) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x0, 0x5, 0x2, 0xfffffff7, 0xba}) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:09:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) getdents(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) getdents(r2, 0x0, 0x0) 08:09:39 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 48) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x8008330e) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 08:09:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) [ 2490.539412] FAULT_INJECTION: forcing a failure. [ 2490.539412] name failslab, interval 1, probability 0, space 0, times 0 [ 2490.542265] CPU: 0 PID: 14625 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2490.544427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2490.545758] Call Trace: [ 2490.546196] dump_stack+0x107/0x167 [ 2490.546750] should_fail.cold+0x5/0xa [ 2490.547313] ? create_object.isra.0+0x3a/0xa20 [ 2490.548018] should_failslab+0x5/0x20 [ 2490.549019] kmem_cache_alloc+0x5b/0x360 [ 2490.550119] create_object.isra.0+0x3a/0xa20 [ 2490.550800] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2490.551590] kmem_cache_alloc+0x159/0x360 [ 2490.552217] alloc_buffer_head+0x20/0x110 [ 2490.552863] alloc_page_buffers+0x14d/0x6d0 [ 2490.553515] create_empty_buffers+0x2c/0x640 [ 2490.554253] create_page_buffers+0x1bb/0x230 [ 2490.554988] __block_write_begin_int+0x1d1/0x19c0 [ 2490.555755] ? fat_add_cluster+0x100/0x100 [ 2490.556369] ? add_to_page_cache_locked+0x40/0x40 [ 2490.565253] ? __page_cache_alloc+0x10d/0x360 [ 2490.565989] ? remove_inode_buffers+0x300/0x300 [ 2490.566747] ? pagecache_get_page+0x243/0xc80 [ 2490.567473] ? unlock_page_memcg+0x96/0x160 [ 2490.568853] ? wait_for_stable_page+0x92/0xe0 [ 2490.570611] cont_write_begin+0x466/0x970 [ 2490.571907] ? fat_add_cluster+0x100/0x100 [ 2490.573214] ? nobh_write_begin+0xed0/0xed0 [ 2490.574579] ? __test_set_page_writeback+0xbb0/0xbb0 [ 2490.575943] ? generic_write_end+0x20e/0x3f0 [ 2490.576664] ? iov_iter_fault_in_readable+0x9a/0x410 [ 2490.577464] fat_write_begin+0x89/0x180 [ 2490.578135] ? fat_add_cluster+0x100/0x100 [ 2490.578821] generic_perform_write+0x1fe/0x4e0 [ 2490.579573] ? fat_direct_IO+0x1ef/0x380 [ 2490.580883] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 2490.582011] ? generic_file_direct_write+0x368/0x560 [ 2490.582830] __generic_file_write_iter+0x2cd/0x5d0 [ 2490.584397] generic_file_write_iter+0xdb/0x230 [ 2490.585922] do_iter_readv_writev+0x476/0x750 [ 2490.587340] ? new_sync_write+0x660/0x660 [ 2490.588621] ? selinux_file_permission+0x36/0x510 [ 2490.590072] do_iter_write+0x191/0x670 [ 2490.591158] vfs_iter_write+0x70/0xa0 [ 2490.592390] iter_file_splice_write+0x721/0xbe0 [ 2490.593777] ? generic_splice_sendpage+0x140/0x140 [ 2490.595288] ? avc_policy_seqno+0x9/0x70 [ 2490.596280] ? selinux_file_permission+0x36/0x510 [ 2490.597878] ? lockdep_init_map_type+0x2c7/0x780 [ 2490.599377] ? generic_splice_sendpage+0x140/0x140 [ 2490.600923] direct_splice_actor+0x10f/0x170 [ 2490.602003] splice_direct_to_actor+0x387/0x980 [ 2490.603210] ? pipe_to_sendpage+0x380/0x380 [ 2490.604301] ? do_splice_to+0x160/0x160 [ 2490.605476] ? security_file_permission+0x24e/0x570 [ 2490.606751] do_splice_direct+0x1c4/0x290 [ 2490.607783] ? splice_direct_to_actor+0x980/0x980 [ 2490.608637] ? selinux_file_permission+0x36/0x510 [ 2490.609395] ? security_file_permission+0x24e/0x570 [ 2490.610217] vfs_copy_file_range+0x57b/0x10f0 [ 2490.610929] ? generic_file_rw_checks+0x240/0x240 [ 2490.611888] ? __fget_files+0x296/0x480 [ 2490.612887] __do_sys_copy_file_range+0x176/0x420 [ 2490.614093] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2490.615262] ? ksys_write+0x1a9/0x260 [ 2490.616214] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2490.617027] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2490.617740] do_syscall_64+0x33/0x40 [ 2490.618254] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2490.618974] RIP: 0033:0x7f9dba2a1b19 [ 2490.619506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2490.622136] RSP: 002b:00007f9db7817188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2490.623188] RAX: ffffffffffffffda RBX: 00007f9dba3b4f60 RCX: 00007f9dba2a1b19 [ 2490.624178] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000007 [ 2490.626060] RBP: 00007f9db78171d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2490.628406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2490.630510] R13: 00007ffd0858541f R14: 00007f9db7817300 R15: 0000000000022000 08:09:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8800000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) (fail_nth: 49) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x10) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f0000000500)=[&(0x7f00000002c0)='\x00', &(0x7f0000000380)='&+*\xc0[\x00', &(0x7f00000003c0)=',+%\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='-%.\x00', &(0x7f00000004c0)='user.'], &(0x7f00000006c0)=[&(0x7f0000000540)='9p\x00', &(0x7f0000000580)='user.', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='--^\x00', &(0x7f0000000680)='-$@\x00'], 0x1000) openat(r2, &(0x7f0000000100)='./file1\x00', 0x80000, 0x30) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c7766646ec5a09c217d6a316f3d", @ANYRESHEX=r4, @ANYBLOB=',access=any,\x00']) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c09, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r3, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x1) getxattr(&(0x7f0000000140)='.\x00', &(0x7f0000000180)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/110, 0x6e) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ftruncate(r0, 0x4) 08:09:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9300) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x9000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) [ 2507.167637] FAULT_INJECTION: forcing a failure. [ 2507.167637] name failslab, interval 1, probability 0, space 0, times 0 [ 2507.170801] CPU: 1 PID: 14691 Comm: syz-executor.7 Not tainted 5.10.149 #1 [ 2507.172541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2507.175385] Call Trace: [ 2507.176049] dump_stack+0x107/0x167 [ 2507.177049] should_fail.cold+0x5/0xa [ 2507.177931] ? __es_insert_extent+0x3a9/0x12f0 [ 2507.178971] should_failslab+0x5/0x20 [ 2507.179793] kmem_cache_alloc+0x5b/0x360 [ 2507.180812] __es_insert_extent+0x3a9/0x12f0 [ 2507.181898] ext4_es_insert_extent+0x2dc/0xbb0 [ 2507.182982] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2507.184003] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 2507.189142] ext4_map_blocks+0x8e1/0x1970 [ 2507.189685] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2507.190257] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2507.190868] ? jbd2__journal_start+0xf3/0x890 [ 2507.191445] ? __ext4_journal_start_sb+0x214/0x430 [ 2507.192065] ? __ext4_journal_start_sb+0x1db/0x430 [ 2507.192690] ext4_iomap_begin+0x3ad/0x700 [ 2507.193223] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 2507.193994] ? iomap_dio_rw+0x31/0x90 [ 2507.195122] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 2507.196961] ? splice_direct_to_actor+0x387/0x980 [ 2507.198321] ? do_splice_direct+0x1c4/0x290 [ 2507.199568] ? vfs_copy_file_range+0x57b/0x10f0 [ 2507.200918] iomap_apply+0x164/0x9e0 [ 2507.201990] ? iomap_dio_rw+0x90/0x90 [ 2507.203104] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 2507.204792] ? mark_held_locks+0x9e/0xe0 [ 2507.205985] ? filemap_check_errors+0xa5/0x150 [ 2507.207282] __iomap_dio_rw+0x6cd/0x11a0 [ 2507.208446] ? iomap_dio_rw+0x90/0x90 [ 2507.209604] ? iomap_dio_bio_actor+0xef0/0xef0 [ 2507.210936] ? ext4_orphan_add+0x253/0x9e0 [ 2507.212168] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 2507.213601] ? ext4_empty_dir+0xa20/0xa20 [ 2507.214796] ? jbd2__journal_start+0xf3/0x890 [ 2507.216089] iomap_dio_rw+0x31/0x90 [ 2507.217159] ext4_file_write_iter+0xab3/0x1890 [ 2507.218480] ? stack_trace_consume_entry+0x160/0x160 [ 2507.219950] ? ext4_file_read_iter+0x4c0/0x4c0 [ 2507.221280] ? kasan_save_stack+0x32/0x40 [ 2507.222477] ? kasan_save_stack+0x1b/0x40 [ 2507.223671] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2507.225156] ? iter_file_splice_write+0x16d/0xbe0 [ 2507.226547] ? direct_splice_actor+0x10f/0x170 [ 2507.227870] ? splice_direct_to_actor+0x387/0x980 [ 2507.229277] ? do_splice_direct+0x1c4/0x290 [ 2507.230529] ? vfs_copy_file_range+0x57b/0x10f0 [ 2507.231876] ? __do_sys_copy_file_range+0x176/0x420 [ 2507.233354] do_iter_readv_writev+0x476/0x750 [ 2507.234629] ? new_sync_write+0x660/0x660 [ 2507.235825] ? selinux_file_permission+0x36/0x510 [ 2507.237255] do_iter_write+0x191/0x670 [ 2507.238406] vfs_iter_write+0x70/0xa0 [ 2507.239526] iter_file_splice_write+0x721/0xbe0 [ 2507.240897] ? generic_splice_sendpage+0x140/0x140 [ 2507.242312] ? avc_policy_seqno+0x9/0x70 [ 2507.243493] ? selinux_file_permission+0x36/0x510 [ 2507.244889] ? lockdep_init_map_type+0x2c7/0x780 [ 2507.246254] ? generic_splice_sendpage+0x140/0x140 [ 2507.247652] direct_splice_actor+0x10f/0x170 [ 2507.248904] splice_direct_to_actor+0x387/0x980 [ 2507.250247] ? pipe_to_sendpage+0x380/0x380 [ 2507.251489] ? do_splice_to+0x160/0x160 [ 2507.252652] ? security_file_permission+0x24e/0x570 [ 2507.254120] do_splice_direct+0x1c4/0x290 [ 2507.255323] ? splice_direct_to_actor+0x980/0x980 [ 2507.256740] ? selinux_file_permission+0x36/0x510 [ 2507.258150] ? security_file_permission+0x24e/0x570 [ 2507.259577] vfs_copy_file_range+0x57b/0x10f0 [ 2507.260874] ? generic_file_rw_checks+0x240/0x240 [ 2507.262265] ? __fget_files+0x296/0x480 [ 2507.263417] __do_sys_copy_file_range+0x176/0x420 [ 2507.264816] ? vfs_copy_file_range+0x10f0/0x10f0 [ 2507.266180] ? ksys_write+0x1a9/0x260 [ 2507.267284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2507.268810] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2507.270333] do_syscall_64+0x33/0x40 [ 2507.271441] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2507.272914] RIP: 0033:0x7f9dba2a1b19 [ 2507.274005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2507.279283] RSP: 002b:00007f9db77f6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 2507.281539] RAX: ffffffffffffffda RBX: 00007f9dba3b5020 RCX: 00007f9dba2a1b19 [ 2507.283585] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000008 [ 2507.285650] RBP: 00007f9db77f61d0 R08: 000000000200f5ef R09: 0000000000000000 [ 2507.287685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2507.289756] R13: 00007ffd0858541f R14: 00007f9db77f6300 R15: 0000000000022000 08:09:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x8000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xa000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x8800000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9400) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:09:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000000c0)='\xfe.\')%\x00', &(0x7f0000000100)='%y#\x00', &(0x7f0000000140)='\\\x00', &(0x7f0000000180)='^\xbd\x00', &(0x7f00000001c0)='.[\'@:],^+\x00', &(0x7f0000000200)='\x01:-(#/\x00'], &(0x7f0000000440)=[&(0x7f0000000280)=']+-,*:\x00', &(0x7f00000002c0)='{\x00', &(0x7f0000000300)='\\&\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='#[$\\\x00', &(0x7f00000003c0)='^\x00', &(0x7f0000000400)='\x00'], 0x800) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:09:56 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x10) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f0000000500)=[&(0x7f00000002c0)='\x00', &(0x7f0000000380)='&+*\xc0[\x00', &(0x7f00000003c0)=',+%\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='-%.\x00', &(0x7f00000004c0)='user.'], &(0x7f00000006c0)=[&(0x7f0000000540)='9p\x00', &(0x7f0000000580)='user.', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='--^\x00', &(0x7f0000000680)='-$@\x00'], 0x1000) openat(r2, &(0x7f0000000100)='./file1\x00', 0x80000, 0x30) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c7766646ec5a09c217d6a316f3d", @ANYRESHEX=r4, @ANYBLOB=',access=any,\x00']) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c09, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r3, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x1) getxattr(&(0x7f0000000140)='.\x00', &(0x7f0000000180)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/110, 0x6e) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ftruncate(r0, 0x4) 08:10:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0xc2) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xb000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x9000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xda01) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 6: ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000000080)={0x0, 0x6, [0x4, 0x7, 0x5, 0x0, 0x5, 0x6]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) r1 = accept$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) sendto(r1, &(0x7f0000000180)="b969993761262a8532acc49a3c781ccae8f26a4387737bdfe44d98c6817a240ba4e932d5c8df8fd08802433fdc902b00fa7c6e960fe0b4f66fdabe26811c640c60d175544a1cc3b0cb096a7e97d992b5b27c2a41a3d3a9c0b41d7e7200b5d1c27aa1e5010df2faad42e365d043b064c86e75d54a83387170a0e6418f2b6dbdea", 0x80, 0x0, &(0x7f0000000200)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x3}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80) ftruncate(r0, 0x4) r2 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x4, 0x7f, 0x2, 0x4, 0x0, 0xff, 0x4, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa9, 0x2, @perf_config_ext={0x2, 0xa35b}, 0x10040, 0xffffffffffffffff, 0xffffff5e, 0x0, 0x7, 0x5, 0xfffe, 0x0, 0x40}, 0x0, 0xc, r0, 0x8) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000300)={0xffffffff, 0x3f, 0x1, 0x2, 0x5}) 08:10:11 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x1c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x81}]}, 0x1c}}, 0x10000840) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x101, 0x0, 0x0, {0x2}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x48000) 08:10:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xb4, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TX_RATES={0x98, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x48, 0x36, 0x48, 0x30, 0x74]}]}, @NL80211_BAND_60GHZ={0x70, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x30, 0x18, 0x24, 0x2d, 0x0, 0x30, 0x5, 0x6, 0x18, 0x48, 0x48, 0x16, 0x5, 0x3, 0x1b, 0x33, 0x18, 0x1, 0x24c504848e6d1e52, 0x36]}, @NL80211_TXRATE_HT={0x22, 0x2, [{0x1, 0x1}, {0x4, 0xa}, {0x4, 0x8}, {0x4, 0x3}, {0x0, 0x8}, {0x0, 0x1}, {0x5, 0x5}, {0x6, 0x8}, {0x0, 0x1}, {0x1, 0x5}, {0x6, 0x9}, {0x2, 0x5}, {0x1, 0x8}, {0x3, 0x4}, {0x0, 0x7}, {0x0, 0x9}, {0x5, 0x5}, {0x2, 0x5}, {0x6, 0x6}, {0x0, 0x9}, {0x6, 0xa}, {0x5, 0x8}, {0x1, 0x6}, {0x1, 0x6}, {0x3, 0x7}, {0x7, 0xa}, {0x0, 0x8}, {0x1, 0x9}, {0x0, 0xa}, {0x4, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x4, 0x5, 0x5, 0xe42, 0x8, 0xb3, 0x67]}}, @NL80211_TXRATE_HT={0x19, 0x2, [{0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x3, 0x2}, {0x2, 0x8}, {0x7, 0xa}, {0x7, 0x9}, {0x3}, {0x4, 0x3}, {0x1, 0x2}, {0x1, 0x5}, {0x7, 0xa}, {0x5, 0xa}, {0x1}, {0x5, 0x1}, {0x3, 0x4}, {0x7, 0x6}, {0x0, 0x1}, {0x0, 0x5}, {0x3, 0x6}, {0x3}]}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40000}, 0x40030) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x14}]}, 0x24}}, 0x0) [ 2522.434328] ------------[ cut here ]------------ [ 2522.436106] wlan0: Failed check-sdata-in-driver check, flags: 0x4 [ 2522.438083] WARNING: CPU: 1 PID: 14739 at net/mac80211/driver-ops.h:172 drv_bss_info_changed+0x5c0/0x750 [ 2522.453260] Modules linked in: [ 2522.456321] CPU: 1 PID: 14739 Comm: syz-executor.3 Not tainted 5.10.149 #1 [ 2522.457225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2522.458520] RIP: 0010:drv_bss_info_changed+0x5c0/0x750 [ 2522.459431] Code: a8 03 00 00 48 85 ed 0f 84 04 01 00 00 e8 48 c8 91 fd e8 43 c8 91 fd 8b 54 24 04 48 89 ee 48 c7 c7 a0 24 95 84 e8 3e ba 24 00 <0f> 0b e9 91 fd ff ff e8 24 c8 91 fd e8 df be 31 00 31 ff 89 c3 89 [ 2522.462107] RSP: 0018:ffff88804c147508 EFLAGS: 00010286 [ 2522.462811] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2522.463793] RDX: 0000000000040000 RSI: ffffffff81298f33 RDI: ffffed1009828e93 [ 2522.464790] RBP: ffff88801db08000 R08: 0000000000000001 R09: ffff88806cf37b4f [ 2522.465777] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88801db08bc0 [ 2522.466793] R13: 0000000002000000 R14: ffff88801db09b48 R15: ffff88801db09b40 [ 2522.467776] FS: 00007fd3cdae6700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 2522.468865] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2522.469694] CR2: 0000000000000000 CR3: 000000000d026000 CR4: 0000000000350ee0 [ 2522.470674] Call Trace: [ 2522.471092] ieee80211_bss_info_change_notify+0x9a/0xc0 [ 2522.471830] ieee80211_set_mcast_rate+0x37/0x50 [ 2522.472494] ? ieee80211_set_wds_peer+0x30/0x30 [ 2522.473207] nl80211_set_mcast_rate+0x30b/0x5a0 [ 2522.473837] ? nl80211_tdls_cancel_channel_switch+0x520/0x520 [ 2522.474752] ? nl80211_pre_doit+0xa2/0x630 [ 2522.475402] genl_family_rcv_msg_doit+0x22d/0x330 [ 2522.476100] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 2522.477021] ? cap_capable+0x1eb/0x250 [ 2522.477571] ? ns_capable+0xdd/0x100 [ 2522.478121] genl_rcv_msg+0x33c/0x5a0 [ 2522.478624] ? genl_get_cmd+0x480/0x480 [ 2522.479182] ? nl80211_tdls_cancel_channel_switch+0x520/0x520 [ 2522.479951] ? lock_release+0x6b0/0x6b0 [ 2522.480493] ? __lockdep_reset_lock+0x180/0x180 [ 2522.481156] netlink_rcv_skb+0x14b/0x430 [ 2522.481690] ? genl_get_cmd+0x480/0x480 [ 2522.482243] ? netlink_ack+0xab0/0xab0 [ 2522.482775] ? netlink_deliver_tap+0x1c4/0xc40 [ 2522.483412] ? is_vmalloc_addr+0x7b/0xb0 [ 2522.483954] genl_rcv+0x24/0x40 [ 2522.484425] netlink_unicast+0x549/0x7f0 [ 2522.485013] ? netlink_attachskb+0x810/0x810 [ 2522.485633] netlink_sendmsg+0x905/0xdf0 [ 2522.486233] ? netlink_unicast+0x7f0/0x7f0 [ 2522.486799] ? netlink_unicast+0x7f0/0x7f0 [ 2522.487425] sock_sendmsg+0x154/0x190 [ 2522.487953] ____sys_sendmsg+0x70d/0x870 [ 2522.488536] ? kernel_sendmsg+0x50/0x50 [ 2522.489095] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2522.489695] ? perf_trace_lock+0xac/0x490 [ 2522.490266] ? __lockdep_reset_lock+0x180/0x180 [ 2522.490891] ? perf_trace_lock+0xac/0x490 [ 2522.491463] ___sys_sendmsg+0xf3/0x170 [ 2522.492010] ? sendmsg_copy_msghdr+0x160/0x160 [ 2522.492654] ? lock_downgrade+0x6d0/0x6d0 [ 2522.493278] ? finish_task_switch+0x126/0x5d0 [ 2522.493859] ? lock_downgrade+0x6d0/0x6d0 [ 2522.494477] ? __fget_files+0x296/0x480 [ 2522.495070] ? __fget_light+0xea/0x290 [ 2522.495582] __sys_sendmsg+0xe5/0x1b0 [ 2522.496112] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2522.496692] ? io_schedule_timeout+0x140/0x140 [ 2522.497346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2522.498077] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2522.498768] ? trace_hardirqs_on+0x5b/0x180 [ 2522.499372] do_syscall_64+0x33/0x40 [ 2522.499868] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2522.500580] RIP: 0033:0x7fd3d0570b19 [ 2522.501116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2522.503722] RSP: 002b:00007fd3cdae6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2522.504851] RAX: ffffffffffffffda RBX: 00007fd3d0683f60 RCX: 00007fd3d0570b19 [ 2522.505847] RDX: 0000000000000000 RSI: 0000000020000f00 RDI: 0000000000000003 [ 2522.506857] RBP: 00007fd3d05caf6d R08: 0000000000000000 R09: 0000000000000000 08:10:11 executing program 6: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x20800, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r1, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}]}}) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_any}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@access_any}]}}) ftruncate(r7, 0x2) [ 2522.507837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2522.509179] R13: 00007ffddc2781ef R14: 00007fd3cdae6300 R15: 0000000000022000 [ 2522.510260] irq event stamp: 1581 [ 2522.510739] hardirqs last enabled at (1589): [] console_unlock+0x92d/0xb40 [ 2522.512017] hardirqs last disabled at (1598): [] console_unlock+0x839/0xb40 [ 2522.513337] softirqs last enabled at (1512): [] asm_call_irq_on_stack+0x12/0x20 [ 2522.514647] softirqs last disabled at (1461): [] asm_call_irq_on_stack+0x12/0x20 [ 2522.516003] ---[ end trace 2e56248065a4ea61 ]--- 08:10:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d6163"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xefff) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x27) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) ftruncate(r0, 0xa5a) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ftruncate(r0, 0x4) 08:10:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0xc000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0xa000000) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x201, 0xc2) mount$cgroup(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x1000, &(0x7f0000000300)=ANY=[@ANYBLOB="6e616d653d76666174002c6e616d653d76666174002c72656c656173655f6167656e743d2e2f66696c65312cb870751db5ffff76325f6d6f64652c736d61636b66736861743d2c6f626a5f757365723d76666174002c736d61636b6673666c6f6f723d76666174002c6673636f6e746578743d73797374656d5f752c00"]) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x2) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x108002, 0x106) 08:10:11 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100000000}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000007b88000000000000000000000000000093c51029fc1242", @ANYRES32=r0, @ANYRES32], 0x1c}}, 0x40000084) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_any}], [{@obj_role={'obj_role', 0x3d, 'ns/mnt\x00$\xc3K\x93\xf1#\x19\xe9\x83\f\xbc\xfb\xdb4\xa4\x16\xa3\xa1\xc7\xf4\xa2U\x85\xb0kY\r5\x11\xa1\xa9G\xf9\x87\xe1\xc0\xd3]l\xde\x1dZd\xa1\x01\xf5|\xd8\xe0}@g\x0eE\xe9\xa4\xca\xbb\xbd/ux*R\x9e&#\x19Pr\xf0\x8f\xb4}\x03\xea\xd2\xca\xc3Ar(\xcc\x14P\xcc#X\x13W\x9b\xd5\xdd)U\xaa\xc9\xff`l$\x11+\xe2F\xc3B&\x85\xf7V\xac\t^Ft'}}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}, {@subj_type={'subj_type', 0x3d, '{,@@]*}]'}}, {@smackfshat={'smackfshat', 0x3d, '9pk'}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',acavss=any,\x00']) r8 = openat(r7, &(0x7f0000000200)='./file2\x00', 0xa01, 0x63) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616e733da19eb4d0e5476666642c7266646e6f3dba7b0c3ef8b13f24767a34973f171a89a0ef8ff65af4957a55f63e7b5a3de4ba4e88088ec5104d5d49c4", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYRES32=r6]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x11, r5, 0x0) r9 = socket$inet_icmp(0x2, 0x2, 0x1) pipe(&(0x7f0000000240)) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') r11 = socket$inet6_icmp(0xa, 0x2, 0x3a) fcntl$setstatus(r11, 0x4, 0x44800) ppoll(&(0x7f0000000100)=[{r3, 0x2}, {r5, 0x4202}, {r9, 0x240}, {r4, 0x8}, {r5, 0xa0c3}, {r10, 0x8020}], 0x6, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000180)={[0x7]}, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0xb657) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 2522.749284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31488 sclass=netlink_route_socket pid=14763 comm=syz-executor.6 [ 2522.771083] 9pnet: Could not find request transport: ¡ž´ÐåGffd [ 2522.772668] audit: type=1400 audit(1666771811.772:17): avc: denied { execute } for pid=14761 comm="syz-executor.6" path="pipe:[45485]" dev="pipefs" ino=45485 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 2522.839804] 9pnet: Could not find request transport: ¡ž´ÐåGffd [ 2522.841099] FAT-fs (loop7): Unrecognized mount option "./file1" or missing value VM DIAGNOSIS: 08:10:11 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffc900011f4000 RDX=000000000000c060 RSI=ffffffff81f24fb1 RDI=0000000000000007 RBP=000000000001c060 RSP=ffff88804d3a6be8 R8 =0000000000000000 R9 =0000000000006d2c R10=0000000000010000 R11=0000000000000001 R12=0000000000000008 R13=ffff88800f1081a0 R14=ffff88800f108098 R15=ffff88800f108188 RIP=ffffffff81f24fb7 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb5513e4700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d529000 CR3=0000000045e58000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8229c56c RDI=ffffffff8791dfe0 RBP=ffffffff8791dfa0 RSP=ffff88804c146e88 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f23c47 R14=fffffbfff0f23bfe R15=dffffc0000000000 RIP=ffffffff8229c5c0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd3cdae6700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000000000 CR3=000000000d026000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffff00000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000