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", 0x1000}], 0x8000, &(0x7f00000045c0)=ANY=[@ANYBLOB="757466382c6d65617375010001000000000066737472616e736d7574653d4025212e7d2c7569643c", @ANYRESDEC=0xee01, @ANYBLOB=',fsname=&,appraise_type=imasig,\x00']) setxattr$trusted_overlay_nlink(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740), &(0x7f0000004780)={'L-', 0xf244}, 0x16, 0x2) r1 = getpid() perf_event_open(&(0x7f0000004680)={0x4, 0x80, 0x3, 0x3f, 0xb4, 0x5f, 0x0, 0x8, 0x801, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x432, 0x4, @perf_bp={&(0x7f0000004640)}, 0x48000, 0x70, 0x0, 0x1, 0x8000000, 0x58, 0x3, 0x0, 0x8, 0x0, 0xf89d}, r1, 0x0, r0, 0xa) 03:25:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/122, 0x7a) 03:25:43 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 195.481205][T26039] loop2: detected capacity change from 0 to 262160 [ 195.506579][T26040] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 03:25:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:44 executing program 0: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000828bd7000fbdbdf25380000000c00990040000000000000000c0054004f0000000000000040a46acaf37933ea909a8966ad01cc75c1967a3610ecc6ed6c116299e4c8af2be512d519accfbd6a0110184a0b12a25fa5dbd81c7bd225c071015ea3a7a521d9d20f5db17782b32fe0018926476f92b953844799dcc6a13634cc78b3772e57d7735c53e1c7a01ed7e536e1d2753b3b7618c2176d3c3b7e1b2ddfc2500086baf74b6debcaeb9e"], 0x2c}, 0x1, 0x0, 0x0, 0x20008001}, 0x404c004) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r0, 0x2, 0x70bd27, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0xb, 0x7, @l2={'ib', 0x3a, 'rose0\x00'}}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40008c4}, 0x4000000) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="1c0200bc970011000000000000830bdd4992b373f1"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000003c0)) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r1, 0x0, 0x100002000) r5 = accept4$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10, 0x80000) copy_file_range(r5, &(0x7f0000000140)=0x101, r0, &(0x7f0000000200)=0x7fff, 0x1, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x6000, 0x80, &(0x7f00000002c0)) r6 = syz_open_dev$loop(&(0x7f0000000240), 0xffffffff, 0x10000) ftruncate(r6, 0x80000001) 03:25:44 executing program 1: r0 = open(0x0, 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 195.953641][T26149] loop2: detected capacity change from 0 to 262160 [ 195.976789][T26157] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 03:25:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x10002010}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:44 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) [ 196.078117][T26265] loop2: detected capacity change from 0 to 262160 [ 196.114378][T26264] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 1: r0 = open(0x0, 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 196.189911][T26348] loop2: detected capacity change from 0 to 262160 [ 196.211311][T26372] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x40, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@noextend}, {@debug={'debug', 0x3d, 0x7}}, {@loose}], [{@audit}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r0}}, {@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@obj_role={'obj_role', 0x3d, '#%'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@measure}]}}) 03:25:44 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 03:25:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) mmap(&(0x7f00005f9000/0x1000)=nil, 0x1000, 0x1000001, 0x8010, r1, 0x24cb6000) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[], 0x11c}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100002000) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000030) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40402ba, r4}) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="de6cde9d5682571e08f92c669a2d5f50f113ab2553e0cea201f42fbab5da6058d497c5afc43159d93ee3234bdb130fbb56e3a41be9fdf3a1702fd51ffb790bab8a9684be555f04e2392d5df0f237ce4e9b4c87b372fb1708b23627ed545b1a6e9dcbb3dc17fa93bf9b8d28a3ee2c3f04ef44c7bd9456bfbca83e9fd45dc6f1e1f9447a6f127d4ab5ec326ae03e900f563d7d39ad393ddee52f0d362bb0f653b96d41ced40751ecde32e0f796a4cec31c3cfce1510b86bba1557ae263602566771d3601a881", 0xc5, 0x40080, &(0x7f0000000080)={0x11, 0x3, r4, 0x1, 0x3f}, 0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@mcast1={0xff, 0x5}, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4009a, r4}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xbc, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x2}, 0x44015) r5 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x3fc}, 0x0, r6}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4040000}, 0x20004820) 03:25:44 executing program 1: r0 = open(0x0, 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:44 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 196.574284][T26378] loop2: detected capacity change from 0 to 262160 [ 196.603154][T26406] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 0: memfd_secret(0x80000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000440)=""/4096) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20100, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0xfffffffffffffffe, 0x7, 0x1, 0xf7a, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)=0x0) timer_create(0x5, &(0x7f0000000280)={0x0, 0x22, 0x4, @thr={&(0x7f0000000180)="af", &(0x7f00000001c0)="c77fbb81866caae4aeba7280db9aeab9bb81018252a4dcebce892380f5b6dc7ec4e4c195e7af1b36ceb8352dcb8b190081ce7fac9d5ad58ea0bbf666fbae5c77139a24431e3a2141a0201b2ccf13d95ef9ee35ac24dd2b002fa6c79610535ce2e64eb03a06f8f912827799981ce445d83e9845ca01bab04c24f30d9b596d7d8d099304fdd4dc6ecdccdafd42f91782a650356d24be6847526a74daac937a59785b09422f38ceff0037e7c116d465094b03892c34"}}, &(0x7f00000002c0)) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) timer_settime(r2, 0x1, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000340)) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xe9, 0xa, 0x3f, 0x1, 0x0, 0x9, 0x5002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x200, 0xfffffffffffffff9}, 0x8000, 0x3, 0x5, 0x0, 0xffffffffffffff1c, 0x7ff, 0x6, 0x0, 0x3f, 0x0, 0x7}, r1, 0x0, r3, 0x2) timer_create(0x5, &(0x7f0000000380)={0x0, 0x3b, 0x1, @tid=r1}, &(0x7f00000003c0)) 03:25:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) 03:25:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 196.690282][T26490] loop2: detected capacity change from 0 to 262160 03:25:44 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000140), 0x6e, &(0x7f0000001280)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/109, 0x6d}, {&(0x7f0000002840)=""/42, 0x2a}], 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000001c000000000000000100000102000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0}, 0x10000) r16 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000043c0), 0x800, 0x0) r17 = syz_open_dev$ptys(0xc, 0x3, 0x0) r18 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r19 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r18, r19, 0x0, 0x80000001) r20 = signalfd(0xffffffffffffffff, &(0x7f0000004640)={[0x2000008]}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000004680)={{{@in=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000004780)=0xe8) r22 = open(&(0x7f0000002740)='./bus/file0\x00', 0x14d842, 0x1a2) r23 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r22, r23, 0x0, 0x80000001) r24 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r25 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r24, r25, 0x0, 0x80000001) socketpair(0x23, 0x55ed674ea5895d42, 0x1ff, &(0x7f00000047c0)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = syz_open_dev$tty20(0xc, 0x4, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004880)=[{{&(0x7f0000001400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002480)=[{&(0x7f0000001480)="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", 0x1000}], 0x1, 0x0, 0x0, 0x90}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000024c0)="2a97df7b0542e94a35559e72c34cf1b2e6d0539614d2cdb5947884c15aca8c35f4d26e658ea379c7dd11bd8db1308235aa3c5ad6d21e90b38deb4d2b55c3a233bd14ae248b34c76e056e3daa0b6aec173869b5af8fdc156e09", 0x59}, {&(0x7f0000002540)="f4a03c7d79ab9d4a3c2510a2a766d218fb89fd59", 0x14}, {&(0x7f0000002580)="be923ea45d2666137f782c95565b123b748cac32dd9392086472ef6743440b458ccd4e1d4c56db018299728cd5c74449207d81b9198a331ac590e56881", 0x3d}, {&(0x7f00000025c0)="f25772ae99959909242b3b24b7bbde41dff972121577f453c9abcee6324769ec6e64262bb6e5aedcaeaea35a9febda3b1766a26cc81d8c17f39c128030cd2e383c4d3f8d08bfa6026dcbc7117c41507be64f7f1872d0b7100af6a49b658f69e08d169d31296c91d0728247eb706479644ccda5", 0x73}, {&(0x7f0000002640)="9ab0f78873d269761d137fdd7e9ec70d46f68440870e2bbc3a2c9818487470dd877ea3f126a69129fc7c4be45ce84612cb4b2ec3345562408d984f9feb55f744e4aff383335c778e5ff48a74ec7ae778f1363b5df3", 0x55}], 0x5, &(0x7f0000003ec0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r13, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r15, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="000000001cf7ffffa7f44570c68e526302008000", @ANYRES32=0x0, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32=r10, @ANYRES32, @ANYRES32=r14, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xc0, 0x800}}, {{&(0x7f0000003f80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000041c0)=[{&(0x7f0000004000)="1905001266a50aa5744d6765d99f7b98f33db1d362d4a40d54d0bb1dd40a97809cf1d6c50a7d98125ec109bc181d9d8228e7b79d0b3ba7faa527b7d134fdb7dec23eaebee20e51dce8b1", 0x4a}, {&(0x7f0000004080)="bb293415608074864c8d9a604351dda603402886bd84b68fb11e85c69a9b9a63dcb0ccbe91e82a3cb70e19b0d4505fc2dcacd2b57acd5b9748b448", 0x3b}, {&(0x7f00000040c0)="11f14db146d2177b4c", 0x9}, {&(0x7f0000004100)="63169992eb5a497676343a51994f9d56e6195b37ea46fe946c36f889208b211c467ab9012ad77c7a1664ba3c557085e780054f52cdeec50f5dddde33689c5b76ec13109eaa1f1863b67f69a118826400538dd570f04f3679c81df3d509fd96c839e3911dd18494d8532e59e7f24b069bcbd9aa122ff444c05e437b9b68823f2e80770c8aab798c46ad093fcf0fd12542972bdbf15cd4dcb5b80f6d53d9ec027d11f3f69a3ee92fe6616219f7af27", 0xae}], 0x4, &(0x7f0000004400)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r8, @ANYRES32=r6, @ANYRES32=r10, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r8, @ANYRES32=r7, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r12, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c00000000000000010000000100b332", @ANYRES32, @ANYRES32, @ANYRES32=r8, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r19, @ANYRES32=r10, @ANYRES32=r5, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x100, 0x4000}}, {{&(0x7f0000004500)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004600)=[{&(0x7f0000004580)="69efe913edc493929cee8c5d77a670e29558b267d694cc4820e92716921856afd9ae27205147a684657ad3a11ab8081c1065314ed6d3f1ac3c809b1619c1a708fcaacea9aaceba6a0d31e2c805", 0x4d}], 0x1, &(0x7f0000002780)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r8, @ANYRES32=r20, @ANYBLOB="6a19213278f7f5105a958094000000000600000002000000", @ANYRES32=r0, @ANYRES32=r21, @ANYRES32=r1, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32, @ANYRES32=r10, @ANYRES32=r22, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r24, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r9], 0x80, 0x4006001}}], 0x4, 0xc004) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x10000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x7fff}}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9, 0x81, 0x0, 0x72, 0x0, 0x1, 0x20500, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x4929a, 0x9, 0xb8, 0x9, 0x9000000000000, 0x6, 0x8001, 0x0, 0x8, 0x0, 0x100}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 196.753657][T26594] loop4: detected capacity change from 0 to 262160 03:25:44 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:45 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffffffffffed5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000001000000180000003b81fce894e2016b2b93a19cbb7fd40c546dc93fdc0b9463fffd8f4c2f602cb340e2bce477693be1f32a0aa43807b65cc0abd80bf1cd3b1e07bec78fc508ce06471e0154c7d1f5dabee8c7f1ac90b1a06208347612be99de3d6cc94cf64a0a04d729118c3ef0499ecfe2cee122a9c64641c60e6d2e8e3e", @ANYRES32=r0, @ANYBLOB="01000000000000002e2f66696c653000"]) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.time\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100002000) 03:25:45 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fdatasync(r2) sendfile(r2, r3, 0x0, 0x80000001) tee(r1, r3, 0x2, 0xc) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000100)={{r2}, 0x81, 0x400, 0x80000000000}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r4}, &(0x7f0000044000)) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x8, 0x0, 0x1, 0x81, 0x0, 0x4, 0x20000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa4, 0x1, @perf_config_ext={0x7fffffff, 0x4}, 0x400, 0x0, 0x1, 0x2, 0xfffffffffffffff9, 0x6, 0xcb5, 0x0, 0xfffff801, 0x0, 0x2}, r4, 0x10, r3, 0xa) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:45 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) write(r1, &(0x7f0000000200)="4bfe8d32c1649e1b1ebf0f069839dd194092a8e6dedb0f13ba75299797c1eb07644bd3a7488ed592411a391b986ca0307395cb4161fafe2287536b11f755a757d6e3e5f7693e56b4077ec34cacd8ba852eb66b9b998e36415783595313fd56727b20d3e8d832e520310c30c6d363713fd56714e312a639f7c889294985f6ff11a6cb524fbf930865798c783720c782e0ca3fd42b185c03dacf6d1b90c0a8e206da7985f7116bde90ef6c033144a8bfe6c84f00f900fbc3ae8b380568e8e2efc22209b006150e78421e2299cb07f77f27fee44e2c06f115f9aefb29d93466112a12f9c4feb56088b7d5201d6e06a11f945e73d49bdf036857436f9320742c18bc64d061a51187dd769d6343549231276936a25d55d92b837e4f62012e20c6cc779ee1e44b5dc68fa55b964fd66790d2b1c5c30c26b5ae2a2a1284b7aa44f8619266561d6067e68d1f184d0a43c598a86391345b1b777ccb661c91da0ee528f5cadf7088837d3fcc9c7f9f0a1bf31ee3e3bacde8d47711c51a29623e65595059a7715a34b0adca884751d4bca5068a8ece6970e2152cd842ba11b918debbf35113215d495e628906b632e7aa2c27e36fb174ad63844e1cae10bf0ada454d7d21c320359fc7cfc3d6a432d0dee6ea3d2bf604355efdde0777301d586e72ae8ec2b4d300d7d965e5062daa9bcc664126ef1d7f5ecfd3d7ae6d883616a9a4a7c26a1d4af3c44baf25de5437c6f31f1431806d5be2095732878cc66303da85d6c515cd54d0fd40908a19bef1c088410057fb92f4859bbe1f56e8e0a2b00c8d22f676d8c4ae33ed311f40916be4bb8796d998571230ff531333aaa184500be5a18156f4621f661c7f1597e9252c977248c342355c8757675f8d538711a937a1dcde25482e8e7531634da40634627dd6d2fa81cd3d3d9c95ababed0f9abce6b4fbaee165b24e674b53838c4a39d406c5b775797fca8cf9e2ec99cb5e398c3bbe297e56ebd247953bb6343cdf1defd0aea8bebdf62a3419b16d08ba9f2e5c1a64ddea4fd1c156851d90e76cf1bc958f8f39306f8df3a82bef3668bfd59ac62c8d0f242cca970456e03eb53f5cf43a48ee4c67a8326c4bedc54672d46a8c3d2fdc0103f4a3770be81e65aac9abe8fdcfe27c56ec13b2a3fd0332a684c7b91b99bca712820d8cb883501fa80ebd01c01e132e418bd44c994a13f099768301fe052fb4af95fd2773d511daf1a94704c7a59e17c9eb8c96c07440480394e74b275ab738143be01641d3b52eee32ae1d617f9f32af90eb0b3ab42adf8d77b68aec0dc2cf338ce7235a9d037c38cb055ca400ab4ca41173990d69dfc81ee9a8db13e3eceeac4058f052107721b9354bfe43a72edc0d6111b8ba1c0d4d7b4e66425b552aff02662e515ee5c67cf54f0c73eb0121ee6bb9b841a46bb1f6d2a17daad5744b838b4490ea3c068e783d1ef2bd45f253707ed5a078fb89a4fcedc6fe66cf7f956b6e2ac9680c13bc891d17063b6b2419192cfaf8d9d508c725dcdae703576f7d703f0ac0148a7d62e838d42e638682dbe29730016c5c8b5afe8c3044d3aa64c6d5995ed5c811e4fa38cfeeae4af41d1961351cf0df30ca089867b70d4bdf4d7c642d97405d930105cb61c186a7d3695b0f34a72f65b200f20c16cfd55f2aeea295a987549a3e28e54a201fe29b4673a49c688a9e1823adb13726d94f56688aa12da29874920029e9f560070fd572852caf30e19de048ba6f04744147f436e5830d0255909f2dec7f5af28282c9c032272480cfa36cedf490726a05eac9599ffdcfd0d06b06a9f0bf34821cda52b19a2bc1fc0a0e1ce41ff327439b587ef8031bd1c769a7e80e363fd839cde3ee377e2853296455fe81be80c543bc466355cf010469febc4f5ef399ae92cd977d93e6a8aedfccfd694079b3cba80e6ff48f1391ff0f62c806c23cca103de8257f1b99b12e7ecbcb21b5d72a6d0d3a7beb79d01f1d56d894fcc84e2fb26212a00b1ac1cad251414ae35a9733ac4f297ba24190106e914134e7e9021f9a1ad3d0957e3d1de3207ed3ede552197ec0a320e0a07527533165b211ee3488a2e06ede17fc07a26a182f2e35074072ec8a475237302abe41eb10f8dfb3fde85d36235ea874d518329dee60cb5358cc0dd2a90d6fd683015bb168f3fd09f170c83e70618fc904eba1e04469797089b8dd1e2bf8ed359d88d70154fb612c5b41ad5d8e9a9c2526e02933d82262051b84bb269f0f3f44627d2ab958b6b4e3483a7615502f316576be6dbd213f60ba10e96c4f0f786cf1de6933f26fb73a6fcef2f1ea9acbb4e7e38410d5b0dac38f6638b7d73c4ff4ffb0041f584733d734726048841475e60f93ea4b174eb169058f740c8d4916f87a983209dc1155d461bd7f6b807e8d01241d73a89e93ae90734401accb5fa67bfa4413b742f646e4d2df8ae86d6eee15febad75c702245e2dcf6cdf05aeeb9bd65786bcf02588cc2360c0bd4ae10ef26a08b3af2e91a76aadfa509fe2d0c828897166ac1baf2889ff339a2ec2cb44453e27b1f6ae54f8016abba2897a28ec7ca196b328e3955d66aa25a7e18e52d006a73624db9b99f34441b9c5fb5eea583d082a933e37ec377504e8476763ea969d0716b87fdfa5cc4a3a874bba47bff1989d162468f3d2828e9507a456c892a6129071d9f653e008c9b5963f6358c4318c3b803b44b797c99e9facf3f7285ba2b867227042e84ae45b595b537a404ca77cbb611985349d49d105d9e3e06da24c7aade234611d6d97a964d1589277aef731c15b61c820a679970cd3e543f94f0dec214ab7292820d18fcbbfd4c9823e85a67e51dd72d35041f0e310ca92f02faf9d47f2f4bbc104c3ce7596ab95bfd2ab330b7b0facb341d025fadff4023d1fda200c6b5f98b3f8ee06df10cb8638f4d95e4c90ace50d098616f4b345c090580a6c3d1bcd64abd678adeaa154609603865319532a338c9b17ee74203fa96d94d4ef7a59adcd1d1df8ecba81a91481f4b183f5373c73865ed5acd95193df915dc8fe38ebd0327d3a7a1997209576398811797c790f5a1b93a61b9f79a1054c427df3eea992ce8239cde9e047e8b661195fa6fe9ef52be863a6229fdd02b4cf433fcdc42747e557589345821470b8e165391b888475739818e13ea653f0673c245a45a0099c6f132e52a29d706f62b7be4e4dd7319cacbd9b6e54c6e1c45d1ac98ce6afbd069ef7ce76e249ea618377919f2746db13927ce66209ea4d9d639d98a2cd74d2a58985fe2ae75a3aeac0b8378799c45da6c3c818673b24d7cf525d27d62939fa0673f73157a3d651824b6f8bf3e0b3c3d8bd8a34a2ac1eab6e9f5194f5e05bccf258c533f5c5e8d4c0127a25bd6e50d105c97c35a7e82044b06befd639efbbb72ddad88e5040688beb0df88dca7a94ec04b3c7caa1144f3f1213c9199ec8bf91449ae40ee7e7c555650fff947f762e81e7cabab9aec2d227bf5c90f7b656cdb70ed4c1b4ade0b9db975a64c0ebdcd3e8804bc7e9e7285d266b494b8787d99d628ad96390e2a6d4d5b7593b6db095c5db5e5406ecbce24f817787be6a76b570577474f7a1f6b7a02a5c0499b2364847b9324b3c31af7cbc3dcacf35c40c3d198b4c30f0149fc6db32e0050294ca7418e6aac6300f9537cb4f7ed41fb613a8e47b86cef4999822faf9914180d2ce548b176ce9d439224ac490f4827b1f193bd3a87f99c24e031842ca311e61fcd8015b6b69b59aa559e095ece6fd224445c9c9b079b9c25a4c7708fbdaf960c9248670689c3ad45e9554f3ae5c7b6602ea07965250b09a40788bc5a3afa8274f6ca81bd9d4c1260bed5c18050ec294c473f9dfdc4f04e8a3a669548b4c4141528bab8dfa2a8523a75187324dbb28a83dbf14b8a42afd7632037e58f2aca4d16cf0f4429cbca66d19bc721075eb03aba9619f4f68a9d08dc4d69d3a3837d8a10e11754475835cd89dc48694b2df2b57d9700a6f9fae99a3cf8731913ce6bc346edf94c18f0ed449e153361adbaa1c295cda7a7db545cdf482a222b82aa236925e03fada7128346a52fe6f04bf56ac0b1dc97e1191a664a84b2b6c3526246c240a466016e73afc702447ed65d02ddea714ca5ce400f4ffa3c58cb42b80ad9f34b9ee0a17707441d22985615ec84e281146f25e8086ec836c3bf27bb685e9cbf759e39dcb6f0fdaf53cfc97372432f14d1d3fc8750e2299f51bd1c630d81778f84222d4dad595bb3a809bc6be14f73c178b324752bbd4f31383e7ba032d5bb3a662a84400bd57e2c8175642ad6b1675ce6025b0958727a0a5450181d77575da982b2f90112733548a3c97a8c4f984d8d05754df2c535a4501868e7e622c0d43ec33a643e2efdb66738af7e467fc763233bc386d074c6872752c98281bd234d589e9f2a055cc095caab174f1a42fa250a1090384425ef61fe6511aae8950c3e06e4156113753dcd2a647c7e7aa0ff55a2030375ffb53183b010ffb232045e520637188d3339ec724ff390d57f3aa54bd554852c2859e4f68eb7a4c806af019df0aefab7d75ed60b0cc8e86c71cab1864db1095b7364af8c228f8453f517842a4fe152e9b33eec3cd3f5f0c77a317d549cd3e1bfc85449f5815770794c2890e58053c11b2bffee6b941b8d8eb685f98b1b6906a3e96617df23330932bf65d133dc52b18318a6a584dac92a11986d6480aaf1c14ff6c603c1c0830a5ec34113ad62b6c02e2d956e87dfc630db0cc2d54b5719b586ef81ded51a8770940d70491479f24b08b09b3f2d58c31aea89e06d5d08efb893208ff9c9721814eaf29ec08436eb27e5809c5bbceadaae7af51688c1bc9ee4bc5a0d5ed80a22d79591480bc29c90fc508eefa27622c5446160eca621e8d3dec0698895cbbb7a15bc57295d0e70b69333d33add2a9cbd9e9413fb19c24fcc45dbd1f1c52090bf7fabbed41173c6f2180acae713778f670e5bb0f7f46f9b9b862029c28ee7792cc0327f850a709f3ab48236d09967181aae8566d00b12faef79a92399c8242f544248f71521b900b9a2e35ada63c633f2fc7da50294e505af4f39d4fbd045d698e68d1e1ae4f305cc1e0efd4f22b669c940753f12b5d42616db3659eae49fc01e42d00ee17d10b1829ef692c4000a578fec9b6bbed7a5fb7b4d546122164982a9dc3862e13d17dfbbe8baa693c5426d3b93a1398aec4d89ab381aaab541acd453c2959db6eac684f70323eb58c3c510baa01d1559ac2efe6017ccc55477cac9eb48c51e833affbf88fee31c2a1d6076d3c930fe514f681f01eed858c29bdb90ad67872a203a20a6642d58510fbfef840d3df94cbe2ab476ca6717bffb6ac3878f19415f0e4afba7b429b9591635deda0a01406c24d0e0c42466dcdc1ac7271fbce2b434676efbc0f5a75008f9a5d5ed17c1b413a89b6f6a0915164709668656b846f294292ce4c757990277c138a33ac75f61be9b6e81c7e68be7634745a30eda428c9dd0f83527e8310635485679ba4dadf856076c9879b826875ca9a4233e60c1ab003cf2b3f8adff66fb06a7f013acbb75a6c762e708a00ade80a95585c5779956e34c384f044ada65af183d2172052ecf57720142e0397df2a4c92edd4d804fae8e5f6e25214968c7680481d08de4d6d2a68be143ee771b1e7316f38f788bbebbcfbed6855347e76f75b47f86b63f285c9db2e1f6be8b218865afe7c9115ca2cf425780c644731af60762728c89ccf07a2e052f33cf85749241efe2f158f0c65869ca33419658583a16b94563e4bd51f6", 0x1000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100002000) [ 197.194500][T26707] loop2: detected capacity change from 0 to 262160 [ 197.202928][T26710] loop4: detected capacity change from 0 to 262160 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), 0x0, 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) close_range(r0, r0, 0x0) [ 197.290052][T26795] loop2: detected capacity change from 0 to 262160 03:25:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) [ 197.351085][T26821] loop4: detected capacity change from 0 to 262160 [ 197.483835][T26928] loop4: detected capacity change from 0 to 262160 03:25:45 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:45 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 03:25:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f00000000c0)={0x4, 0xbc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100002000) 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 197.726627][T26932] loop4: detected capacity change from 0 to 262160 03:25:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 03:25:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 197.844646][T27003] loop4: detected capacity change from 0 to 262160 03:25:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 03:25:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 197.969317][T27055] loop4: detected capacity change from 0 to 262160 03:25:46 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000065490000000000"]) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:46 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 03:25:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'cgroup.controllers\x00'}, {0x20, '[['}, {0x20, 'cgroup.controllers\x00'}, {0x20, '\\*'}, {0x20, 'cgroup.controllers\x00'}], 0xa, "08970dfe661822f48bcb94621f5560581dcd26885ae939e0afe55a30b9f9bcc8fa603484d0e9e696d472d2079a7367aca3fdd6d7a950cfd20cb0e3a128714029c0100d018dabe3988ee1ecd00ca75753a172644a600b100b761a38c1c91ad08bfc1551c1b696cbd747a998fb8da79c18816bd266abdc8782a3abe1d6ce2088a5598854476c7964d439c12be02b8eef89e90e5da4b3a43026d108535e1e109bfc960ddef598cf3070cc58cb3cab1099680e6742e8d0c1552de4f057d63de3c1363c34aa5c66fd959173209a05a433c9a3"}, 0x11d) sendfile(r2, r1, 0x0, 0x100002000) [ 198.194591][T27060] loop4: detected capacity change from 0 to 262160 03:25:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x800, 0x8, 0x7, 0x0, 0x10}, 0x0, 0xd, 0xffffffffffffffff, 0x2) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 03:25:46 executing program 0: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x42810}, 0x20000091) r1 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x6c, r2, 0x1, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x8, 0x37}}}}, [@NL80211_ATTR_PBSS={0x4}, @crypto_settings=[@NL80211_ATTR_SAE_PASSWORD={0x31, 0x115, "2b8150ed540aa5efe774c90eba5daf3b197454b789acd2e3499a0e708657c069555f91449f83d17084f7fffdeb"}], @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20040810}, 0x24000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 198.336650][T27178] loop4: detected capacity change from 0 to 262160 03:25:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f00000000c0)={0x4, 0xbc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100002000) 03:25:46 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r3, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:46 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0x7}}, './file1\x00'}) execveat(r1, &(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000480)='/@:-@\\\\\x00'], &(0x7f0000000540)=[&(0x7f0000000500)='^]\x17@\x00'], 0x1000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) recvmsg(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/132, 0x84}], 0x1, &(0x7f0000000240)=""/85, 0x55}, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)=']].*\\:&\x00') [ 198.812368][ T23] audit: type=1400 audit(1635823546.931:1571): avc: denied { tracepoint } for pid=27289 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 03:25:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 198.924060][T27350] loop2: detected capacity change from 0 to 262160 03:25:47 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x20, 0x81, 0xfd, 0x0, 0x8000, 0x85002, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0x2}, 0x8100, 0x3, 0x4, 0x6, 0x7, 0x1000, 0x9, 0x0, 0x3, 0x0, 0x9}, r1, 0x7, 0xffffffffffffffff, 0x4) r2 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x2, 0x4, &(0x7f0000001340)=[{&(0x7f00000001c0)="4e950561c321", 0x6, 0x1f}, {&(0x7f0000000200)="01032a5742c2648e1b2f7d7c9eec07cb47a4133b7e071d87f92fb6a789e518db14ae8ac693e47de8ecaacbeba0e4973d5b4ab08afa7baa43e09fda97bf86c03219ec8919b16f2b5b9b8357b2f26a6c766a50dd81a00852dee2d5a35f1f", 0x5d, 0x9}, {&(0x7f0000000280)="639c795a2a19087fffbc69c105d149b465796a3592f9fbf16603e5c00945f649028f4bb90fbc7fe8a1a9e1e59fe9cff0067f61aeafcd291712ae522b827ac50017751ddc89cb207da3c59347f288ed833bd61488fbcca04f6e6b8c2a3737c55c5d2b3dd20dba030ad55eb12b41dcb5b62fad56cf776a59a3326e85fb1bc576490958f16468cab512a71b0e2f4c296a0c5718438190a8c314e8d27badeb117325bd5c10d8036f14c2bfd094d966f5a4", 0xaf, 0x5005}, {&(0x7f0000000340)="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", 0x1000, 0x8}], 0x2040000, &(0x7f00000013c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x30]}}, {}, {@huge_never}, {@huge_always}, {@size={'size', 0x3d, [0x25]}}], [{@obj_user={'obj_user', 0x3d, '}'}}, {@hash}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fowner_lt={'fowner<', 0xee01}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) mknodat$loop(r2, &(0x7f0000001480)='./file0\x00', 0x100, 0x1) 03:25:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r2 = syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x1000, 0x5, &(0x7f0000000500)=[{&(0x7f0000000300)="a2fcc8f027e7d9db4fcb89a71f54456e29ecdf46ae2b31322f2fd3faed2f53c592413ad821a3ad54a7a10be125df1d8592bf2d93d97f4196e3ca862cc050015b0e3505b86aeb5d09fe", 0x49, 0x721}, {&(0x7f0000000380), 0x0, 0x3ff}, {&(0x7f00000003c0)="eea44f59f7128ca10422c51de1e40faef1ee8d266571a7e48dd7d330f8cd04ebb3cab2be2013d5817a4514095adce664f60b4b236de0af5d13a60b708c85de5efb168d270c2df4b0bceaaabd9dac9d", 0x4f}, {&(0x7f0000000440)="4ab0a32c5d448f2e4f645a935d66cf486606b66f84e94b498e9f8361b5849793abb6f43ad8db598bcf215108a8f91324cd93133a465f1e4c28104cc945429f3fab375050bb0a1f5f845786a5838ff370b9ffab6fd713", 0x56, 0x7fffffff}, {&(0x7f00000004c0)="de9f9642aa8daf6b49830081ce1c2e44dca72fe6f1396cd9357822d193", 0x1d, 0x5}], 0x4, &(0x7f0000000580)={[{@jqfmt_vfsv1}, {@block_validity}, {@noblock_validity}, {@noauto_da_alloc}], [{@obj_role={'obj_role', 0x3d, '.*'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@smackfsdef}, {@dont_measure}, {@dont_hash}]}) fsync(r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x1, 0x4, 0x3f, 0x0, 0x10001, 0x40, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_config_ext={0x5}, 0x40, 0x200, 0x8, 0x9, 0x8, 0x7fff, 0xfffd, 0x0, 0x58, 0x0, 0x6}, 0xffffffffffffffff, 0x8, r1, 0x2) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) fstat(r1, &(0x7f0000000640)) r3 = open(&(0x7f0000000180)='./file0\x00', 0x220000, 0x191) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0xaf, 0xff, 0x81, 0x0, 0x7, 0x280, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8c1, 0xe, @perf_bp={&(0x7f00000000c0), 0x4}, 0x45008, 0x3, 0x4, 0x0, 0x8000, 0x1, 0x4ad, 0x0, 0x101, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r3, 0x1) [ 199.148455][T27503] loop2: detected capacity change from 0 to 262160 03:25:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:47 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000001) [ 199.281345][T27607] loop2: detected capacity change from 0 to 262160 03:25:47 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r3, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:47 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 1) [ 199.753630][T27618] loop2: detected capacity change from 0 to 262160 [ 199.765615][T27620] loop4: detected capacity change from 0 to 262160 03:25:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1f, 0x8, 0x2, 0x0, 0x1, 0x30100, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x0, @perf_config_ext={0x200, 0x8}, 0x89, 0x68, 0x5c7, 0x1, 0x8, 0x9, 0x40, 0x0, 0x80000000, 0x0, 0xff}, 0x0, 0xd, r0, 0x9) r3 = inotify_init() sendfile(r3, r2, &(0x7f00000002c0)=0x3ff, 0xffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x1c, 0x0, &(0x7f0000000140)=[@enter_looper, @free_buffer, @decrefs, @exit_looper], 0xd1, 0x0, &(0x7f0000000180)="c5a5b65d35c1319d76b758a459fa95f4b10f5cb246d37f8f3fbeeaa8eeb3801149d86929df229525ecc9e7c57b465ea3be3f91ebc49e07d56b53db8979426439357d5600b8fcc82d1300f3154ce3d082898d02863fe97dbef3768169d5b4076c85cb595da9a6152de226b318314680914f30033414ff2c38d9a17c4dbb386c9e931e945318a3776328b37fc86658374bad801f2db41ea8d6ce408404561fcc30b361b98c41bb493fb7b2dd2e2ccf17a0a641c01d358b06384f3f5b35bac59fd84673d9f194c363bd2faea0cf2a32da99b1"}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 199.851451][T27620] FAULT_INJECTION: forcing a failure. [ 199.851451][T27620] name failslab, interval 1, probability 0, space 0, times 0 [ 199.864111][T27620] CPU: 0 PID: 27620 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 199.872581][T27620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.882633][T27620] Call Trace: [ 199.885912][T27620] dump_stack_lvl+0xd6/0x122 [ 199.890563][T27620] dump_stack+0x11/0x1b [ 199.894737][T27620] should_fail+0x23c/0x250 [ 199.899233][T27620] ? alloc_pipe_info+0xac/0x350 [ 199.904086][T27620] __should_failslab+0x81/0x90 [ 199.908883][T27620] should_failslab+0x5/0x20 [ 199.913389][T27620] kmem_cache_alloc_trace+0x52/0x350 [ 199.918676][T27620] alloc_pipe_info+0xac/0x350 [ 199.923350][T27620] splice_direct_to_actor+0x5f7/0x650 [ 199.928734][T27620] ? security_file_permission+0x7c/0xa0 [ 199.934275][T27620] ? do_splice_direct+0x190/0x190 [ 199.939301][T27620] ? security_file_permission+0x87/0xa0 [ 199.944916][T27620] do_splice_direct+0x106/0x190 [ 199.949768][T27620] do_sendfile+0x675/0xc40 [ 199.954261][T27620] __x64_sys_sendfile64+0x102/0x140 [ 199.959488][T27620] do_syscall_64+0x44/0xa0 [ 199.963972][T27620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 199.969865][T27620] RIP: 0033:0x7f3a88ac0ae9 [ 199.974276][T27620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 199.993904][T27620] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:25:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 200.002319][T27620] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 200.010290][T27620] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 200.018337][T27620] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.026330][T27620] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 200.034330][T27620] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = inotify_init1(0x800) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x103000) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000240)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fef000/0xf000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000000c0)="b87ed831c5bf6363193d80c8b6a3f726450777df26ac8a45f6547d4a46a2bf4f794a48a84cde69fb7aeef49666143318a1f0213076938f09111b43877d82a43b79cc5b8b69f72bb5d1873445ae95109bd5611e3a52cadfa2e9dbd5f1fa634c475faec2e1033c15962624cda232a8a154d8944673e7b44f67dd08c22ed413477bc9f4f356", 0x84, r0}, 0x68) 03:25:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 2) [ 200.079288][T27726] loop2: detected capacity change from 0 to 262160 03:25:48 executing program 1: open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 200.164953][T27758] loop4: detected capacity change from 0 to 262160 [ 200.216629][T27758] FAULT_INJECTION: forcing a failure. [ 200.216629][T27758] name failslab, interval 1, probability 0, space 0, times 0 [ 200.229263][T27758] CPU: 0 PID: 27758 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 200.237748][T27758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.247799][T27758] Call Trace: [ 200.251074][T27758] dump_stack_lvl+0xd6/0x122 [ 200.255745][T27758] dump_stack+0x11/0x1b [ 200.259900][T27758] should_fail+0x23c/0x250 [ 200.264315][T27758] ? kcalloc+0x32/0x40 [ 200.268380][T27758] __should_failslab+0x81/0x90 [ 200.273146][T27758] should_failslab+0x5/0x20 [ 200.277698][T27758] __kmalloc+0x6f/0x370 [ 200.281879][T27758] ? kmem_cache_alloc_trace+0x24b/0x350 [ 200.287428][T27758] kcalloc+0x32/0x40 [ 200.291472][T27758] alloc_pipe_info+0x1be/0x350 [ 200.296284][T27758] splice_direct_to_actor+0x5f7/0x650 [ 200.301713][T27758] ? security_file_permission+0x7c/0xa0 [ 200.307330][T27758] ? do_splice_direct+0x190/0x190 [ 200.312384][T27758] ? security_file_permission+0x87/0xa0 [ 200.317977][T27758] do_splice_direct+0x106/0x190 [ 200.322831][T27758] do_sendfile+0x675/0xc40 [ 200.327244][T27758] __x64_sys_sendfile64+0x102/0x140 [ 200.332438][T27758] do_syscall_64+0x44/0xa0 [ 200.336900][T27758] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.342824][T27758] RIP: 0033:0x7f3a88ac0ae9 [ 200.347238][T27758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:25:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 200.367002][T27758] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 200.375416][T27758] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 200.383409][T27758] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 200.391375][T27758] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.399399][T27758] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 200.407367][T27758] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 200.427797][T27837] loop2: detected capacity change from 0 to 262160 03:25:49 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r3, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:49 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 3) [ 201.018818][T27840] loop2: detected capacity change from 0 to 262160 [ 201.041798][T27843] loop4: detected capacity change from 0 to 262160 [ 201.108771][T27843] FAULT_INJECTION: forcing a failure. [ 201.108771][T27843] name failslab, interval 1, probability 0, space 0, times 0 [ 201.121495][T27843] CPU: 1 PID: 27843 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 201.129928][T27843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.139978][T27843] Call Trace: [ 201.143312][T27843] dump_stack_lvl+0xd6/0x122 [ 201.147914][T27843] dump_stack+0x11/0x1b [ 201.152069][T27843] should_fail+0x23c/0x250 [ 201.156491][T27843] ? kmalloc_array+0x2d/0x40 [ 201.161135][T27843] __should_failslab+0x81/0x90 [ 201.165899][T27843] should_failslab+0x5/0x20 [ 201.170407][T27843] __kmalloc+0x6f/0x370 [ 201.174643][T27843] kmalloc_array+0x2d/0x40 [ 201.179058][T27843] iter_file_splice_write+0xd5/0x790 [ 201.184527][T27843] ? atime_needs_update+0x2ba/0x390 [ 201.189726][T27843] ? touch_atime+0x11f/0x2e0 [ 201.194318][T27843] ? generic_file_splice_read+0x2a9/0x330 [ 201.200180][T27843] ? splice_from_pipe+0xd0/0xd0 [ 201.205046][T27843] direct_splice_actor+0x80/0xa0 [ 201.210043][T27843] splice_direct_to_actor+0x345/0x650 [ 201.215414][T27843] ? do_splice_direct+0x190/0x190 [ 201.220438][T27843] do_splice_direct+0x106/0x190 [ 201.225324][T27843] do_sendfile+0x675/0xc40 [ 201.229743][T27843] __x64_sys_sendfile64+0x102/0x140 [ 201.234937][T27843] do_syscall_64+0x44/0xa0 [ 201.239360][T27843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.245321][T27843] RIP: 0033:0x7f3a88ac0ae9 [ 201.249729][T27843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.269355][T27843] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 201.277760][T27843] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 201.285760][T27843] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 201.293748][T27843] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.301716][T27843] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 201.309682][T27843] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 201.333142][T27849] loop2: detected capacity change from 0 to 262160 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 4) 03:25:49 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:49 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) [ 201.440398][T27853] loop2: detected capacity change from 0 to 262160 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174", 0xb}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 201.541638][T27858] loop2: detected capacity change from 0 to 262160 03:25:49 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174", 0xb}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 201.679178][T27863] loop2: detected capacity change from 0 to 262160 03:25:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000051b80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052d80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}], 0x80, "0bc0a15a111742"}) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r6}, {}, {}, {r5}, {}, {}, {}, {}, {r5}, {0x0, r6}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {r5}, {}, {}, {r5}, {}, {r4}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {}, {}, {0x0, r6}, {r5}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {r5}, {0x0, r6}, {r5}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {0x0, r6}, {}, {r5}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {r4}, {r4}, {}, {}, {r4}, {0x0, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5, r6}, {}, {}, {}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {}, {}, {r5}, {}, {}, {}, {}, {r5, r6}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {r5}, {0x0, r6}, {r5}, {}, {}, {}, {}, {}, {}, {r5, r6}, {}, {}, {}, {r5}, {0x0, r6}, {}, {}, {0x0}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {r5}, {0x0, r6}, {}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {r5}, {}, {}, {r5}, {}, {}, {r4}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r4}, {0x0, r6}, {}, {r5}, {}, {}, {}, {r4, r6}, {}, {}, {r5}, {r4, r6}, {}, {}, {}, {}, {r5}, {r4}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {r4, r6}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000056380)={0x1, [{}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x9, "26f510be209fca"}) r9 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r10 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r10, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r13}, {}, {}, {r12}, {}, {}, {}, {}, {r12}, {0x0, r13}, {}, {}, {0x0, r13}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {r12}, {}, {}, {r12}, {}, {r11}, {}, {}, {0x0, r13}, {}, {}, {0x0, r13}, {}, {}, {0x0, r13}, {r12}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {r12}, {0x0, r13}, {r12}, {}, {}, {0x0, r13}, {0x0, r13}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {0x0, r13}, {}, {r12}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {0x0, r13}, {0x0, r13}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {r11}, {r11}, {}, {}, {0x0, r13}, {0x0, r13}, {0x0, r13}, {0x0, r13}, {}, {}, {r11}, {r11}, {}, {}, {r11}, {0x0, r13}, {}, {}, {0x0, r13}, {0x0, r13}, {0x0, r13}, {r12, r13}, {}, {}, {}, {}, {}, {r11, r13}, {r12, r13}, {0x0, r13}, {}, {}, {r12}, {}, {}, {}, {}, {r12, r13}, {}, {0x0, r13}, {}, {0x0, r13}, {}, {}, {}, {r12}, {0x0, r13}, {r12}, {}, {}, {}, {}, {}, {}, {r12, r13}, {}, {}, {}, {r12}, {0x0, r13}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {r12}, {0x0, r13}, {}, {r12, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {r12}, {}, {}, {r12}, {}, {}, {r11}, {}, {}, {0x0, r13}, {0x0, r13}, {}, {}, {r11}, {0x0, r13}, {}, {r12}, {}, {}, {}, {r11, r13}, {}, {}, {r12}, {r11, r13}, {}, {}, {}, {}, {r12}, {r11}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {r11, r13}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057380)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {r5}, {r8}, {r11}], 0x0, "bc0b01bb3e0cc1"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c01001b190001ff0000000000ded7eef7"], 0x11c}], 0x1}, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r15 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r15, r14, 0x0, 0x100002000) 03:25:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174", 0xb}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:49 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 201.801680][T27864] loop4: detected capacity change from 0 to 262160 [ 201.838990][T27868] loop2: detected capacity change from 0 to 262160 [ 201.861792][T27864] FAULT_INJECTION: forcing a failure. [ 201.861792][T27864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.875090][T27864] CPU: 1 PID: 27864 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 201.883504][T27864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.893672][T27864] Call Trace: [ 201.896943][T27864] dump_stack_lvl+0xd6/0x122 [ 201.901628][T27864] dump_stack+0x11/0x1b [ 201.905789][T27864] should_fail+0x23c/0x250 [ 201.910286][T27864] __alloc_pages+0x102/0x330 [ 201.914937][T27864] alloc_pages+0x382/0x3d0 [ 201.919381][T27864] folio_alloc+0x1a/0x20 [ 201.923620][T27864] filemap_alloc_folio+0x53/0xf0 [ 201.928562][T27864] __filemap_get_folio+0x443/0x690 [ 201.933688][T27864] pagecache_get_page+0x26/0xe0 [ 201.938615][T27864] grab_cache_page_write_begin+0x3f/0x50 [ 201.944250][T27864] cont_write_begin+0x53a/0x8b0 [ 201.949202][T27864] fat_write_begin+0x61/0xf0 [ 201.953790][T27864] ? fat_block_truncate_page+0x30/0x30 [ 201.959248][T27864] generic_perform_write+0x1b8/0x3e0 [ 201.964533][T27864] __generic_file_write_iter+0x195/0x2b0 [ 201.970187][T27864] ? generic_write_checks+0x250/0x290 [ 201.975568][T27864] generic_file_write_iter+0x75/0x130 [ 201.981016][T27864] do_iter_readv_writev+0x2de/0x380 [ 201.986216][T27864] do_iter_write+0x192/0x5c0 [ 201.990803][T27864] ? splice_from_pipe_next+0x34f/0x3b0 [ 201.996262][T27864] ? kmalloc_array+0x2d/0x40 [ 202.000854][T27864] vfs_iter_write+0x4c/0x70 [ 202.005376][T27864] iter_file_splice_write+0x43a/0x790 [ 202.010753][T27864] ? splice_from_pipe+0xd0/0xd0 [ 202.015662][T27864] direct_splice_actor+0x80/0xa0 [ 202.020598][T27864] splice_direct_to_actor+0x345/0x650 [ 202.025999][T27864] ? do_splice_direct+0x190/0x190 [ 202.031025][T27864] do_splice_direct+0x106/0x190 [ 202.035881][T27864] do_sendfile+0x675/0xc40 [ 202.040296][T27864] __x64_sys_sendfile64+0x102/0x140 [ 202.045496][T27864] do_syscall_64+0x44/0xa0 [ 202.050035][T27864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.055929][T27864] RIP: 0033:0x7f3a88ac0ae9 [ 202.060340][T27864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.079958][T27864] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 202.088386][T27864] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 202.096358][T27864] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 202.104323][T27864] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.112325][T27864] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 202.120289][T27864] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 5) 03:25:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002", 0x11}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 202.273149][T27873] loop2: detected capacity change from 0 to 262160 03:25:50 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002", 0x11}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 202.338679][T27875] loop4: detected capacity change from 0 to 262160 [ 202.399608][T27879] loop2: detected capacity change from 0 to 262160 [ 202.460578][T27880] FAULT_INJECTION: forcing a failure. [ 202.460578][T27880] name failslab, interval 1, probability 0, space 0, times 0 [ 202.473236][T27880] CPU: 1 PID: 27880 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 202.481692][T27880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.491744][T27880] Call Trace: [ 202.495021][T27880] dump_stack_lvl+0xd6/0x122 [ 202.499612][T27880] dump_stack+0x11/0x1b [ 202.503770][T27880] should_fail+0x23c/0x250 [ 202.508285][T27880] ? __iomap_dio_rw+0x141/0xf20 [ 202.513142][T27880] __should_failslab+0x81/0x90 [ 202.517908][T27880] should_failslab+0x5/0x20 [ 202.522489][T27880] kmem_cache_alloc_trace+0x52/0x350 [ 202.527778][T27880] __iomap_dio_rw+0x141/0xf20 [ 202.532521][T27880] ? debug_smp_processor_id+0x18/0x20 [ 202.537966][T27880] ? perf_trace_kmem_cache_free+0x5a/0x150 [ 202.543809][T27880] ? jbd2_journal_stop+0x592/0x6a0 [ 202.548985][T27880] iomap_dio_rw+0x30/0x70 [ 202.553320][T27880] ? ext4_file_write_iter+0x471/0x11f0 [ 202.558857][T27880] ext4_file_write_iter+0xaa9/0x11f0 [ 202.564167][T27880] ? ext4_file_write_iter+0x471/0x11f0 [ 202.569786][T27880] do_iter_readv_writev+0x2de/0x380 [ 202.574997][T27880] do_iter_write+0x192/0x5c0 [ 202.579746][T27880] ? splice_from_pipe_next+0x34f/0x3b0 [ 202.585275][T27880] ? kmalloc_array+0x2d/0x40 [ 202.589934][T27880] vfs_iter_write+0x4c/0x70 [ 202.594440][T27880] iter_file_splice_write+0x43a/0x790 [ 202.599819][T27880] ? splice_from_pipe+0xd0/0xd0 [ 202.604674][T27880] direct_splice_actor+0x80/0xa0 [ 202.609689][T27880] splice_direct_to_actor+0x345/0x650 [ 202.615209][T27880] ? do_splice_direct+0x190/0x190 [ 202.620251][T27880] do_splice_direct+0x106/0x190 [ 202.625107][T27880] do_sendfile+0x675/0xc40 [ 202.629625][T27880] __x64_sys_sendfile64+0x102/0x140 [ 202.634906][T27880] do_syscall_64+0x44/0xa0 [ 202.639323][T27880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 202.645222][T27880] RIP: 0033:0x7f3a88ac0ae9 [ 202.649634][T27880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 202.669241][T27880] RSP: 002b:00007f3a86816188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 202.677662][T27880] RAX: ffffffffffffffda RBX: 00007f3a88bd4020 RCX: 00007f3a88ac0ae9 [ 202.685657][T27880] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 202.693630][T27880] RBP: 00007f3a868161d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.701602][T27880] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 03:25:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002", 0x11}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:50 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) [ 202.709568][T27880] R13: 00007fffe8d1457f R14: 00007f3a86816300 R15: 0000000000022000 03:25:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 6) 03:25:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3302) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100002000) [ 202.762816][T27885] loop2: detected capacity change from 0 to 262160 [ 202.824020][T27887] loop4: detected capacity change from 0 to 262160 [ 202.846861][T27887] FAULT_INJECTION: forcing a failure. [ 202.846861][T27887] name failslab, interval 1, probability 0, space 0, times 0 [ 202.859526][T27887] CPU: 1 PID: 27887 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 202.867940][T27887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.877988][T27887] Call Trace: [ 202.881252][T27887] dump_stack_lvl+0xd6/0x122 [ 202.885836][T27887] dump_stack+0x11/0x1b [ 202.889991][T27887] should_fail+0x23c/0x250 [ 202.894398][T27887] ? fat_cache_add+0x1f7/0x4f0 [ 202.899159][T27887] __should_failslab+0x81/0x90 [ 202.903917][T27887] should_failslab+0x5/0x20 [ 202.908410][T27887] kmem_cache_alloc+0x4f/0x320 [ 202.913211][T27887] fat_cache_add+0x1f7/0x4f0 [ 202.917782][T27887] fat_get_cluster+0x5ca/0x890 [ 202.922540][T27887] fat_get_mapped_cluster+0xe0/0x260 [ 202.927838][T27887] fat_bmap+0x258/0x290 [ 202.931980][T27887] fat_get_block+0x3cb/0x610 [ 202.936555][T27887] __block_write_begin_int+0x4c5/0x10c0 [ 202.942154][T27887] ? __filemap_get_folio+0x5d0/0x690 [ 202.947424][T27887] ? fat_block_truncate_page+0x30/0x30 [ 202.952961][T27887] cont_write_begin+0x55e/0x8b0 [ 202.957860][T27887] fat_write_begin+0x61/0xf0 [ 202.962485][T27887] ? fat_block_truncate_page+0x30/0x30 [ 202.968032][T27887] generic_perform_write+0x1b8/0x3e0 [ 202.973303][T27887] __generic_file_write_iter+0x195/0x2b0 [ 202.978918][T27887] ? generic_write_checks+0x250/0x290 [ 202.984282][T27887] generic_file_write_iter+0x75/0x130 [ 202.989640][T27887] do_iter_readv_writev+0x2de/0x380 [ 202.994894][T27887] do_iter_write+0x192/0x5c0 [ 202.999467][T27887] ? splice_from_pipe_next+0x34f/0x3b0 [ 203.004998][T27887] ? kmalloc_array+0x2d/0x40 [ 203.009575][T27887] vfs_iter_write+0x4c/0x70 [ 203.014060][T27887] iter_file_splice_write+0x43a/0x790 [ 203.019461][T27887] ? splice_from_pipe+0xd0/0xd0 [ 203.024318][T27887] direct_splice_actor+0x80/0xa0 [ 203.029287][T27887] splice_direct_to_actor+0x345/0x650 [ 203.034645][T27887] ? do_splice_direct+0x190/0x190 [ 203.039654][T27887] do_splice_direct+0x106/0x190 [ 203.044488][T27887] do_sendfile+0x675/0xc40 [ 203.048892][T27887] __x64_sys_sendfile64+0x102/0x140 [ 203.054072][T27887] do_syscall_64+0x44/0xa0 [ 203.058473][T27887] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.064352][T27887] RIP: 0033:0x7f3a88ac0ae9 [ 203.068824][T27887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.088509][T27887] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 203.096900][T27887] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 203.104856][T27887] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 203.112881][T27887] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 03:25:51 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002400080", 0x14}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 203.120855][T27887] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 203.128808][T27887] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01a1cc81f47ecad9152739a656f0442f69beb1744ce018834ec2549a9703a9b12a2739b611d4f95c4f1261a0ad82ffebf8d0043a46cc87b34ffe793fb94635fd04b4fbdcc3a10e73b46bda0331d8ff857410eea573d8735784bd0346124b9c76a2f10fe47ad7b0f856e7f68e0ae483a78c8b6d5b69e3cc896fc11ef298d3b5"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100002000) [ 203.210753][T27897] loop2: detected capacity change from 0 to 262160 03:25:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002400080", 0x14}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 7) [ 203.322929][T27903] loop2: detected capacity change from 0 to 262160 03:25:51 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 203.389176][T27905] loop4: detected capacity change from 0 to 262160 [ 203.438076][T27905] FAULT_INJECTION: forcing a failure. [ 203.438076][T27905] name failslab, interval 1, probability 0, space 0, times 0 [ 203.450747][T27905] CPU: 0 PID: 27905 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 203.459187][T27905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.469272][T27905] Call Trace: [ 203.472552][T27905] dump_stack_lvl+0xd6/0x122 [ 203.477159][T27905] dump_stack+0x11/0x1b [ 203.481323][T27905] should_fail+0x23c/0x250 [ 203.485740][T27905] ? xas_create+0x3fb/0xb10 [ 203.490241][T27905] __should_failslab+0x81/0x90 [ 203.495006][T27905] should_failslab+0x5/0x20 [ 203.499573][T27905] kmem_cache_alloc+0x4f/0x320 [ 203.504378][T27905] xas_create+0x3fb/0xb10 [ 203.508705][T27905] xas_store+0x70/0xca0 [ 203.512861][T27905] ? xas_find_conflict+0x422/0x4c0 [ 203.517972][T27905] __filemap_add_folio+0x1e8/0x4d0 [ 203.523084][T27905] ? workingset_activation+0x2b0/0x2b0 [ 203.528542][T27905] filemap_add_folio+0x6b/0x150 [ 203.533394][T27905] __filemap_get_folio+0x4c4/0x690 [ 203.538573][T27905] ? __this_cpu_preempt_check+0x18/0x20 [ 203.544131][T27905] pagecache_get_page+0x26/0xe0 [ 203.549041][T27905] grab_cache_page_write_begin+0x3f/0x50 [ 203.554714][T27905] cont_write_begin+0x53a/0x8b0 [ 203.559683][T27905] fat_write_begin+0x61/0xf0 [ 203.564329][T27905] ? fat_block_truncate_page+0x30/0x30 [ 203.569788][T27905] generic_perform_write+0x1b8/0x3e0 [ 203.575099][T27905] ? fat_write_begin+0xf0/0xf0 [ 203.579932][T27905] __generic_file_write_iter+0x195/0x2b0 [ 203.585561][T27905] ? generic_write_checks+0x250/0x290 [ 203.591016][T27905] generic_file_write_iter+0x75/0x130 [ 203.596388][T27905] do_iter_readv_writev+0x2de/0x380 [ 203.601587][T27905] do_iter_write+0x192/0x5c0 [ 203.606248][T27905] ? splice_from_pipe_next+0x34f/0x3b0 [ 203.611776][T27905] ? kmalloc_array+0x2d/0x40 [ 203.616409][T27905] vfs_iter_write+0x4c/0x70 [ 203.620918][T27905] iter_file_splice_write+0x43a/0x790 [ 203.626296][T27905] ? splice_from_pipe+0xd0/0xd0 [ 203.631148][T27905] direct_splice_actor+0x80/0xa0 03:25:51 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 203.636243][T27905] splice_direct_to_actor+0x345/0x650 [ 203.641631][T27905] ? do_splice_direct+0x190/0x190 [ 203.646719][T27905] do_splice_direct+0x106/0x190 [ 203.651568][T27905] do_sendfile+0x675/0xc40 [ 203.656062][T27905] __x64_sys_sendfile64+0x102/0x140 [ 203.661322][T27905] do_syscall_64+0x44/0xa0 [ 203.665798][T27905] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.671694][T27905] RIP: 0033:0x7f3a88ac0ae9 [ 203.676180][T27905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.695910][T27905] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 203.704322][T27905] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 203.712287][T27905] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 203.720259][T27905] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.728311][T27905] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 203.736278][T27905] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r1 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=r1], 0x11c}], 0x1}, 0x4004080) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = open_tree(r0, &(0x7f0000000100)='./file0\x00', 0x1801) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="25e20000", @ANYRES16=0x0, @ANYBLOB="000427bd7000fcdbdf2505000000030002000700000008000300010000000800030007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x2c020034}, 0x4) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000001) sendfile(r5, r2, 0x0, 0x100002000) 03:25:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201010002400080", 0x14}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 203.832803][T27916] loop2: detected capacity change from 0 to 262160 03:25:52 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(0x0, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 204.121829][T27919] loop2: detected capacity change from 0 to 262160 03:25:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 8) 03:25:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:25:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100002004) [ 204.234452][T27926] loop2: detected capacity change from 0 to 262160 03:25:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100001ffd) 03:25:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080", 0x15}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 204.288783][T27932] loop4: detected capacity change from 0 to 262160 03:25:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 204.386979][T27938] loop2: detected capacity change from 0 to 262160 [ 204.413920][T27940] FAULT_INJECTION: forcing a failure. [ 204.413920][T27940] name failslab, interval 1, probability 0, space 0, times 0 [ 204.426676][T27940] CPU: 1 PID: 27940 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 204.435157][T27940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.445289][T27940] Call Trace: [ 204.448564][T27940] dump_stack_lvl+0xd6/0x122 [ 204.453162][T27940] dump_stack+0x11/0x1b [ 204.457326][T27940] should_fail+0x23c/0x250 [ 204.461748][T27940] ? __es_insert_extent+0x546/0xe80 [ 204.466952][T27940] __should_failslab+0x81/0x90 [ 204.471747][T27940] should_failslab+0x5/0x20 [ 204.476265][T27940] kmem_cache_alloc+0x4f/0x320 [ 204.481104][T27940] __es_insert_extent+0x546/0xe80 [ 204.486136][T27940] ext4_es_insert_extent+0x1cb/0x19c0 [ 204.491595][T27940] ext4_ext_map_blocks+0xff6/0x20a0 [ 204.496800][T27940] ? _raw_read_unlock+0x13/0x30 [ 204.501655][T27940] ext4_map_blocks+0x1cf/0xf00 [ 204.506488][T27940] ext4_iomap_begin+0x4b0/0x630 [ 204.511353][T27940] ? ext4_alloc_da_blocks+0x100/0x100 [ 204.516822][T27940] iomap_iter+0x395/0x4a0 [ 204.521201][T27940] __iomap_dio_rw+0x660/0xf20 [ 204.525885][T27940] ? perf_trace_kmem_cache_free+0x5a/0x150 [ 204.531746][T27940] iomap_dio_rw+0x30/0x70 [ 204.536077][T27940] ? ext4_file_write_iter+0x471/0x11f0 [ 204.541544][T27940] ext4_file_write_iter+0xaa9/0x11f0 [ 204.546843][T27940] ? ext4_file_write_iter+0x471/0x11f0 [ 204.552410][T27940] do_iter_readv_writev+0x2de/0x380 [ 204.557678][T27940] do_iter_write+0x192/0x5c0 [ 204.562271][T27940] vfs_iter_write+0x4c/0x70 [ 204.566777][T27940] iter_file_splice_write+0x43a/0x790 [ 204.572179][T27940] ? splice_from_pipe+0xd0/0xd0 [ 204.577029][T27940] direct_splice_actor+0x80/0xa0 [ 204.582001][T27940] splice_direct_to_actor+0x345/0x650 [ 204.587374][T27940] ? do_splice_direct+0x190/0x190 [ 204.592419][T27940] do_splice_direct+0x106/0x190 [ 204.597269][T27940] do_sendfile+0x675/0xc40 [ 204.601692][T27940] __x64_sys_sendfile64+0x102/0x140 [ 204.606969][T27940] do_syscall_64+0x44/0xa0 [ 204.611382][T27940] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 204.617278][T27940] RIP: 0033:0x7f3a88ac0ae9 [ 204.621700][T27940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.641496][T27940] RSP: 002b:00007f3a86816188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 204.649935][T27940] RAX: ffffffffffffffda RBX: 00007f3a88bd4020 RCX: 00007f3a88ac0ae9 [ 204.657900][T27940] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 204.665867][T27940] RBP: 00007f3a868161d0 R08: 0000000000000000 R09: 0000000000000000 [ 204.673852][T27940] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 03:25:52 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0xfe3b, 0xfc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x1}) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000051b80)={0x0, 0x0, "ef70e0e6a88b38e598666eae1dd80e16716b80ba1e00a402701b94ca1a99aa0b01fc06f967f21af4279219bb00d38357c74140069704ab490bf68afeb52d6bac55975c7a9830c73700b362dd3773a4d421fd3a141f7f7a6f15dcc6c61fe7721b924e1bae296e6ff7dc5c2249edadfef8510343b0c8fd902fb9134ee857f2f8eb324b3d7a3ad101d32db02a3a6a3b2d037430fdb4fd27990048039956a2a8342d55c5cbf488511a723e1924a8e76174e45a9aa80981f6d32fb688e2b996883283b3730aa8ac6ea295b00fa001e46023990f45fe5322a74c914fcd2eddb9eb805bad9e561e9e41c2efebb7bd93b08c6e8c3f11d1c0cd373e2c82bbe3fa334ff559", "964d64f667b03b6f217e4aa06f3f9610266bf72e3bcc510b6b4ad1d9fe314054c1d207d422f6c26c8dadefc47eac3f72818848465759a419441b43a54c07455442fcb1ee589fa696354e0261b7e7d9101f998ef8d01613ef26a322ee75e1dcabc9644499a9730665b957f6945273122deb6d4bc810e2e2235a562c1c6c9ab730c4a268672225ca23003726183030f57a5508fc61eac8f652fb04f1bfa8a70a519ef34dd0b023db896bc4bebcb509944a2246306c9c4a659f37e37da7dae0b40010df9521b21ab43aca94ec75ad6e33e6be7fa7e13a503c31960d7e33944423d7465119b6289851ed8eac63f130153c92e8926e9dde97a23dcea15cddfb5fad0dbcacb6c2513c41f546c9cead8b1b9be0b8cd9771b627a8bdb8b2d5ead848ca0a3e65b1b8fd7182f233d62fad59ffb4eb1af604f5fb90054d41cd7307740b6f7a6337f656b3819a742b028ae6881eac27a1f451d83266ee6ab2cf7abc5028c8bfb9abd174913785c10dffb13960e16296caca084609c507d07f520201954e7a0c94de8740f0a3fc9e242ed984e4addbbec7c94eb27219afc9d82da3d26dc78d701285d034619d2bd3896ea9c5e1a6e21e711d6ebce68de9a2a85337d94f0425427490b52848f96dae8ce5e276f9dd2364c90d70c5dbc5699c91bd8cd7a7f8abae2090817b0feb7b779bd13b82a8c441d8d46deb1aff2c32a89036e19046f5e1301a3aade1dcf7bc4b252f1640379607b78fb27fe679da1efb8bcefb5260fe26448c26702c22c5c7a9a118d56ef91e471e2ce6b24308cba05fac1e568b5bf856d28a5bb9f3e0b24d98fdcd3b004786dd2f489a7523d96e6495a87bf7e426d85d437406eab8886ed510e9fc6fe9fce738ee2bb0d90c40e243f00cdfd9af6aa1352369d29e2b3dcc31957e6f1780add4c1fc95dd24df9a94bc41b967d4268b29021dbb78b8a65119b0e418da8f5bba46d8ac09a17ea04b748d5177ac5c1fa7bd51ab83b5b71730ecf2a3f99fe78a4d623110afc058c60a2b1dc805b9014e10b10de807327493eaa5e86ad4b8d5bd089c7201b61df16c43053d767c8d91e329b216e0cc213e9c3edab59d6d4ef3969ada4003774aa64a2c4197f32fa3d7f021eb97189625d332012e14e98f7743a8c194e4e5c43408ab7d5ff65db71f4c69b21df58d70459cdbdb5ab82f0b0f1086a0978a3e65f9f9978b83f01b3a59ab365ff4939adbfe5dc75f1b63ab5e76288300c2b915100b78a0df302b8dc2bee74832c7f17754dc69d67ec2d476c73b8c32af1f8c501a6dc79abb43197262f1778b8c1d4f24338b33d7603509e844444e5d443851a3110c50ea0c408362b39297df8382069157da160fd8d1369a5128e6bd0009541c758bfcc0dd38bd72f6fba07cd9c86ec6ee3700486907c941f7df3de6fbeb6fd5b255e4e7ac9a6fc197778a4384950c8587865153096ed9c7e4255372890cd187fd3ade2429287c5ef0a428429abf1db4932d72ef4399f024d81119d0ce4550602607ebaef76bcaa6a61c4feaa06d42057646af1796f8d6922ff2a1f42ef4f5c9fa5c609b070d024865eca0577c82c8a47813dad58f47ce154b509ae3cd66ab224c5be5d6a17e16ef795ac989812706453c81389a66a6dacda5972ce06679e51d5d071f71a21f2281941ec6e82a05f217abd360a84d08db17409df1be116a4c97bea8af0c46c5cab1633c297435a27bc5aafcc5d959e1506d5f237b93c6bc71314130e757f11bc242792ad8515e362dbdee13b63a8d0ecd3be10d7c4e519ac404a413169bdc264883a8cb05c910fd092a4d6afc36005c7e889c27d2458a5c41162705279dc896c050744144fa2fdbb7543db5520e111ccb75fdd82f75a5ccd0cc75ecf47d1a6061f5ddda5f2981dc2d58939a9ad554e0d59f5e7cd95787136ef92268b2f31cd46e5220c0d5cba645d4c2eb39f89e76bdab6f9758833b32bc853fee1f5d0617273afeb92341bccf647e4248208ee704b568a666bc028a1e660dcb79442cb5f95d0491edf201defd5c075663fae2fbcb5a4e2e90a5a4677fb5445810a46beb2b3d241671ebd451b3a50428961c6f0f27a97029288cbf2a36efb88cd0229da409856f122b466bad5ab833c50eaa07651ac691897e065c8870eb86472ab6ad727da681302d5999086ba0bff790d7ea77d0e50e8cc8f7284a0161a11b379e55087684bf321a340656c790ee99f13d14006eff3111785aff450384f72ce03a762f46ce8ec1719e55083e1493bf0376345e84e4a159d51bc05b15f1b1dfae7782476fc4a16d16e9bf5eed9499f58074bbbb62f59b537873335fd778cdd2fcc95d22c6f21b9c14c09b1efb4f71196d600fa0a0074b130fd2f410011fc5a44933cf8552cf5c0fc3b6a7a3f7616b8411295bc3aed0f033848fe62fd2f32602b2c396e909cea3b31b31fc21e94859bd6beb7afa33fa5370670ccea2b75fc851847bf2118e3e98e983f11640513d34f40d09bd034be45215aa5727d22740d691cc2e1ca9853c4726a745ee878d6202321a8b5efa7a59bec1ce1e18aa73b7387ea03fe4303d9a9772c8f16b5eed7c264c17fc77aeeac6f11f5596c7cd1239c22fcad894061b3041aa3c51ab5d7b3141e6409674033d140970cfedeca6a3021837d21a111184cc674a24dbe4d0581f1bff4aaaad82a4ee4c3d94e92e49bb2eaac0fba812845222460f95bc6d633a8fcc0a874ed86e3e91681974443640ebcc1be60561dd2a0102fd28ee6efc75ec2f78583fe4082466276eba8b9c0d2eb7655a8eecc41c78971d2310f45a5b8d74a7b5113bab620ca6b43d3b0c9e6c2edd6f8848ddc9f291216df80c93a9c89d0636a210721262f6c7f6e4ffa6867b34a75f09ae3839bfb76150763f07ab36242e2f963a8caf2ae804d36ad8cb4cac6e3cd1ba13d685778a389f6f2fada36fcb4f77e0ce9a104e0cdaadc3bffe871ba24da509f76eb4a1813459d91c66c144228645ffd1dad23eaeccacbabfb199d91b4802786b9dee08f2a9bf4436c968f6574763faa80fbd91e1f7935830424d26e531fa3a529e9fb22407632167719b3ff6daa9c89bfd10a880838334be69940271e732bbac44fd7d1f3ccd53dab7ca4c74547e8b1f5c3abf620ea35bd243aec912669e0e26d0c22c78e8079585a34bfbfac2505bda03a77f7e6e32709b8427b932054179b1db98cd28fec25152fba8bd687d4f88f5a8ec6a92996d8107df87b9cabdccdbec434198b5c52305a7b64d29729513e31ad794fc6d885183facfeeda0918553148fd229833b6a887850ac76d96b7968f26ff5180aa848b10d73b7c45272b17c964498d21dc4a739746b014c86de0829916002cb8ed65866f83748d936b635cd7ccfff67bc3eb14d361059f20667d4b3493f6fce9834b67801255e112690f7fe19be7f3eece7c8e052021aeac13625846514e154e9debf88377fd3968512f9cd992749216c3b1c42e700f15f17da32819fc43b901bb33463d22c7a471f0766db65e396e4b442e76ed80ae277f2231829e58d07e44d0673545296ed295b7296d105682152bd2a1b4420658f18bf4c2d24c0000b3070cba67dcc69631e8a93499358e5786166b9496956f76dbfda6f936251ad04c66fedc34dd9144c37ce1d8f0a2cfdef30c938aab6177552a7c4fb0cd676cf35f2e3fe8f3e3932477f64b053fde6ceff1e2a2187c98a480041a4c5dcd283b77ac83e9d32e733ecd2b496fcde931d14fc0e31a3ddcc6762eaab2c29afa96637b2ade809655ed9eaeb10e5d38385f0b196e862223bb972eb5c5ac62e1ef4e7cab3600c87c404d03a83d50fab86b4fb506f09782f7c415e938425cef972e6eb364b241e3706b84df0ae9303a7f1b94b6eb4cabab7a787d068abefbb8537115c51cca4f42d786a630cdd40db11d6bd53cf883a24c34889cb7c4aec86f60f2090e662b96ae55d673ac9a5a6372267e7e91fe7ed244d90d419490e3a53d27bfb892c816e9240ef069d91e3fed6444085cf5dcfdc54f0671b981dc3fbe3f3134caa5775e727ac6fb47e59f0e5d8291297f4205c1882d013946df3be2df739a8e35875859847b0f9984772b39cfd81838ba6b7d0f61490cd8d6298cf69ede82b00408654c2d6b6bc0d7956509b4ca17cc429485135d94281edbf8661b47c5f4c75e5e5c9a180aae3392d3aafbecd87aaa549709cd134a3b1487fd1870ab317c528250e2bfddfd0966488977ccadc04b6efb6eaae0762cf843cc897f2a4fae86b3af8bb2d5d0f713fb8bd2e79d270a38350cfdb90a99ccd0dca7c8de7ae7700964bd245246208d44b7ff9af12d00f80c39857da17dee4773844783c18cd8069b3f7ac24bff39068a1630093801d31cabdd1ef100135b179bfc7017019d621fe7e3612d7321cd2c844c9b285372f7e8ac428a4dbba330132f0902a0d72a031f54de2a80f50dcd4295de00dd10248b130ccf1c8c0e6fc51812a509fa5329dfc80e3e538bb8e30d3e7de9691aed08d876ce2580e3fc72e0b817cd382cbfe15964987e3936f4b45346880cb1006f5c674c04d2344d503f3c308746d712d7c4474aa6a2e5cc448db6e679ae52542961e0781aad24d210c5d91ad9cfdd7734298e48bae2d1769889610d82e5e27b3b8e8888e6e6bfc8f939f7f3b2aa29409794ff08fa86b2b834b9d2150c1ee050052e74a0dc591ac414e9c8175259a138dc4e1c97277bede930e2605fb2f864516cf1c7582230f6660ef6aab47e071dbac733ba278ec0a33abc5056329e412c3eec0f4e7f8abc1f59b0156d01b5210360d71be257dab651f178515286eaa2b59cfb3b9d299dd36f28fec851a750d67290c0b662b3d3c562e4a3f793d4097c7e273a418e24d16a3330887d3214b0376a465aab4709aa99caf8426feda7b45eb2d73b1d63eb8d17c13ef87ce25580cfebede24ed001da39598ca7d4bb4cca0cbe034ca69c6083600e62dba6d6c2bf4fd7de4bc74063291eb68a1e3e3145dbb0654281e8f4a615fd76578af61e892b5ddd499682537c5045441b621143a527447dd43c846d7ab24f1ebb8647040d29931bf8c1b15ff1f35ea9fc83f1e6d17d9ae319048a0e680622e997caa70e58a37f81e47cbca04d0cd2bba93bdeedbdaf09da0457ef3ef35d9abe5c44561c270f46090ab9d47f58e447e072a0d0a3b2b9b5bbf58ed713ef915f34f26f6798c50b31257628d44239691895ba2838cedcbd80e0aa9294d20d91f2b762f8fe0e2fd07a947fc59c6075073297a75255aab7604c5fbeb85194f44c35e7859b72831cb0b6fe8a023e3cb8c9b898b64bc5bf773380acfb126e62ddd1f7c667fb6cedcdf1d306122d2b6fab9ed7ebc646e9e554ac286ac4e6233e0f88aa02b3fcfff7481213dd2523da4d8c254e336b0bdd3ca695dd5d4da5fdcf584f849295"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000052b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052d80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x80, "0bc0a15a111742"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005f3c0)={0xfe1a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "5471854ef7f0fd"}) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r7 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r10}, {}, {}, {r9}, {}, {}, {}, {}, {r9}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {r9}, {}, {}, {r9}, {}, {r8}, {}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {r9}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {r9}, {0x0, r10}, {r9}, {}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {0x0, r10}, {}, {r9}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {r8}, {r8}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {r8}, {r8}, {}, {}, {r8}, {0x0, r10}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9, r10}, {}, {}, {}, {}, {}, {r8, r10}, {r9, r10}, {0x0, r10}, {}, {}, {r9}, {}, {}, {}, {}, {r9, r10}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {r9}, {0x0, r10}, {r9}, {}, {}, {}, {}, {}, {}, {r9, r10}, {}, {}, {}, {r9}, {0x0, r10}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r9}, {0x0, r10}, {}, {r9, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {r9}, {}, {}, {r9}, {}, {}, {r8}, {}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {r8}, {0x0, r10}, {}, {r9}, {}, {}, {}, {r8, r10}, {}, {}, {r9}, {r8, r10}, {}, {}, {}, {}, {r9}, {r8}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {r8, r10}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000603c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000605c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000607c0)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {r5}, {}, {r9, r11}, {0x0, r12}], 0x0, "b1e8cc3ea7f211"}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 204.681863][T27940] R13: 00007fffe8d1457f R14: 00007f3a86816300 R15: 0000000000022000 [ 204.699891][ C1] sd 0:0:1:0: tag#3613 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 204.709765][ C1] sd 0:0:1:0: tag#3613 CDB: opcode=0xe5 (vendor) [ 204.716131][ C1] sd 0:0:1:0: tag#3613 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 204.725210][ C1] sd 0:0:1:0: tag#3613 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 204.734282][ C1] sd 0:0:1:0: tag#3613 CDB[20]: ba 03:25:52 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x0, @local, 0x3}, 0x1c, &(0x7f0000001840)=[{&(0x7f0000000280)="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", 0xfd}, {&(0x7f0000000380)="fed918f2767fb371afe0dee2c60880e1c9703fd3624f2a6a3af59034f073035f34142d88ab4dd16f9dcd5ef9d187fa8b0b85f7a0b121072ea00da2b1", 0x3c}, {&(0x7f00000003c0)="f3e67ac4d78aaefda5651f79b530694a77c49b38e7c55b1417f02bccc9e8d3306486cfaa16d304a1aeb9a1624acbe5180c28b249be9f", 0x36}, {&(0x7f0000000400)="81e5d496005e0143eaa708c6295944f4d8e1d5a0e84e10db7a2bc0957d74567abdc8a03253b6e465296fcbbbf09bc74ffc25363f9b181e3e0ccde5e091f7ace6bb6da39953c3de4c1c206b0e8bc15b7018ce00d7c11b26746c3004a34b9d8d1c0d8ef6a81659eae6e972dea8b26d105345ff6ef9bf06b84314642896128174524de573d3ac0005cad0c3f6138788894b7197735112c42c5cb5", 0x99}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="6a17ae78ad72f5d4866a807181df0a730a515c568cba93a733a3996c2c2db26cf8ea007ca47be955355930c805390763394ae258d49fbaf2c516ded5d5c10c1cf8788da58d6a6a5b468b83d873823abb81f23f9a19549aaa37bb3da6e9cb903b11b0e057152de6d5e9f83c3810f5cfb6170edb", 0x73}, {&(0x7f0000001540)="f04933bd4c795df15ae9052fa53f2a44f26ea51222e1b6d06fba4c3f8102683ecb77e836efb0934ae873551e5fba425d235d95ebfa22632d9879d4db63aec3005225dc25cdb85ef4f6360154d901a817bddd34ed12e3cfbe4327f7568eb08154fd7dc18c102b5d3d281df7ba1d105aac6f384cda95823b884e795044aa565b93f237aa40b65b2c9cbdec761ef9f205d50dc7656cdb9411259dce7d607b16ed7899e5fd73750b5272dcb5c8e827f55258c495028844fb3c2816acc6bc3dba003c132e676105740227625cc00b53d808c7ead947706731745366f6333b2dae872f5dab7ea5435a12ad898a60afe2bc53da6f286d367921", 0xf6}, {&(0x7f0000001640)="2fe5f8d4dc112409fd24bba57ac0826537977622a983e1a1c74b543a463277cf3b869d971fd8d7f57b383010fb7c8c6adec877666e9608630e5b75233ca17cbb256d897a3110867d33a5a165f276adfc83e8cb14bfc91245ffdcd70aaa57b3d9e2d8a3b560e5c4b27aecc47de3607d5fc910118254c0811f594ddaa2b06c72", 0x7f}, {&(0x7f00000016c0)="bce388c8d8ac5e39a65d1aad238e84f147ed3917e5346b70222d283204e17f22895846ae3b75264b51c7168e28f4db4f35e3993db33a6b6529fade4adfbe45ce707c99264edd5c39ac8552bee60579332ac8a87267d30bd4311f0ae455a0af379969d3", 0x63}, {&(0x7f0000001740)="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", 0xff}], 0xa, &(0x7f0000001900)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x0, 0xa, 0x0, 0x8, 0x0, [@mcast2, @dev={0xfe, 0x80, '\x00', 0x41}, @mcast1, @local, @local]}}}, @dstopts={{0x38, 0x29, 0x37, {0x1, 0x3, '\x00', [@generic={0x9, 0x10, "02dfce6502d03457a075b66a29e09f5d"}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x6c, 0xe, 0x0, 0x98, 0x0, [@empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @local, @remote]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xbc70}}], 0x158}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001a80)="985881a8cdf76f83e06bed237ca89dbbb79a536a889d0a21c01eae00", 0x1c}, {&(0x7f0000001ac0)}, {&(0x7f0000001b00)="9a537cb3782bb1b67b53f7b5f387ac631fdbe3ae263f6e44c9852e7414bfc38068e8e89ce73240f60b1386895c70c610e6066e92419515339c60fdb331a6e50d957dd59a26c1c9348f5f72e37349aff1f4c0d094eadce46a90509eab17970970d10e9f7ab3c050872164a025773aab1dd841b631294aacf3cac57a142335548e27c92b52695547f55ca15af89cd7a6a497b631b063c0c5d4df36fafd0012dc8976fd12be67afdc72c55c3f14a8f606be304f41491fad472c3f44a9b6bbe44758cc04aff70f4f38539b1c63a1223b4cdbd5252673e80a16b5ff7c833a2481ec2da54cd6a77b0f62dcecfe7459abb55a6cbf60d2f708", 0xf5}, {&(0x7f0000001c00)="33a037becd27fee9d55a26902189d8070a7f0835efc3daa58f63ec98c0815d698351a0d845527d08ca4bbdbd240e84d1585a49c72bcb791ff92511390483e4ddd51c9169690049f868721513c6f4664edfa5f2119dc432de1425b960d02116afa2cb21e90a5935e5333ef39a55332281cdf0a594", 0x74}, {&(0x7f0000001c80)}, {&(0x7f0000001cc0)="4b7b06d0e98a6af5602b27d4a6c5c7ed9febc9fd1dfcdefba36079127084891f3f7faa85c843ab5c8cdccfe16d2dcece8660723ecd252a9d147b203d777b06c288a00a0e511f89928dcc8351a8fd239962fdce1e9cbe7171cda0570f9faa592590ba", 0x62}], 0x6}}, {{&(0x7f0000001dc0)={0xa, 0x4e22, 0x7, @private0, 0x3}, 0x1c, &(0x7f0000002100)=[{&(0x7f0000001e00)="2e4d25868296d3c6316ae7728797a62e966ce6f93b3581fa88210fed9ab6a53cac549119afa633cd9a49f533c460a6a7586b08bf0748fccbc9f9ba7289ed1c19571b5b00cbe30eb6e4c423fbc7c71d81bde5efd10152c52f25219b9c63f00f20358713144e0315f2bc90bacd3191d8328b82d8920299811571b7bc55c017ed19d9c477ec06fb65ba541fd369fd69ff33ad47c7f49ef17ebc9cede48dcb357fe181", 0xa1}, {&(0x7f0000001ec0)="5cdcaed5065f1f05025fba664173ba58a31d3f00267fd362ed9f62703c56a95e76c9492c1229ad4889a63c3c605b9673842ab804072e6e813fd9cb8b477a126683ec85f1d6ab9ec6738477f90fa73dc2ac980fbaeca08d0e8091b299e9188b4f4f8031d4358c636213210311500bbfebe2c2aa7cbd382917c1c8e1c5dbdd98253de4ec3ddfcf79dcf24aadb58ce4a72c3512475508e625cb58ebd38eb26f20083b8a82204cb62760be60949829b9f847fe403cba6b3e30e35c", 0xb9}, {&(0x7f0000001f80)="f98059227239109356240b70f78a8131a90d8e1d94573805b597354a311e2a99b3e9ec5be3", 0x25}, {&(0x7f0000001fc0)="67eec087a07dd411285d95d0474fc39185ce3fcc8f0ea304b792249d112f5be8bde5e64cffe14946d5e72d115f4fee4c99393d342bbcbf8a8857225d23c5074a595c6407a0e139b8a45fd7764f1c5da57f133e2fabd521430d4ae60068e555e0d9aef3366edec595896477f061274cff03463028e6b204227fd7ebe81e3975df9c59cd5bdc06f124d8b63eb6ed64fb5211ad076a259cc10e1fa22a497e708e2dcd66354cb123c6afe4779b0a960b85434d7f79d30182040dfcf2efe5435427413e7faf86cd8e", 0xc6}, {&(0x7f00000020c0)}], 0x5, &(0x7f0000002180)=[@rthdr_2292={{0x98, 0x29, 0x39, {0x32, 0x10, 0x1, 0x4, 0x0, [@empty, @mcast2, @private0, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, @private2]}}}], 0x98}}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000002240)="6e3bbf22614a74bc972c2d835d61b35505a756a9c90694ad9060e9a66425efd65e81095882493d0f017ecde9fc7c147441aadd53066fc604ef4b0d60ea25f6a4da780116b1241e8efa127d1b4bde71b5d6b2c4527d3b99aa09cf8ad53e84f2e7a1f2cdbe3bbf6beebf4674bb1dd4cd10fc525f234c3287a01945953a2f8f065d3a9b5e6fbcbbfb3f772e7b8114b57f36910e7cbff5911162d92269b515af733675965c3ce775267daf0d29f6de1ff61cfd5befeb46ed58797c13b53ab49c7d520e14e1cb8d2f177f28fd3fd172d8266fe4e2bf5e9bdf57a87952cea53a233d", 0xdf}], 0x1, &(0x7f0000002380)=[@flowinfo={{0x14, 0x29, 0xb, 0xe5}}], 0x18}}, {{&(0x7f00000023c0)={0xa, 0x4e23, 0x5, @empty, 0x2}, 0x1c, &(0x7f0000002440)=[{&(0x7f0000002400)="2db9757624e57e6579f224c5e47d2700baf2e68220ab0955c0e525cb5c", 0x1d}], 0x1, &(0x7f0000002480)=[@rthdr_2292={{0x98, 0x29, 0x39, {0x11, 0x10, 0x1, 0x81, 0x0, [@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @local]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x38}}}}, @hopopts={{0x80, 0x29, 0x36, {0x3c, 0xc, '\x00', [@generic={0x1, 0x4d, "cf5fd7b30a3aa1b435952ea1cc7c23bb5d958b9c5878ee472ba19db89753540da894f8c3765c9c35f81b8d53f763d1dddb1022baefa16732a6e76c4fb67d94c9174e444f725653eb123971a1e7"}, @enc_lim={0x4, 0x1, 0x6}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x7}, @jumbo={0xc2, 0x4, 0xb5d}, @ra={0x5, 0x2, 0x4}]}}}, @dstopts_2292={{0xe0, 0x29, 0x4, {0xc, 0x18, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @generic={0x5, 0xb6, "99f4f8efb893ccb61d2add9a1c96460aad1bcf349cc200887f92e2024588f4e24f460113aaaf784c5bac69fb43b2f9a4ab9b7bca03f42a59fbf3bd1c2888adcc3b0f26a0aa2fa85e35c4973e072869a8656959d820cb92991f1cb8b9f1169aecc5e5b29aca57f820c9a20d0d480f5473a25fdeec60ad36a42b65c80c110e3a1ecda6cd749ee833dc9d044a0ab3badb9c9866c6d4622612ced8b859fd4849a233037e2a1de1f165663be9920b1e7cdd93380187dd8ef8"}, @enc_lim={0x4, 0x1, 0xfc}, @ra={0x5, 0x2, 0x8}]}}}, @dstopts_2292={{0x1078, 0x29, 0x4, {0x84, 0x20b, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @generic={0x7f, 0x1000, "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"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x76, [0x0, 0x45d66cde, 0x3, 0x3, 0x4]}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x80}}, @hopopts={{0x20, 0x29, 0x36, {0x2c, 0x0, '\x00', [@ra={0x5, 0x2, 0x2c2a}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x5e, 0x4, 0x2, 0x7f, 0x0, [@remote, @local]}}}, @hopopts={{0x20, 0x29, 0x36, {0x16, 0x0, '\x00', [@pad1]}}}], 0x1328}}], 0x5, 0x40) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x1, 0x0, 0x2, 0x4, 0x0, 0x40, 0x10000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7e4, 0x1, @perf_bp={&(0x7f00000000c0), 0x17}, 0x881, 0x0, 0x1f, 0xb, 0x9, 0x1, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0xb, 0x24, 0x5, 0x5, 0x0, 0xff, 0x80400, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000180), 0x4}, 0x2010, 0x8000, 0xe05, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xfffffffb, 0x0, 0x8}) 03:25:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) [ 204.843898][T28047] loop2: detected capacity change from 0 to 262160 [ 204.920083][T28047] FAT-fs (loop2): bogus number of FAT sectors [ 204.926221][T28047] FAT-fs (loop2): Can't find a valid FAT filesystem 03:25:53 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:53 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 9) 03:25:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, 0x0, 0x0) openat$incfs(r0, &(0x7f0000000100)='.log\x00', 0x6000, 0x8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x10, '\x00', @d}) 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) [ 205.113380][T28154] loop4: detected capacity change from 0 to 262160 [ 205.118022][T28157] loop2: detected capacity change from 0 to 262160 [ 205.172043][T28157] FAT-fs (loop2): bogus number of FAT sectors [ 205.178205][T28157] FAT-fs (loop2): Can't find a valid FAT filesystem [ 205.188918][T28154] FAULT_INJECTION: forcing a failure. [ 205.188918][T28154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.202177][T28154] CPU: 0 PID: 28154 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 205.210594][T28154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.220829][T28154] Call Trace: [ 205.224104][T28154] dump_stack_lvl+0xd6/0x122 [ 205.228702][T28154] dump_stack+0x11/0x1b [ 205.232904][T28154] should_fail+0x23c/0x250 [ 205.237324][T28154] __alloc_pages+0x102/0x330 [ 205.241924][T28154] alloc_pages+0x382/0x3d0 [ 205.246344][T28154] folio_alloc+0x1a/0x20 [ 205.250623][T28154] filemap_alloc_folio+0x53/0xf0 [ 205.255558][T28154] __filemap_get_folio+0x443/0x690 [ 205.260672][T28154] pagecache_get_page+0x26/0xe0 [ 205.265556][T28154] grab_cache_page_write_begin+0x3f/0x50 [ 205.271190][T28154] cont_write_begin+0x53a/0x8b0 [ 205.276079][T28154] fat_write_begin+0x61/0xf0 [ 205.280688][T28154] ? fat_block_truncate_page+0x30/0x30 [ 205.286231][T28154] generic_perform_write+0x1b8/0x3e0 [ 205.291516][T28154] ? fat_write_begin+0xf0/0xf0 [ 205.296281][T28154] __generic_file_write_iter+0x195/0x2b0 [ 205.301969][T28154] ? generic_write_checks+0x250/0x290 [ 205.307378][T28154] generic_file_write_iter+0x75/0x130 [ 205.312800][T28154] do_iter_readv_writev+0x2de/0x380 [ 205.318113][T28154] do_iter_write+0x192/0x5c0 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) 03:25:53 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 205.322714][T28154] vfs_iter_write+0x4c/0x70 [ 205.327210][T28154] iter_file_splice_write+0x43a/0x790 [ 205.332591][T28154] ? splice_from_pipe+0xd0/0xd0 [ 205.337442][T28154] direct_splice_actor+0x80/0xa0 [ 205.342392][T28154] splice_direct_to_actor+0x345/0x650 [ 205.347799][T28154] ? do_splice_direct+0x190/0x190 [ 205.352825][T28154] do_splice_direct+0x106/0x190 [ 205.357676][T28154] do_sendfile+0x675/0xc40 [ 205.362166][T28154] __x64_sys_sendfile64+0x102/0x140 [ 205.367366][T28154] do_syscall_64+0x44/0xa0 03:25:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005140)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/70, 0x46}, {}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/153, 0x99}, {&(0x7f0000001240)=""/71, 0x47}, {&(0x7f00000012c0)=""/171, 0xab}, {&(0x7f0000001380)=""/122, 0x7a}, {&(0x7f0000001400)=""/206, 0xce}], 0x9, &(0x7f00000015c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000001640), 0x6e, &(0x7f0000003b00)=[{&(0x7f00000016c0)=""/124, 0x7c}, {&(0x7f0000001740)=""/90, 0x5a}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/114, 0x72}, {&(0x7f0000002840)=""/198, 0xc6}, {&(0x7f0000002940)=""/180, 0xb4}, {&(0x7f0000002a00)=""/206, 0xce}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x8, &(0x7f0000003b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000002100010000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x98}}, {{&(0x7f0000003c40)=@abs, 0x6e, &(0x7f0000005080)=[{&(0x7f0000003cc0)=""/246, 0xf6}, {&(0x7f0000003dc0)=""/94, 0x5e}, {&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/37, 0x25}, {&(0x7f0000004e80)=""/33, 0x21}, {&(0x7f0000004ec0)=""/92, 0x5c}, {&(0x7f0000004f40)=""/114, 0x72}, {&(0x7f0000004fc0)=""/154, 0x9a}], 0x8, &(0x7f0000005100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x3, 0x20, 0x0) r1 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, 0x0) [ 205.371772][T28154] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 205.377665][T28154] RIP: 0033:0x7f3a88ac0ae9 [ 205.382140][T28154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.401847][T28154] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 205.410277][T28154] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, 0x0) 03:25:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 205.418243][T28154] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 205.426279][T28154] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 205.434248][T28154] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 205.442249][T28154] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, 0x0) [ 205.538215][T28376] loop2: detected capacity change from 0 to 262160 03:25:54 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000100)={0x4, 0x80, 0x6, 0x3, 0x9, 0x4, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2080, 0x4, 0x7, 0x3, 0x401, 0x1, 0x3, 0x0, 0xf472, 0x0, 0x6721}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:25:54 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 1) 03:25:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 10) [ 206.052762][T28378] FAULT_INJECTION: forcing a failure. [ 206.052762][T28378] name failslab, interval 1, probability 0, space 0, times 0 [ 206.065454][T28378] CPU: 0 PID: 28378 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 206.073872][T28378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.083928][T28378] Call Trace: [ 206.087206][T28378] dump_stack_lvl+0xd6/0x122 [ 206.091811][T28378] dump_stack+0x11/0x1b [ 206.095994][T28378] should_fail+0x23c/0x250 [ 206.100419][T28378] ? __se_sys_memfd_create+0xfb/0x390 [ 206.105811][T28378] __should_failslab+0x81/0x90 [ 206.110625][T28378] should_failslab+0x5/0x20 [ 206.115140][T28378] __kmalloc+0x6f/0x370 [ 206.116070][T28384] loop4: detected capacity change from 0 to 262160 [ 206.119391][T28378] ? strnlen_user+0x137/0x1c0 [ 206.119416][T28378] __se_sys_memfd_create+0xfb/0x390 [ 206.135866][T28378] __x64_sys_memfd_create+0x2d/0x40 [ 206.141072][T28378] do_syscall_64+0x44/0xa0 [ 206.145503][T28378] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.151445][T28378] RIP: 0033:0x7faf9ad4eae9 [ 206.155853][T28378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.175453][T28378] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 206.183852][T28378] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 206.191807][T28378] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 206.199760][T28378] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 206.207758][T28378] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 206.215712][T28378] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 206.244292][T28382] FAULT_INJECTION: forcing a failure. [ 206.244292][T28382] name failslab, interval 1, probability 0, space 0, times 0 [ 206.256997][T28382] CPU: 1 PID: 28382 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 206.265410][T28382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.275462][T28382] Call Trace: [ 206.278737][T28382] dump_stack_lvl+0xd6/0x122 [ 206.283335][T28382] dump_stack+0x11/0x1b [ 206.287495][T28382] should_fail+0x23c/0x250 [ 206.291969][T28382] ? ext4_mb_new_blocks+0x328/0x1ee0 [ 206.297302][T28382] __should_failslab+0x81/0x90 [ 206.302071][T28382] should_failslab+0x5/0x20 [ 206.306631][T28382] kmem_cache_alloc+0x4f/0x320 [ 206.311398][T28382] ext4_mb_new_blocks+0x328/0x1ee0 [ 206.316511][T28382] ? kcalloc+0x32/0x50 [ 206.320592][T28382] ? ext4_find_extent+0x6cf/0x7f0 [ 206.325669][T28382] ? ext4_ext_search_right+0x300/0x540 [ 206.331137][T28382] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 206.336861][T28382] ext4_ext_map_blocks+0x15f4/0x20a0 [ 206.342152][T28382] ? _raw_read_unlock+0x13/0x30 [ 206.347073][T28382] ext4_map_blocks+0x71e/0xf00 [ 206.351872][T28382] ext4_iomap_begin+0x4b0/0x630 [ 206.356733][T28382] ? ext4_alloc_da_blocks+0x100/0x100 [ 206.362108][T28382] iomap_iter+0x395/0x4a0 [ 206.366537][T28382] __iomap_dio_rw+0x660/0xf20 [ 206.371219][T28382] ? ___cache_free+0x46/0x300 [ 206.375902][T28382] iomap_dio_rw+0x30/0x70 [ 206.380238][T28382] ? ext4_file_write_iter+0x471/0x11f0 [ 206.385707][T28382] ext4_file_write_iter+0xaa9/0x11f0 [ 206.390996][T28382] ? ext4_file_write_iter+0x471/0x11f0 [ 206.396617][T28382] do_iter_readv_writev+0x2de/0x380 [ 206.401817][T28382] do_iter_write+0x192/0x5c0 [ 206.406437][T28382] ? splice_from_pipe_next+0x34f/0x3b0 [ 206.411898][T28382] ? kmalloc_array+0x2d/0x40 [ 206.416539][T28382] vfs_iter_write+0x4c/0x70 [ 206.421039][T28382] iter_file_splice_write+0x43a/0x790 [ 206.426445][T28382] ? splice_from_pipe+0xd0/0xd0 [ 206.431357][T28382] direct_splice_actor+0x80/0xa0 [ 206.436293][T28382] splice_direct_to_actor+0x345/0x650 [ 206.441696][T28382] ? do_splice_direct+0x190/0x190 [ 206.446760][T28382] do_splice_direct+0x106/0x190 [ 206.451664][T28382] do_sendfile+0x675/0xc40 [ 206.456083][T28382] __x64_sys_sendfile64+0x102/0x140 [ 206.461289][T28382] do_syscall_64+0x44/0xa0 [ 206.465703][T28382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.471653][T28382] RIP: 0033:0x7f3a88ac0ae9 03:25:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 2) [ 206.476066][T28382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.495673][T28382] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 206.504134][T28382] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 206.512110][T28382] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 206.520080][T28382] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 206.528056][T28382] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 206.536061][T28382] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 206.550554][T28395] FAULT_INJECTION: forcing a failure. [ 206.550554][T28395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.563730][T28395] CPU: 0 PID: 28395 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 206.572143][T28395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.582260][T28395] Call Trace: [ 206.585588][T28395] dump_stack_lvl+0xd6/0x122 [ 206.590193][T28395] dump_stack+0x11/0x1b [ 206.594350][T28395] should_fail+0x23c/0x250 [ 206.598828][T28395] should_fail_usercopy+0x16/0x20 [ 206.603882][T28395] _copy_from_user+0x1c/0xd0 [ 206.608470][T28395] __se_sys_memfd_create+0x137/0x390 [ 206.613752][T28395] __x64_sys_memfd_create+0x2d/0x40 [ 206.618941][T28395] do_syscall_64+0x44/0xa0 [ 206.623453][T28395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.629430][T28395] RIP: 0033:0x7faf9ad4eae9 [ 206.633827][T28395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.653445][T28395] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 206.661869][T28395] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 206.669823][T28395] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 206.677883][T28395] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 206.685847][T28395] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 206.693801][T28395] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 11) 03:25:54 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x464, 0x400, 0x70bd25, 0x25dfdbfb, "7cebcfe0f789d574076a27656377f125cb6499997425d9eb150f4a66771a7ba4dec89433e02e8e65f25af97ea3bc081e", ["", "", "", "", "", "", ""]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x40004000) 03:25:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 3) 03:25:54 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 206.821065][T28497] loop4: detected capacity change from 0 to 262160 [ 206.899824][T28497] FAULT_INJECTION: forcing a failure. [ 206.899824][T28497] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 206.913055][T28497] CPU: 0 PID: 28497 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 206.921553][T28497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.931603][T28497] Call Trace: [ 206.934979][T28497] dump_stack_lvl+0xd6/0x122 [ 206.939579][T28497] dump_stack+0x11/0x1b [ 206.943742][T28497] should_fail+0x23c/0x250 [ 206.948159][T28497] __alloc_pages+0x102/0x330 [ 206.952754][T28497] alloc_pages+0x382/0x3d0 [ 206.957214][T28497] folio_alloc+0x1a/0x20 [ 206.961458][T28497] filemap_alloc_folio+0x53/0xf0 [ 206.966436][T28497] __filemap_get_folio+0x443/0x690 [ 206.969266][T28600] FAULT_INJECTION: forcing a failure. [ 206.969266][T28600] name failslab, interval 1, probability 0, space 0, times 0 [ 206.971598][T28497] pagecache_get_page+0x26/0xe0 [ 206.971666][T28497] grab_cache_page_write_begin+0x3f/0x50 [ 206.971690][T28497] cont_write_begin+0x53a/0x8b0 [ 206.999514][T28497] fat_write_begin+0x61/0xf0 [ 207.004095][T28497] ? fat_block_truncate_page+0x30/0x30 [ 207.009538][T28497] generic_perform_write+0x1b8/0x3e0 [ 207.014810][T28497] ? fat_write_begin+0xf0/0xf0 [ 207.019574][T28497] __generic_file_write_iter+0x195/0x2b0 [ 207.025238][T28497] ? generic_write_checks+0x250/0x290 [ 207.030643][T28497] generic_file_write_iter+0x75/0x130 [ 207.036080][T28497] do_iter_readv_writev+0x2de/0x380 [ 207.041266][T28497] do_iter_write+0x192/0x5c0 [ 207.045951][T28497] ? debug_smp_processor_id+0x18/0x20 [ 207.051394][T28497] vfs_iter_write+0x4c/0x70 [ 207.055881][T28497] iter_file_splice_write+0x43a/0x790 [ 207.061295][T28497] ? splice_from_pipe+0xd0/0xd0 [ 207.066150][T28497] direct_splice_actor+0x80/0xa0 [ 207.071157][T28497] splice_direct_to_actor+0x345/0x650 [ 207.076513][T28497] ? do_splice_direct+0x190/0x190 [ 207.081523][T28497] do_splice_direct+0x106/0x190 [ 207.086371][T28497] do_sendfile+0x675/0xc40 [ 207.090785][T28497] __x64_sys_sendfile64+0x102/0x140 [ 207.096000][T28497] do_syscall_64+0x44/0xa0 [ 207.100440][T28497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 207.106366][T28497] RIP: 0033:0x7f3a88ac0ae9 [ 207.110765][T28497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.130416][T28497] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 207.138882][T28497] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 207.146850][T28497] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 207.154871][T28497] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 207.162836][T28497] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 207.170790][T28497] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 207.178839][T28600] CPU: 1 PID: 28600 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 207.187292][T28600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.197340][T28600] Call Trace: [ 207.200613][T28600] dump_stack_lvl+0xd6/0x122 [ 207.205231][T28600] dump_stack+0x11/0x1b [ 207.209387][T28600] should_fail+0x23c/0x250 [ 207.213826][T28600] ? shmem_alloc_inode+0x22/0x30 [ 207.218769][T28600] __should_failslab+0x81/0x90 [ 207.223577][T28600] ? shmem_match+0xa0/0xa0 [ 207.228070][T28600] should_failslab+0x5/0x20 [ 207.232585][T28600] kmem_cache_alloc+0x4f/0x320 [ 207.237347][T28600] ? shmem_match+0xa0/0xa0 [ 207.241762][T28600] shmem_alloc_inode+0x22/0x30 [ 207.246528][T28600] new_inode_pseudo+0x38/0x190 [ 207.251301][T28600] new_inode+0x21/0x100 [ 207.255688][T28600] shmem_get_inode+0xb7/0x460 [ 207.260369][T28600] __shmem_file_setup+0xf1/0x1d0 [ 207.265375][T28600] shmem_file_setup+0x37/0x40 [ 207.270136][T28600] __se_sys_memfd_create+0x1eb/0x390 [ 207.275452][T28600] __x64_sys_memfd_create+0x2d/0x40 [ 207.280694][T28600] do_syscall_64+0x44/0xa0 [ 207.285112][T28600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 207.291009][T28600] RIP: 0033:0x7faf9ad4eae9 [ 207.295420][T28600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 207.315044][T28600] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 207.323453][T28600] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 207.331483][T28600] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 207.339450][T28600] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff 03:25:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:55 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfc, 0x0, 0x10, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, 0x0, 0x40) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x3af605, 0x60) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f0000000240)={0x2, &(0x7f0000000080)=[{0x6, 0xc2, &(0x7f0000000140)="26cac24956feeb26881260ea9a0581be7984c47e32998ef7aba579ece1cc91bc9453034b1a6fa7d922eb39f36687c6cd54a922659b3d9a44f7348eb83547f8afa223f6a2718b009452735d1b9c8ff36c56fe054747cc7991fed1cbecf088977767f6c4d8b772240e219c810d8b490d9819120348ec1d9c3e863609075ab3cfa79a3427142e7ccf54048c1424a2742d369f84e348d10a6928202791b57200cf3549fa06f0575d70711dd775b5f5438913cea8fc02dbad2ed3f73b760acc93f78b6c0d"}, {0x5bab, 0xc, &(0x7f0000000040)="df7d7dc7c9bba8df087c7fd5", 0x514d842a455743c9}]}) [ 207.347441][T28600] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 207.355406][T28600] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 4) 03:25:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 12) [ 207.454094][T28607] FAULT_INJECTION: forcing a failure. [ 207.454094][T28607] name failslab, interval 1, probability 0, space 0, times 0 [ 207.466756][T28607] CPU: 0 PID: 28607 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 207.475219][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.485441][T28607] Call Trace: [ 207.488717][T28607] dump_stack_lvl+0xd6/0x122 [ 207.493385][T28607] dump_stack+0x11/0x1b [ 207.497547][T28607] should_fail+0x23c/0x250 [ 207.501969][T28607] ? security_inode_alloc+0x30/0x180 [ 207.507325][T28607] __should_failslab+0x81/0x90 [ 207.512170][T28607] should_failslab+0x5/0x20 [ 207.516677][T28607] kmem_cache_alloc+0x4f/0x320 [ 207.521447][T28607] security_inode_alloc+0x30/0x180 [ 207.526564][T28607] inode_init_always+0x20b/0x430 [ 207.531501][T28607] ? shmem_match+0xa0/0xa0 [ 207.535936][T28607] new_inode_pseudo+0x6f/0x190 [ 207.540732][T28607] new_inode+0x21/0x100 [ 207.544988][T28607] shmem_get_inode+0xb7/0x460 [ 207.549723][T28607] __shmem_file_setup+0xf1/0x1d0 [ 207.554664][T28607] shmem_file_setup+0x37/0x40 [ 207.559395][T28607] __se_sys_memfd_create+0x1eb/0x390 [ 207.564681][T28607] __x64_sys_memfd_create+0x2d/0x40 [ 207.569942][T28607] do_syscall_64+0x44/0xa0 [ 207.574356][T28607] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 207.580288][T28607] RIP: 0033:0x7faf9ad4eae9 [ 207.584699][T28607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:25:55 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3, 0x1, 0x7, 0x40, 0x0, 0x1000, 0xe0000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x8, 0xfffffffeffffffff}, 0x8, 0xc5, 0xe1, 0x7, 0x4, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, r1, 0xf, r3, 0x0) timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) tkill(r1, 0x13) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x1, 0x60, 0x2, 0x0, 0x3, 0x8000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x1014, 0x1, 0xffffffe1, 0x8, 0x6, 0x81, 0x7ff, 0x0, 0xfffffffd, 0x0, 0x9fcc}, r1, 0x6, r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r5 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r5}, &(0x7f0000044000)) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x4, 0x0, 0xf9, 0x0, 0x180, 0x2000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000180), 0x4}, 0x400, 0x8, 0xffff, 0x5, 0x4, 0x800, 0x7, 0x0, 0x8, 0x0, 0xbffc}, r5, 0xc, r4, 0xa) [ 207.604301][T28607] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 207.612778][T28607] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 207.620748][T28607] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 207.628781][T28607] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 207.636826][T28607] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 207.644814][T28607] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:55 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) [ 207.717680][T28714] loop4: detected capacity change from 0 to 262160 [ 207.789190][T28714] FAULT_INJECTION: forcing a failure. [ 207.789190][T28714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 207.802296][T28821] FAULT_INJECTION: forcing a failure. [ 207.802296][T28821] name failslab, interval 1, probability 0, space 0, times 0 [ 207.802452][T28714] CPU: 1 PID: 28714 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 207.823364][T28714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.833455][T28714] Call Trace: [ 207.836748][T28714] dump_stack_lvl+0xd6/0x122 [ 207.841325][T28714] dump_stack+0x11/0x1b [ 207.845464][T28714] should_fail+0x23c/0x250 [ 207.849907][T28714] __alloc_pages+0x102/0x330 [ 207.854508][T28714] alloc_pages+0x382/0x3d0 [ 207.859011][T28714] folio_alloc+0x1a/0x20 [ 207.863239][T28714] filemap_alloc_folio+0x53/0xf0 [ 207.868164][T28714] __filemap_get_folio+0x443/0x690 [ 207.873257][T28714] pagecache_get_page+0x26/0xe0 [ 207.878097][T28714] grab_cache_page_write_begin+0x3f/0x50 [ 207.883716][T28714] cont_write_begin+0x53a/0x8b0 [ 207.888577][T28714] fat_write_begin+0x61/0xf0 [ 207.893155][T28714] ? fat_block_truncate_page+0x30/0x30 [ 207.898606][T28714] generic_perform_write+0x1b8/0x3e0 [ 207.903882][T28714] ? fat_write_begin+0xf0/0xf0 [ 207.908637][T28714] __generic_file_write_iter+0x195/0x2b0 [ 207.914317][T28714] ? generic_write_checks+0x250/0x290 [ 207.919705][T28714] generic_file_write_iter+0x75/0x130 [ 207.925088][T28714] do_iter_readv_writev+0x2de/0x380 [ 207.930275][T28714] do_iter_write+0x192/0x5c0 [ 207.934848][T28714] ? splice_from_pipe_next+0x34f/0x3b0 [ 207.940339][T28714] ? kmalloc_array+0x2d/0x40 [ 207.944981][T28714] vfs_iter_write+0x4c/0x70 [ 207.949473][T28714] iter_file_splice_write+0x43a/0x790 [ 207.954836][T28714] ? splice_from_pipe+0xd0/0xd0 [ 207.959741][T28714] direct_splice_actor+0x80/0xa0 [ 207.964769][T28714] splice_direct_to_actor+0x345/0x650 [ 207.970129][T28714] ? do_splice_direct+0x190/0x190 [ 207.975206][T28714] do_splice_direct+0x106/0x190 [ 207.980132][T28714] do_sendfile+0x675/0xc40 [ 207.984536][T28714] __x64_sys_sendfile64+0x102/0x140 [ 207.989721][T28714] do_syscall_64+0x44/0xa0 [ 207.994193][T28714] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 208.000083][T28714] RIP: 0033:0x7f3a88ac0ae9 [ 208.004543][T28714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.024193][T28714] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:25:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 5) [ 208.032587][T28714] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 208.040542][T28714] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 208.048495][T28714] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 208.056454][T28714] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 208.064410][T28714] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 208.072384][T28821] CPU: 0 PID: 28821 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 03:25:56 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 208.080795][T28821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.090853][T28821] Call Trace: [ 208.094173][T28821] dump_stack_lvl+0xd6/0x122 [ 208.098784][T28821] dump_stack+0x11/0x1b [ 208.103018][T28821] should_fail+0x23c/0x250 [ 208.107504][T28821] ? __d_alloc+0x36/0x370 [ 208.111829][T28821] __should_failslab+0x81/0x90 [ 208.116593][T28821] should_failslab+0x5/0x20 [ 208.121105][T28821] kmem_cache_alloc+0x4f/0x320 [ 208.125870][T28821] ? security_inode_alloc+0x138/0x180 [ 208.131285][T28821] ? __init_rwsem+0x59/0x70 [ 208.135786][T28821] __d_alloc+0x36/0x370 [ 208.139992][T28821] ? debug_smp_processor_id+0x18/0x20 [ 208.145366][T28821] d_alloc_pseudo+0x1a/0x50 [ 208.149882][T28821] alloc_file_pseudo+0x77/0x150 [ 208.154747][T28821] __shmem_file_setup+0x14c/0x1d0 [ 208.159773][T28821] shmem_file_setup+0x37/0x40 [ 208.164452][T28821] __se_sys_memfd_create+0x1eb/0x390 [ 208.169745][T28821] __x64_sys_memfd_create+0x2d/0x40 [ 208.174948][T28821] do_syscall_64+0x44/0xa0 [ 208.179408][T28821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 208.185377][T28821] RIP: 0033:0x7faf9ad4eae9 [ 208.189795][T28821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.209477][T28821] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 208.217909][T28821] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 208.225889][T28821] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 208.233876][T28821] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 208.241844][T28821] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 208.249813][T28821] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:56 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:25:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 13) 03:25:56 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) 03:25:56 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) writev(r1, &(0x7f0000001740)=[{&(0x7f0000000200)="9d9051df59208954b765bf834038ee63e5bd84bcf3a7a4987489b00f6dafe8471703ec88aa56d1a560e757544d841860e16af43d818ad12b8039bd251a01a07d94650e6e4c89494c09e1f2ad22e84120708634d094f359787d39e16a7d2e0570b4e52dcea3dbc1e36ea3d2f542671db250483a53a41ad0ce673043d8de7bcaf808ab716a35bd9513b2f63c156db343f7e2252d684b6775533931fb876442be0f72b6d24c08cf854c8ca7a52d362758d316c55afd40b49290eac8eeae0913787e392c19dcbe17", 0xc6}, {&(0x7f0000000300)="f89137a6a76e379448a99d46761d24c79bd0e5e651f6371f496af2654a21a29828a3ef24ae3ef1fad7d67cb8add1ecb05b216bffcd12952f0cf54ac8e08c2befb005c49934ac8c4fd02fc166ca64d234eca627d61471a592e3d1cb973ec1e54f782fc8df5cd58cb50f3b395e64e66bf4ca64aec02d3d1eecef1b734fc26f1da1e58a7ba24412e00bc72601b9780ebfaf3af44ca8aaf12c679583ae6af8396e6eb84ce52aea0ee8dea359fcce3771bb29eaba02a8048c9802927943d2493e9d93e957868f8cdce60ab23947b738627c2ae14b9e3a3b9ffc5ed5d3f3aab93ca2", 0xdf}, {&(0x7f0000000400)="0bf4b773ac796dcb6009a574a5c0fa3943bfd97b022c5214d6e397b38b455f1b5efc6990a4aa214ea03a7c50479f5911278c4f64b887d284f22cb68bfc3d8a84366b25771eff6ff07d65eb76107a30bf6d9628bcd4660df854ed6023c6160707b7f10edb81d5d1eec8665b76a7965b22a56a03b1674774a3d092c3989ac18da219c0f107af9efff43c8fcb85a1cfe1f8d2c082ee56b53ff44ba7c3df01f34025474f54e3e426a54b28972d2768358f1788464b0aaf715ca7802142ccc5256ebe3485970ed6eaec5276", 0xc9}, {&(0x7f0000000500)="aef81ec7b994133126ebcb2c0352a0dcd2a2813f0786c1656d02f7cffbcda474bfd6500e72872f09704c182185d100856b5d1c8f6e867b5b108292a667e70432badb7dc44739fa272792a73c6e3bcb88e24992ef7caadd8ccc4b66a5b8f1b3651abc8937f9d9c76299501c8b845dd08f033edc6f7edacf4746ddb43bd05aa10ac42d3911e8792a34e9d5d2bbf94deb3803", 0x91}, {&(0x7f00000005c0)="f594eefbd29ac10a380880f00e8e04b511cb698c15aeeeadade0598856a02893c84dd93b45aff112ea46afe75f359173896ab62827f808f25986b06d1dc973d11d80ff74e92e8bbbadf879b08f5c14ac241461e913f11bef130824581718", 0x5e}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="1d9eb78d54018ee2a5f272f5ebf08c558a873798644e2916092f92041a235057f0600ebc165a1ccdc3a34e3f3080880d2efb83948fde053e48c2ca42206b9272d8a92180", 0x44}, {&(0x7f0000000140)="ff489b2b2cbc35b1b8f0c300130584d266eb86b6cf5082e459c2b05ce3b66d936d728d7eef16fdb9fd61", 0x2a}, {&(0x7f00000016c0)="6d83de3a084052f3c03d1a581590302eabe49f9e9710a959d5ffa9e1dd068c93aef6a504ea004b82e0c9e29343b84ea55356fe39cd949fc19f5d318c39", 0x3d}, {&(0x7f0000001700)="9e8d37f98ae3", 0x6}], 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1, 0x0, 0x0, 0x24040040}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000053980)={0x0, ""/256, 0x0, 0x0}) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r7 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r10}, {}, {}, {r9}, {}, {}, {}, {}, {r9}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {r9}, {}, {}, {r9}, {}, {r8}, {}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {}, {0x0, r10}, {r9}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {r9}, {0x0, r10}, {r9}, {}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {0x0, r10}, {}, {r9}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {r8}, {r8}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {}, {}, {r8}, {r8}, {}, {}, {r8}, {0x0, r10}, {}, {}, {0x0, r10}, {0x0, r10}, {0x0, r10}, {r9, r10}, {}, {}, {}, {}, {}, {r8, r10}, {r9, r10}, {0x0, r10}, {}, {}, {r9}, {}, {}, {}, {}, {r9, r10}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {r9}, {0x0, r10}, {r9}, {}, {}, {}, {}, {}, {}, {r9, r10}, {}, {}, {}, {r9}, {0x0, r10}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r9}, {0x0, r10}, {}, {r9, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {r9}, {}, {}, {r9}, {}, {}, {r8}, {}, {}, {0x0, r10}, {0x0, r10}, {}, {}, {r8}, {0x0, r10}, {}, {r9}, {}, {}, {}, {r8, r10}, {}, {}, {r9}, {r8, r10}, {}, {}, {}, {}, {r9}, {r8}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {r8, r10}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000053b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053d80)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r8, r11}], 0x2, "fa941d01bce0b8"}) sendfile(0xffffffffffffffff, r3, 0x0, 0x100002000) r12 = accept4$packet(r4, 0x0, &(0x7f0000000100), 0x100800) ioctl$EXT4_IOC_MIGRATE(r12, 0x6609) [ 208.462531][T28833] loop4: detected capacity change from 0 to 262160 03:25:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 6) [ 208.505905][T28833] FAULT_INJECTION: forcing a failure. [ 208.505905][T28833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 208.519205][T28833] CPU: 0 PID: 28833 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 208.527719][T28833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.537859][T28833] Call Trace: [ 208.541132][T28833] dump_stack_lvl+0xd6/0x122 [ 208.545735][T28833] dump_stack+0x11/0x1b [ 208.549892][T28833] should_fail+0x23c/0x250 03:25:56 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 208.554387][T28833] __alloc_pages+0x102/0x330 [ 208.559058][T28833] alloc_pages+0x382/0x3d0 [ 208.563493][T28833] folio_alloc+0x1a/0x20 [ 208.567732][T28833] filemap_alloc_folio+0x53/0xf0 [ 208.572672][T28833] __filemap_get_folio+0x443/0x690 [ 208.577829][T28833] pagecache_get_page+0x26/0xe0 [ 208.582688][T28833] grab_cache_page_write_begin+0x3f/0x50 [ 208.588398][T28833] cont_write_begin+0x53a/0x8b0 [ 208.593258][T28833] fat_write_begin+0x61/0xf0 [ 208.597851][T28833] ? fat_block_truncate_page+0x30/0x30 [ 208.603316][T28833] generic_perform_write+0x1b8/0x3e0 [ 208.608651][T28833] ? fat_write_begin+0xf0/0xf0 [ 208.613459][T28833] __generic_file_write_iter+0x195/0x2b0 [ 208.619172][T28833] ? generic_write_checks+0x250/0x290 [ 208.624550][T28833] generic_file_write_iter+0x75/0x130 [ 208.629992][T28833] do_iter_readv_writev+0x2de/0x380 [ 208.635197][T28833] do_iter_write+0x192/0x5c0 [ 208.639834][T28833] ? splice_from_pipe_next+0x34f/0x3b0 [ 208.645377][T28833] ? kmalloc_array+0x2d/0x40 [ 208.649968][T28833] vfs_iter_write+0x4c/0x70 [ 208.654476][T28833] iter_file_splice_write+0x43a/0x790 [ 208.659913][T28833] ? splice_from_pipe+0xd0/0xd0 [ 208.664837][T28833] direct_splice_actor+0x80/0xa0 [ 208.669785][T28833] splice_direct_to_actor+0x345/0x650 [ 208.675238][T28833] ? do_splice_direct+0x190/0x190 [ 208.680362][T28833] do_splice_direct+0x106/0x190 [ 208.685281][T28833] do_sendfile+0x675/0xc40 [ 208.689700][T28833] __x64_sys_sendfile64+0x102/0x140 [ 208.694919][T28833] do_syscall_64+0x44/0xa0 [ 208.699334][T28833] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 208.705297][T28833] RIP: 0033:0x7f3a88ac0ae9 [ 208.709772][T28833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.729429][T28833] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 208.737840][T28833] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 208.745869][T28833] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 208.753865][T28833] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 208.761831][T28833] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 208.769827][T28833] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 208.787425][T28837] FAULT_INJECTION: forcing a failure. [ 208.787425][T28837] name failslab, interval 1, probability 0, space 0, times 0 [ 208.800108][T28837] CPU: 0 PID: 28837 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 208.808586][T28837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.818638][T28837] Call Trace: [ 208.821925][T28837] dump_stack_lvl+0xd6/0x122 [ 208.826596][T28837] dump_stack+0x11/0x1b [ 208.830804][T28837] should_fail+0x23c/0x250 [ 208.835290][T28837] ? __alloc_file+0x2e/0x1a0 [ 208.839879][T28837] __should_failslab+0x81/0x90 [ 208.844716][T28837] should_failslab+0x5/0x20 [ 208.849226][T28837] kmem_cache_alloc+0x4f/0x320 [ 208.853990][T28837] __alloc_file+0x2e/0x1a0 [ 208.858404][T28837] alloc_empty_file+0xcd/0x1c0 [ 208.863174][T28837] alloc_file+0x3a/0x280 [ 208.867424][T28837] alloc_file_pseudo+0xfa/0x150 [ 208.872277][T28837] __shmem_file_setup+0x14c/0x1d0 [ 208.877369][T28837] shmem_file_setup+0x37/0x40 [ 208.882053][T28837] __se_sys_memfd_create+0x1eb/0x390 [ 208.887373][T28837] __x64_sys_memfd_create+0x2d/0x40 [ 208.892618][T28837] do_syscall_64+0x44/0xa0 [ 208.897067][T28837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 208.902963][T28837] RIP: 0033:0x7faf9ad4eae9 [ 208.907372][T28837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 208.927002][T28837] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 208.935408][T28837] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 208.943489][T28837] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 208.951513][T28837] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 208.959485][T28837] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 208.967453][T28837] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 7) 03:25:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 14) 03:25:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000024c0)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff0170164b13ab3f44d22a03a9bc508788eea303e3655083612af84aae2045543dc6fd225efc141bff61ea8f0dc407eb1d719feae180c6addf9341822d67bb635ab02c253edddb9a6358c197cff20218b7865924a7af6c09f479e9c4d817d222c7739aee250ca2d40f254c5d49db960d12bc6c7e17ab82f2e01b8773171285b47896ed51f6"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100002000) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r1, 0x48, 0x0, 0x7398) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r3, 0xc4089434, &(0x7f0000002080)={0x0, 0x10001, 0x0, [0x80, 0x0, 0xfffffffffffffff7, 0x9a, 0x9], [0x6, 0x4, 0xfffffffffffffffc, 0x2, 0x9, 0x7f, 0x8e64, 0x7, 0x10000, 0x3, 0x80000001, 0x4, 0x9, 0x4, 0x3, 0x0, 0x4, 0xe4, 0x4, 0x8, 0x76, 0xc70, 0x8d, 0x4, 0xfffffffffffffffc, 0x7, 0x1c0000000, 0x7fffffff, 0x0, 0x100, 0x3e5, 0x3, 0x20, 0x9, 0x4, 0xa41a, 0x2, 0x10000000000, 0x1, 0xfffffffffffff001, 0x4, 0xffffffff80000001, 0x2, 0x1, 0x8000, 0x1, 0x7, 0x9, 0x0, 0xffffffffffffff81, 0x5, 0x7, 0x9, 0x8000, 0x0, 0x3, 0x1ff, 0x7, 0x0, 0xffffffff, 0x3, 0xfffffffffffffffa, 0x8, 0x3, 0x0, 0x5, 0xa0, 0x0, 0x72, 0xeb, 0x80, 0x9, 0x100000001, 0xffff, 0xffffffffffffffff, 0x9ff, 0x4f, 0x1, 0x6, 0x2, 0xf866, 0x2, 0x5, 0xac, 0x9, 0xffff, 0x0, 0x480a1eb9, 0x8, 0x1ff, 0x1, 0x9, 0x1, 0x9a, 0xff, 0x0, 0x2, 0xff, 0x5, 0x7ff, 0x3f, 0x200, 0x3, 0x8, 0x2, 0xfc54, 0x5, 0x5, 0x5, 0x5, 0x0, 0x4, 0xfffffffffffffff8, 0x8, 0x7ff, 0x3, 0x2a5b, 0x7, 0x1f, 0x9, 0x8]}) sendfile(r4, r5, 0x0, 0x80000001) read(r5, &(0x7f0000001080)=""/4096, 0x1000) recvmmsg(r3, &(0x7f0000000f40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/208, 0xd0}], 0x1, &(0x7f0000000300)=""/72, 0x48}, 0x8}, {{&(0x7f0000000380)=@nfc_llcp, 0x80, &(0x7f0000000780)=[{&(0x7f0000000400)=""/232, 0xe8}, {&(0x7f0000000500)=""/228, 0xe4}, {&(0x7f0000000600)=""/58, 0x3a}, {&(0x7f0000000640)=""/46, 0x2e}, {&(0x7f0000000680)}, {&(0x7f00000006c0)=""/144, 0x90}], 0x6, &(0x7f0000000800)=""/72, 0x48}, 0xffffffff}, {{&(0x7f0000000880)=@isdn, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000900)=""/195, 0xc3}, {&(0x7f0000000a00)=""/191, 0xbf}, {&(0x7f0000000ac0)=""/236, 0xec}], 0x3, &(0x7f0000000c00)=""/57, 0x39}, 0x4}, {{&(0x7f0000000c40)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000cc0)=""/170, 0xaa}, {&(0x7f0000000d80)=""/191, 0xbf}], 0x2, &(0x7f0000000e80)=""/138, 0x8a}, 0x200}], 0x4, 0x0, &(0x7f0000001040)={0x0, 0x3938700}) 03:25:57 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16, @ANYRES16], 0xfffffff0) [ 209.068633][T28844] FAULT_INJECTION: forcing a failure. [ 209.068633][T28844] name failslab, interval 1, probability 0, space 0, times 0 [ 209.081321][T28844] CPU: 0 PID: 28844 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 209.089735][T28844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.099783][T28844] Call Trace: [ 209.103060][T28844] dump_stack_lvl+0xd6/0x122 [ 209.107694][T28844] dump_stack+0x11/0x1b [ 209.111928][T28844] should_fail+0x23c/0x250 [ 209.116449][T28844] ? security_file_alloc+0x30/0x190 [ 209.121646][T28844] __should_failslab+0x81/0x90 [ 209.126584][T28844] should_failslab+0x5/0x20 [ 209.131092][T28844] kmem_cache_alloc+0x4f/0x320 [ 209.135853][T28844] security_file_alloc+0x30/0x190 [ 209.140875][T28844] __alloc_file+0x83/0x1a0 [ 209.145310][T28844] alloc_empty_file+0xcd/0x1c0 [ 209.150124][T28844] alloc_file+0x3a/0x280 [ 209.154364][T28844] alloc_file_pseudo+0xfa/0x150 [ 209.159216][T28844] __shmem_file_setup+0x14c/0x1d0 [ 209.164366][T28844] shmem_file_setup+0x37/0x40 [ 209.169117][T28844] __se_sys_memfd_create+0x1eb/0x390 [ 209.174407][T28844] __x64_sys_memfd_create+0x2d/0x40 [ 209.179633][T28844] do_syscall_64+0x44/0xa0 [ 209.184045][T28844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 209.190027][T28844] RIP: 0033:0x7faf9ad4eae9 [ 209.194437][T28844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 209.214041][T28844] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 209.222456][T28844] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4eae9 [ 209.230428][T28844] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007faf9ada80b3 [ 209.238495][T28844] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 209.246462][T28844] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 209.254520][T28844] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:57 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) [ 209.320456][T28852] loop4: detected capacity change from 0 to 262160 [ 209.358086][T28852] FAULT_INJECTION: forcing a failure. 03:25:57 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, 0x0, 0xfffffff0) [ 209.358086][T28852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.371387][T28852] CPU: 0 PID: 28852 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 209.379802][T28852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.389923][T28852] Call Trace: [ 209.393199][T28852] dump_stack_lvl+0xd6/0x122 [ 209.397884][T28852] dump_stack+0x11/0x1b [ 209.402239][T28852] should_fail+0x23c/0x250 [ 209.406657][T28852] __alloc_pages+0x102/0x330 [ 209.411278][T28852] alloc_pages+0x382/0x3d0 [ 209.415694][T28852] folio_alloc+0x1a/0x20 [ 209.419935][T28852] filemap_alloc_folio+0x53/0xf0 [ 209.424867][T28852] __filemap_get_folio+0x443/0x690 [ 209.429985][T28852] pagecache_get_page+0x26/0xe0 [ 209.434886][T28852] grab_cache_page_write_begin+0x3f/0x50 [ 209.440538][T28852] cont_write_begin+0x53a/0x8b0 [ 209.445391][T28852] fat_write_begin+0x61/0xf0 [ 209.450018][T28852] ? fat_block_truncate_page+0x30/0x30 [ 209.455536][T28852] generic_perform_write+0x1b8/0x3e0 [ 209.460855][T28852] ? fat_write_begin+0xf0/0xf0 [ 209.465625][T28852] __generic_file_write_iter+0x195/0x2b0 [ 209.471265][T28852] ? generic_write_checks+0x250/0x290 [ 209.476728][T28852] generic_file_write_iter+0x75/0x130 [ 209.482101][T28852] do_iter_readv_writev+0x2de/0x380 [ 209.487389][T28852] do_iter_write+0x192/0x5c0 [ 209.491976][T28852] ? splice_from_pipe_next+0x34f/0x3b0 [ 209.497538][T28852] ? kmalloc_array+0x2d/0x40 [ 209.502126][T28852] vfs_iter_write+0x4c/0x70 [ 209.506653][T28852] iter_file_splice_write+0x43a/0x790 [ 209.512084][T28852] ? splice_from_pipe+0xd0/0xd0 [ 209.516951][T28852] direct_splice_actor+0x80/0xa0 [ 209.521897][T28852] splice_direct_to_actor+0x345/0x650 [ 209.527307][T28852] ? do_splice_direct+0x190/0x190 [ 209.532332][T28852] do_splice_direct+0x106/0x190 [ 209.537185][T28852] do_sendfile+0x675/0xc40 [ 209.541614][T28852] __x64_sys_sendfile64+0x102/0x140 [ 209.546842][T28852] do_syscall_64+0x44/0xa0 [ 209.551265][T28852] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 209.557161][T28852] RIP: 0033:0x7f3a88ac0ae9 [ 209.561635][T28852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 209.581243][T28852] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 209.589684][T28852] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 209.597670][T28852] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 209.605679][T28852] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 209.613656][T28852] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 209.621626][T28852] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:57 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) 03:25:57 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, 0x0, 0xfffffff0) 03:25:57 executing program 3: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'wg0\x00', @ifru_flags}}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x2, 0x7}, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x100002000) 03:25:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 8) [ 209.751091][T28871] FAULT_INJECTION: forcing a failure. [ 209.751091][T28871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.764480][T28871] CPU: 1 PID: 28871 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 209.772892][T28871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.782964][T28871] Call Trace: [ 209.786242][T28871] dump_stack_lvl+0xd6/0x122 [ 209.790836][T28871] dump_stack+0x11/0x1b [ 209.795199][T28871] should_fail+0x23c/0x250 [ 209.799620][T28871] __alloc_pages+0x102/0x330 [ 209.804217][T28871] alloc_pages_vma+0x5ee/0x770 [ 209.809052][T28871] shmem_getpage_gfp+0x983/0x1380 [ 209.814083][T28871] ? rmqueue+0x4a/0xd20 [ 209.818294][T28871] shmem_write_begin+0x7e/0x100 [ 209.823198][T28871] generic_perform_write+0x1b8/0x3e0 [ 209.828616][T28871] ? current_time+0xed/0x1a0 [ 209.833214][T28871] __generic_file_write_iter+0xf7/0x2b0 [ 209.838789][T28871] ? generic_write_checks+0x250/0x290 [ 209.844164][T28871] generic_file_write_iter+0x75/0x130 [ 209.849541][T28871] vfs_write+0x7f5/0x950 [ 209.853789][T28871] __x64_sys_pwrite64+0xf5/0x150 [ 209.858741][T28871] do_syscall_64+0x44/0xa0 [ 209.863166][T28871] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 209.869066][T28871] RIP: 0033:0x7faf9ad01ab7 [ 209.873477][T28871] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 209.893080][T28871] RSP: 002b:00007faf98ac4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 209.901835][T28871] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01ab7 [ 209.910419][T28871] RDX: 0000000000000016 RSI: 0000000020000180 RDI: 0000000000000004 [ 209.918466][T28871] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 209.926507][T28871] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 209.934480][T28871] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 209.943628][T28871] loop2: detected capacity change from 0 to 262160 03:25:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 15) 03:25:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 9) [ 210.044955][T28877] FAULT_INJECTION: forcing a failure. [ 210.044955][T28877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.058114][T28877] CPU: 0 PID: 28877 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 210.066553][T28877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.076607][T28877] Call Trace: [ 210.079883][T28877] dump_stack_lvl+0xd6/0x122 [ 210.084482][T28877] dump_stack+0x11/0x1b [ 210.088646][T28877] should_fail+0x23c/0x250 03:25:58 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) [ 210.093114][T28877] should_fail_usercopy+0x16/0x20 [ 210.098222][T28877] copy_page_from_iter_atomic+0x2f1/0xc60 [ 210.103979][T28877] ? shmem_write_begin+0x7e/0x100 [ 210.109007][T28877] generic_perform_write+0x201/0x3e0 [ 210.114295][T28877] ? current_time+0xed/0x1a0 [ 210.119032][T28877] __generic_file_write_iter+0xf7/0x2b0 [ 210.124589][T28877] ? generic_write_checks+0x250/0x290 [ 210.130014][T28877] generic_file_write_iter+0x75/0x130 [ 210.135418][T28877] vfs_write+0x7f5/0x950 [ 210.139730][T28877] __x64_sys_pwrite64+0xf5/0x150 [ 210.144712][T28877] do_syscall_64+0x44/0xa0 [ 210.149206][T28877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 210.155218][T28877] RIP: 0033:0x7faf9ad01ab7 [ 210.159628][T28877] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 210.179301][T28877] RSP: 002b:00007faf98ac4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 210.187742][T28877] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01ab7 [ 210.195712][T28877] RDX: 0000000000000016 RSI: 0000000020000180 RDI: 0000000000000004 [ 210.203907][T28877] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 210.211877][T28877] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 210.219849][T28877] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 210.235422][T28882] loop4: detected capacity change from 0 to 262160 03:25:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/130, 0x82}, {&(0x7f0000000200)=""/76, 0x4c}, {&(0x7f0000000280)=""/106, 0x6a}, {&(0x7f0000000300)=""/185, 0xb9}], 0x4, 0x2ec00, 0x3f) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000400)={'#! ', './file0', [{0x20, 'cgroup.controllers\x00'}], 0xa, "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"}, 0x101f) socket$nl_generic(0x10, 0x3, 0x10) sendfile(0xffffffffffffffff, r1, 0x0, 0x100002000) [ 210.239787][T28877] loop2: detected capacity change from 0 to 262160 [ 210.290189][T28882] FAULT_INJECTION: forcing a failure. [ 210.290189][T28882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 210.303557][T28882] CPU: 0 PID: 28882 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 210.312073][T28882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.322124][T28882] Call Trace: [ 210.325451][T28882] dump_stack_lvl+0xd6/0x122 [ 210.330071][T28882] dump_stack+0x11/0x1b [ 210.334291][T28882] should_fail+0x23c/0x250 [ 210.338715][T28882] __alloc_pages+0x102/0x330 [ 210.343372][T28882] alloc_pages+0x382/0x3d0 [ 210.347786][T28882] folio_alloc+0x1a/0x20 [ 210.352026][T28882] filemap_alloc_folio+0x53/0xf0 [ 210.356961][T28882] __filemap_get_folio+0x443/0x690 [ 210.362064][T28882] pagecache_get_page+0x26/0xe0 [ 210.366929][T28882] grab_cache_page_write_begin+0x3f/0x50 [ 210.372599][T28882] cont_write_begin+0x53a/0x8b0 [ 210.377503][T28882] fat_write_begin+0x61/0xf0 [ 210.382078][T28882] ? fat_block_truncate_page+0x30/0x30 [ 210.387522][T28882] generic_perform_write+0x1b8/0x3e0 [ 210.392814][T28882] ? fat_write_begin+0xf0/0xf0 [ 210.397578][T28882] __generic_file_write_iter+0x195/0x2b0 [ 210.403194][T28882] ? generic_write_checks+0x250/0x290 [ 210.408550][T28882] generic_file_write_iter+0x75/0x130 [ 210.414091][T28882] do_iter_readv_writev+0x2de/0x380 [ 210.419326][T28882] do_iter_write+0x192/0x5c0 [ 210.423902][T28882] ? splice_from_pipe_next+0x34f/0x3b0 [ 210.429344][T28882] ? kmalloc_array+0x2d/0x40 [ 210.433931][T28882] vfs_iter_write+0x4c/0x70 [ 210.438419][T28882] iter_file_splice_write+0x43a/0x790 [ 210.443778][T28882] ? splice_from_pipe+0xd0/0xd0 [ 210.448661][T28882] direct_splice_actor+0x80/0xa0 [ 210.453593][T28882] splice_direct_to_actor+0x345/0x650 [ 210.459003][T28882] ? do_splice_direct+0x190/0x190 [ 210.464118][T28882] do_splice_direct+0x106/0x190 [ 210.468953][T28882] do_sendfile+0x675/0xc40 [ 210.473352][T28882] __x64_sys_sendfile64+0x102/0x140 [ 210.478624][T28882] do_syscall_64+0x44/0xa0 [ 210.483029][T28882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 210.489004][T28882] RIP: 0033:0x7f3a88ac0ae9 [ 210.493404][T28882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 210.512994][T28882] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 210.521471][T28882] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 210.529440][T28882] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 03:25:58 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, 0x0, 0xfffffff0) [ 210.537394][T28882] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 210.545378][T28882] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 210.553348][T28882] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 03:25:58 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) 03:25:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0xfffffff0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="1c010000190001ff0000000000deffff01"], 0x11c}], 0x1}, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x4000010, r0, 0xdd1a3000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000200)="3ba3ee1821c447dc30f8a4afe32173308666f71dd7e9a68c92a5b7dc0e8134f7a163e9c4a79c2e9df564d2bd7543010fbb46930cf56e121e9d3e023cb0623065e05a4497c92bb15dab84ef9b8f01f70648f53d9a08c4ec25d4c82036f2f5f0640701bcd635154d4e81f5c21038952e4e997410070393e39b0dd195364abf4d622c9e800663e37e3c4efdb73b3d3e0d3f277a7a56ba5fe06dfd8cb2aa67ce61a79f95992364b06f7ff46cd3da185e000a21e60a28347e2662ce46bc825523d8a24d8ab62e8977a4644f90b8ee222424944e27db91f15552a13bd7cf45e255da91cc1926984eae99c50c55e3b6aedb959abc6d2611a563e21a1f1a30152179fa2773b42ad3f3c4070a9ddadfc825a006b68bfab3b95b4367a04d4d6dcc0a24c5ea94f2cacba1ddc6d7f72d26d179c962079f416f968b04ec9b568a46a9baf97f424cc6e1eecdb1deb1394ffbc10f3ab44fb998ac464e7def2bcfc4c3d70f6716779f01b0744a493b8dd541deda88c41496926ac9f63cea242352b5d714284bf925fafc59289528d5a60587121e88ad358c6e2243f4bcab93051e1de2484603c4af3fc12a96f3780ffe932bd9081a155977e324b9638149a3e915cbd511def9996648922c309700c5d52274a81a63606708bb9b2ca79af421a46349dbcb6e9bc52d977b0c5ddea6fb52f5e9a8e228d72e7a5eaa7c09c86fcff801277e5a44b0f2e5f44f7b43ab5a7fce8c34f7733f48e594111095dd8086cd0e575eb1d9093b0832e12675aa4101e2fff08601bb69c9b1acc420e72defa36d3efb08254af5b43a2adf1b50ce7bc1e3f54fd2d450d71fcd8e404b4c5fb9fd0fdd1ff962661f6310f0f3a8b1ce0a965a1f237373a6f982979cde961f875df0d5ce328c1eed5cbcbbb6fa7c2e70936a87198725724c572a5ab46b8d094f96a74673e407c3c381b81216e7b3b90d206e093f8a0eb872493e090da47d5c335adf9de3c7b362cbfd0b796079a0fbef78cf9825ded7dc0da70d4733da589a2fc37b9bd3a6b7aaf3d9b0c294a63ca28f8a183070a11a8519097bdaeda811d1c7bcbe13f8dea7930fb0897fcd0ff7cee0ba38eec464d50197b944bb13ccfe78b0c2d1bd4d1548b64d9717ea331fc73e1f5524ea1c9e104cd4fe2dcf575abdb8670093a31ed6c0cce311435b7ec6eab835dc89687994dfbed3258b4ff697052df6325ddc02107fe7f5c9d24741426b1f3f23c107adb8ffc1870726199beba6610d127237a86d91407ecabf6c2c8fa861c06424c8ccfb595d98b6bfc45bf76912b9758005dea3cece2d46d76ca67b4c7bd700755980c2e0c8d2fd3608ccaf94fa088b0f99d8034de6c8da5fb5a90e54f1a67c966d7225a68eeb8f12a20cca429637d99cf2eadbb5eb0458a032412f34812f589921a05bb9d632a00f3d31b6ea315e3b1e1e4f8d8463cc1cce2b1aaed2a8c43fccbda624b7afae24090162f2c95a4f2a5e21038f3ae7e09052ab03a6f82f0fb087a7dfc2bd631aadff1fa6ce4c6ed91377c94e667adbbb6fc35b66d2661a960dfbe698077fa2f5ba3fbdb92942f481a5ac816aa112390284187043461349d850b12c693708f3263eaf675851d8489fc6f0cf5f0b6ad9cbc20f59fbc16150a30ef471282f6e4da9487c6c304c76d55164d263c4d520a3524df0e9a37748388d7b587555b1781ea64c1465adf1c7ab35d4105379792446e8350d26fb746062049fe52fbd4c76f4df4b71fc94402ddc4f975264a0ff4393eaa74bc99c88f8b22aa261b57a0f4d02432eb3559dcf398418d69f0c06a81e7c58ebb22525e470f751cc455da85d46f7ad0a26dbcf970a0602a4ddb0855a8783adb99e6a7a02edb9d31fc28300db6b488fedd785865c4028f38a4c5b4e976db13dcb6f93c6e371dcf9f144e76a69eb93e4364ab00378a32ed65420f3c4409b8e527f3a0dcdb0f723aeb99370e640a2aaf2473f2c3d42bfc30baa0eff41b2ed558b3e28e2872090f79dc4b10c6e6f583fd7f89267b3b87ac85037b11348e8fb525eeca3fb321b05acb2dacd4bf7a393f3c9de9ce780a9a43e6aeb585b86d5996ee8789455a8181007cff6dcbd0b783bac4d0f4fa912a2d66d7476d68d9d4e8cf5bf9eb79e8c3ca2ee40745f1f5ffa5cdb49a96ca7c0059ab227aaa7405948de7b481b9b5ad1ea4a10858d2f1fcfe670f17a8ef47fd5b9de798361661d61f6430ed10dc0cfe92489b182981250d52be87213c05baa34bc9925927011ac5fb5c770a1302018b5bade6f808cacecb6076e9f514d09a14ab114d017180f9474efccb7b0b261645fd620686da312c7187cf049b25c809c00970b464d0ddb97002127833a45f243d23671cf749352edc2ff1508028b5ecfb1d38f690b158dff73e84a13ae9b53f9391ad210d64c1d491ac78af00c9eaa5c24740f86515e5c37ed0add9678e14fe02d93f37d8f1b17c1928ec9c0ac98e0eda68061b0cdc0c63bc97652076f5d694a6b73f3797c69e8ffbc0b9c363d3b0ae8eb0212f45212d724f47f9eaf283a93101e093d282e8020fdf1d16784c75c80494b989680e495e1a899f42d592688b5f0f3351be3186891236ad8eb2259420a54101700d848d4fcb24f19bfd31a5f89f7322d6fc3c7f3268bbcacb80a9f5485bde7ee3ff6451f99b394d584c68b04722e86bba9669d5c75b8f1bae67ac2d68e31fb6adc230d4a5397219f009d0350c6fb9fed50de661091db736b69b67112ca78a0125e645ac0efa0842fb053d4721e24b222af895b50fcf8695e7c2f49f94c5771dd48a965f73fe18ab655dd6f46ac770c1b98be40e5cf43778fb5d0ddb70d8c22ed57fe289d1b597480e354fed47b670d3778ff747fcd34aa21b52aff01c41d02e53c44b02d7c31e7b85dfb22e0373c04f0afc4cf1f5ecfc78873678ec52113bac347a71486dca7d28a3f50fd5bb229615ca06577c053ec21d5a07a697631c892caa3905aeff62e72f7cdaac111e19690b206414da8f45cacacf4097d86074afdcde0976e6f337fd39a2700253bae56a832fec484753f699a05c6fe557f8348e865342cc7037ad6af35c9b78782a67756841b5ebc1f9a28c30a11145d5ffafbb83813e24e77bcf0903adc0be6912a7f337e82def106ada6a8f2cf01a0dd1369d6c6f3c7a16be571e735162ce2ab5dab2d9245b64c77bf585e7aff0839f0e3ac0f1762e6cc1b7ccf659f13ef15cffbe0c293bccb927b8add588a89e6df5ca42c3a9da08414017e401df53464c553fbfe37d4f61390ce7797f972a86a99cd3c5bb1147700232b574bdaa51eeb49dda54fa7ad41d6c32b486f359c4aebe8dd4959a9c30c6d263dfc1d6374dc0fd8d2c09c3b85441ff943eeb33a0f2d0be6cbfacc99a2a6585424cce8db4b5c1d43109625533bf60e188f6c25513b1fef5da684faef3eb2e35a651ed95dc75fed870a70777e04484d955927e5ae9a5823fa92d6b68f575d6433b9d2e94182de2b74e7572d2827fcdad67502799c48457b606c4f126e7275c7fe8ab9427b2cb95a06130c99247f2d90241623d72ccdb0d80370dd591609b552009f0fe1f75f170358ffec829a5ff6c8f65df7f03bce568401df489bf220f8168c811b0f0c09dd5d59fe81564fea26fbd510f9e79f9a257e5d12aa6ddb807e5b0bd0b0014d4f4f18b14545497749d2b8e6f36fcfdb8f75fba35769c73dfeac6974de85bcf019f049c06445569022c281edf371a63e189fdc119cefc38278c9f54d7674d66b970a50eb1d08febd48677578b3f394704eb2eae2652450e89be20a95f4363faf908b1d4b10d0e6578fa42aa4ad5240aefe42c863b8d202412194a33c8c879adc7c441935db2866699599aa0c27157f96368b5bb17b3154fa09bf6b490af4d614c4496bb60ec3f7456c37f93d3df35347412b0eda8a5bf4ff59abf5939fedd30cf585385aa9e834de316872729bc8d3eb0873756253faa4baad41453fb34d882a17da3d152c5f7c1974ffe91d3927c402db0b7e3b6c67571d42b1c766ba81e11db5c6072abbbed7ff2136cad3ca280e7b4d57880894f25461d9309fd463c3d46eee7e8acb9e372c5af9c93ee4febbdd467900d0a565907ff430a6d7826b348f9c727d652f0c9b2798788b5ac3c40d6d481402a31d2879b91235498ba1d0ffcd398e3afbc787b5cbfd2971a636dd646cdbfa7c74fb946979a963fdca67a0cbb6b48b0e1a9b24550e8886418ee72b3fc1a90a872be52fa8c2090feeedcfd910f1caf254cf6c48a1858ff017d7fab62f451133b4a7123a09b336f850915f5c16511ba72eb2194a01d9f847a6414ebb849c6d65197fca3160788b3c969c2b44850a55ca34e85db98023ccb78718ba422cead16f923aa9643fcdee8f3cfe74d77ba2f0bb35119148068cd74bd2d5de8a91adaece8ec9780715d4e0b5743769e3ab1f6d9350b088f4178cb357a226fccb53fea3c472806a143a294d520f55bf000ec8e623d759ce27bce0691b2c7be87c53d329c1f1da77d97976a716d4972a73c55bbc972cb4e96371f003e5ee2f7e109fdb5caf8add52314ff2c9aa93e684bb995485cc433dd840ebf99b6ce5eabed94709cf546720b78be7d887527b8e055b01ab59b45a7348ee2e650a708467a1c36d813f7cdd36349098892072faadcc30f5dfd69d5100b7e2206043da22f43fb19cc5505d6f926beb4d43fb8debe3cdd6556119b27f4e5af397c90e24e7a2c440c31b40e125e5638e0e7b2c8b22d122ae1941af1ada49496d5c853a25887a3b682bc3e41cca109bec3c06e583406674cc5d9ea33306e973603cf3064927e6d232b69728e109b2048299d239f59ce2da49537d167d0288adc990549e4c3c2c8fe7c511a3f1a113c6367eda231be293366a5d7189f0c91b9635b17998dee0a761528141a814203549dbb7d3c93484c29241e50ec9db39567c8a5da9eb93e878e54098e0ce859ce8a269c0e02a42436856f268e37c4cb9972d52b27f5013ac3e5312c94abf5c58789cc1a8419b54fb2637a090a7107978a4beea5c96b39218308a309cd1d952114c94215bcac440a589940a6851515e780bb6c0fad5c93c1bd20e0d98ff6ba1dd657e03b5a1d8fc12b67cd4318d0e94b0922e04149d6b44631c8751f42b7563c2ed845220927d8ab7e8d652b9466a13cee35a9dc6354e8bc48f21f969cb04bcb3d11ad3d9c7309ce5522b573c0c615cc9666c84a66589c10d5625073324eda9b7abeced977fe3db4bb0030a8ab5cdd903335bcdc35625f6f0c11dc8180c3f18ba4123ab09912e0d154a8b0c72efd4f8c4a82960686a2a6b5a818ee54089d23c5ca46ab6b4abfcfbe9a879f3087f04a5df6b105e4a2afb57bd2be4aac692a46d273070a6c95a9525aad7b1196d86e1ec1041db0eb1ab2689837937d67bed569b57cbd60edc264047789dec2485229d1c8fea8c801bf736a92b6463db1437a5b87f2f969d98812844cb202e10b8f2b3c6142653ac69c0115d63b379e955710aebcbe523c68e341066f12f4d7d30cac9c6637acfa4b3636da07ff69a73180aa3daa539cfa7e1c1c2396f9265775a827e830b0ec4b29ce7ec173fa993ef727ced86422df57a00d2f1ac932f053e48e23fc8f200194972d1a56c5686182ecd6fd297e99e2097d3a8d9655c658e7b66bb4046012da25f9f10db55f4e77c41a39ad1ddabc82bc333a160c64e34cae2635606d5c50a6efb0b52f8382879903e04ac71a6b8a5a28e386d45deeaf495421b4f826d89bd652120613876cd0b2a335a169a0221591d92e17bdfab4c16bb1ce445c990f1d35534b8c8ba") sendfile(r2, r1, 0x0, 0x100002000) r3 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, 0x0, 0x0) fcntl$addseals(r3, 0x409, 0x5) 03:25:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 10) [ 210.823523][T28900] FAULT_INJECTION: forcing a failure. [ 210.823523][T28900] name failslab, interval 1, probability 0, space 0, times 0 [ 210.836180][T28900] CPU: 0 PID: 28900 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 210.844656][T28900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.854710][T28900] Call Trace: [ 210.857986][T28900] dump_stack_lvl+0xd6/0x122 [ 210.862585][T28900] dump_stack+0x11/0x1b [ 210.866751][T28900] should_fail+0x23c/0x250 03:25:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 16) [ 210.871170][T28900] ? getname_flags+0x84/0x3f0 [ 210.875848][T28900] __should_failslab+0x81/0x90 [ 210.880615][T28900] should_failslab+0x5/0x20 [ 210.885124][T28900] kmem_cache_alloc+0x4f/0x320 [ 210.889892][T28900] getname_flags+0x84/0x3f0 [ 210.894391][T28900] ? vfs_write+0x667/0x950 [ 210.898874][T28900] getname+0x15/0x20 [ 210.902769][T28900] do_sys_openat2+0x6d/0x2b0 [ 210.907435][T28900] __x64_sys_openat+0xef/0x110 [ 210.912202][T28900] do_syscall_64+0x44/0xa0 [ 210.916736][T28900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 210.922681][T28900] RIP: 0033:0x7faf9ad01a04 [ 210.927188][T28900] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 210.946796][T28900] RSP: 002b:00007faf98ac4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 210.955207][T28900] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01a04 [ 210.963245][T28900] RDX: 0000000000000002 RSI: 00007faf98ac5000 RDI: 00000000ffffff9c 03:25:59 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000001) [ 210.971213][T28900] RBP: 00007faf98ac5000 R08: 0000000000000000 R09: ffffffffffffffff [ 210.979262][T28900] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 210.987238][T28900] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:25:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 1) [ 211.059243][T28906] FAULT_INJECTION: forcing a failure. [ 211.059243][T28906] name failslab, interval 1, probability 0, space 0, times 0 [ 211.071876][T28906] CPU: 0 PID: 28906 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 211.080338][T28906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.090379][T28906] Call Trace: [ 211.093655][T28906] dump_stack_lvl+0xd6/0x122 [ 211.098236][T28906] dump_stack+0x11/0x1b [ 211.102399][T28906] should_fail+0x23c/0x250 [ 211.106871][T28906] ? __se_sys_memfd_create+0xfb/0x390 [ 211.112274][T28906] __should_failslab+0x81/0x90 [ 211.117081][T28906] should_failslab+0x5/0x20 [ 211.121573][T28906] __kmalloc+0x6f/0x370 [ 211.125711][T28906] ? strnlen_user+0x137/0x1c0 [ 211.130398][T28906] __se_sys_memfd_create+0xfb/0x390 [ 211.135610][T28906] __x64_sys_memfd_create+0x2d/0x40 [ 211.140905][T28906] do_syscall_64+0x44/0xa0 [ 211.145323][T28906] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 211.151277][T28906] RIP: 0033:0x7f5a8a809ae9 [ 211.155672][T28906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 211.175432][T28906] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 211.183832][T28906] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 211.191787][T28906] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 211.199742][T28906] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff 03:25:59 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) [ 211.207700][T28906] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 211.215653][T28906] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 03:25:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 11) [ 211.309970][T28914] FAULT_INJECTION: forcing a failure. [ 211.309970][T28914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.323143][T28914] CPU: 0 PID: 28914 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 211.331634][T28914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.341686][T28914] Call Trace: [ 211.344966][T28914] dump_stack_lvl+0xd6/0x122 [ 211.349565][T28914] dump_stack+0x11/0x1b [ 211.353774][T28914] should_fail+0x23c/0x250 03:25:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 2) [ 211.358238][T28914] should_fail_usercopy+0x16/0x20 [ 211.363264][T28914] strncpy_from_user+0x21/0x250 [ 211.368181][T28914] getname_flags+0xb8/0x3f0 [ 211.372682][T28914] ? vfs_write+0x667/0x950 [ 211.376063][T28917] FAULT_INJECTION: forcing a failure. [ 211.376063][T28917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.377174][T28914] getname+0x15/0x20 [ 211.394058][T28914] do_sys_openat2+0x6d/0x2b0 [ 211.398643][T28914] __x64_sys_openat+0xef/0x110 [ 211.403520][T28914] do_syscall_64+0x44/0xa0 [ 211.407921][T28914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 211.413822][T28914] RIP: 0033:0x7faf9ad01a04 [ 211.418220][T28914] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 211.437889][T28914] RSP: 002b:00007faf98ac4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 211.446302][T28914] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01a04 [ 211.454358][T28914] RDX: 0000000000000002 RSI: 00007faf98ac5000 RDI: 00000000ffffff9c [ 211.462325][T28914] RBP: 00007faf98ac5000 R08: 0000000000000000 R09: ffffffffffffffff [ 211.470279][T28914] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 211.478246][T28914] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 211.486207][T28917] CPU: 1 PID: 28917 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 211.494695][T28917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.504745][T28917] Call Trace: [ 211.508066][T28917] dump_stack_lvl+0xd6/0x122 [ 211.512659][T28917] dump_stack+0x11/0x1b [ 211.516831][T28917] should_fail+0x23c/0x250 [ 211.521258][T28917] should_fail_usercopy+0x16/0x20 [ 211.526285][T28917] _copy_from_user+0x1c/0xd0 [ 211.530876][T28917] __se_sys_memfd_create+0x137/0x390 [ 211.536189][T28917] __x64_sys_memfd_create+0x2d/0x40 [ 211.541447][T28917] do_syscall_64+0x44/0xa0 [ 211.545862][T28917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 211.551793][T28917] RIP: 0033:0x7f5a8a809ae9 [ 211.556201][T28917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 211.575913][T28917] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 211.584322][T28917] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 211.592292][T28917] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 211.600256][T28917] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 211.608225][T28917] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 211.616197][T28917] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 211.630641][T28919] FAULT_INJECTION: forcing a failure. [ 211.630641][T28919] name failslab, interval 1, probability 0, space 0, times 0 [ 211.643261][T28919] CPU: 0 PID: 28919 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 211.651670][T28919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.654539][T28918] loop4: detected capacity change from 0 to 262160 [ 211.661739][T28919] Call Trace: [ 211.661748][T28919] dump_stack_lvl+0xd6/0x122 [ 211.670118][T28918] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 211.671512][T28919] dump_stack+0x11/0x1b [ 211.689057][T28919] should_fail+0x23c/0x250 [ 211.693473][T28919] ? kmalloc_array+0x2d/0x40 [ 211.698057][T28919] __should_failslab+0x81/0x90 [ 211.702837][T28919] should_failslab+0x5/0x20 [ 211.707397][T28919] __kmalloc+0x6f/0x370 [ 211.711554][T28919] kmalloc_array+0x2d/0x40 [ 211.716002][T28919] iter_file_splice_write+0xd5/0x790 [ 211.721290][T28919] ? atime_needs_update+0x2ba/0x390 [ 211.726551][T28919] ? touch_atime+0x11f/0x2e0 [ 211.731173][T28919] ? generic_file_splice_read+0x2a9/0x330 [ 211.736893][T28919] ? splice_from_pipe+0xd0/0xd0 [ 211.741781][T28919] direct_splice_actor+0x80/0xa0 [ 211.746788][T28919] splice_direct_to_actor+0x345/0x650 [ 211.752235][T28919] ? do_splice_direct+0x190/0x190 [ 211.757334][T28919] do_splice_direct+0x106/0x190 [ 211.762175][T28919] do_sendfile+0x675/0xc40 [ 211.766578][T28919] __x64_sys_sendfile64+0x102/0x140 [ 211.771836][T28919] do_syscall_64+0x44/0xa0 [ 211.776238][T28919] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 211.782117][T28919] RIP: 0033:0x7f3a88ac0ae9 [ 211.786516][T28919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:25:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 3) 03:25:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 12) [ 211.806136][T28919] RSP: 002b:00007f3a867f5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 211.814554][T28919] RAX: ffffffffffffffda RBX: 00007f3a88bd40e0 RCX: 00007f3a88ac0ae9 [ 211.822515][T28919] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 211.830548][T28919] RBP: 00007f3a867f51d0 R08: 0000000000000000 R09: 0000000000000000 [ 211.838521][T28919] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 211.846478][T28919] R13: 00007fffe8d1457f R14: 00007f3a867f5300 R15: 0000000000022000 03:26:00 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000001) [ 211.888079][T28922] FAULT_INJECTION: forcing a failure. [ 211.888079][T28922] name failslab, interval 1, probability 0, space 0, times 0 [ 211.900707][T28922] CPU: 0 PID: 28922 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 211.909162][T28922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.919209][T28922] Call Trace: [ 211.922488][T28922] dump_stack_lvl+0xd6/0x122 [ 211.927106][T28922] dump_stack+0x11/0x1b [ 211.931284][T28922] should_fail+0x23c/0x250 [ 211.935793][T28922] ? shmem_alloc_inode+0x22/0x30 [ 211.940804][T28922] __should_failslab+0x81/0x90 [ 211.945557][T28922] ? shmem_match+0xa0/0xa0 [ 211.949958][T28922] should_failslab+0x5/0x20 [ 211.954447][T28922] kmem_cache_alloc+0x4f/0x320 [ 211.959270][T28922] ? shmem_match+0xa0/0xa0 [ 211.964252][T28922] shmem_alloc_inode+0x22/0x30 [ 211.969134][T28922] new_inode_pseudo+0x38/0x190 [ 211.973883][T28922] new_inode+0x21/0x100 [ 211.978023][T28922] shmem_get_inode+0xb7/0x460 [ 211.982694][T28922] __shmem_file_setup+0xf1/0x1d0 [ 211.987643][T28922] shmem_file_setup+0x37/0x40 [ 211.992392][T28922] __se_sys_memfd_create+0x1eb/0x390 [ 211.997762][T28922] __x64_sys_memfd_create+0x2d/0x40 [ 212.002958][T28922] do_syscall_64+0x44/0xa0 [ 212.007359][T28922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 212.013265][T28922] RIP: 0033:0x7f5a8a809ae9 [ 212.017746][T28922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.037340][T28922] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 212.045829][T28922] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 212.053784][T28922] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 212.061743][T28922] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 212.069747][T28922] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 212.077769][T28922] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 212.102442][T28926] FAULT_INJECTION: forcing a failure. [ 212.102442][T28926] name failslab, interval 1, probability 0, space 0, times 0 [ 212.115159][T28926] CPU: 1 PID: 28926 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 212.123622][T28926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.133667][T28926] Call Trace: [ 212.136942][T28926] dump_stack_lvl+0xd6/0x122 [ 212.141580][T28926] dump_stack+0x11/0x1b [ 212.145751][T28926] should_fail+0x23c/0x250 [ 212.150169][T28926] ? __alloc_file+0x2e/0x1a0 [ 212.154814][T28926] __should_failslab+0x81/0x90 [ 212.159584][T28926] should_failslab+0x5/0x20 [ 212.164094][T28926] kmem_cache_alloc+0x4f/0x320 [ 212.168861][T28926] __alloc_file+0x2e/0x1a0 [ 212.172781][T28928] FAULT_INJECTION: forcing a failure. [ 212.172781][T28928] name failslab, interval 1, probability 0, space 0, times 0 [ 212.173276][T28926] alloc_empty_file+0xcd/0x1c0 [ 212.190573][T28926] path_openat+0x6a/0x1eb0 [ 212.194983][T28926] ? avc_has_perm_noaudit+0x1c0/0x270 [ 212.200349][T28926] ? avc_has_perm+0x70/0x160 [ 212.205003][T28926] ? avc_has_perm+0xd5/0x160 [ 212.209578][T28926] do_filp_open+0x105/0x220 [ 212.214068][T28926] do_sys_openat2+0xb5/0x2b0 [ 212.218680][T28926] __x64_sys_openat+0xef/0x110 [ 212.223430][T28926] do_syscall_64+0x44/0xa0 [ 212.227832][T28926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 212.233747][T28926] RIP: 0033:0x7faf9ad01a04 [ 212.238145][T28926] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 212.257745][T28926] RSP: 002b:00007faf98ac4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 212.266161][T28926] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01a04 [ 212.274119][T28926] RDX: 0000000000000002 RSI: 00007faf98ac5000 RDI: 00000000ffffff9c [ 212.282102][T28926] RBP: 00007faf98ac5000 R08: 0000000000000000 R09: ffffffffffffffff [ 212.290093][T28926] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 03:26:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 4) 03:26:00 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000051b80)={0x0, 0x0, "ef70e0e6a88b38e598666eae1dd80e16716b80ba1e00a402701b94ca1a99aa0b01fc06f967f21af4279219bb00d38357c74140069704ab490bf68afeb52d6bac55975c7a9830c73700b362dd3773a4d421fd3a141f7f7a6f15dcc6c61fe7721b924e1bae296e6ff7dc5c2249edadfef8510343b0c8fd902fb9134ee857f2f8eb324b3d7a3ad101d32db02a3a6a3b2d037430fdb4fd27990048039956a2a8342d55c5cbf488511a723e1924a8e76174e45a9aa80981f6d32fb688e2b996883283b3730aa8ac6ea295b00fa001e46023990f45fe5322a74c914fcd2eddb9eb805bad9e561e9e41c2efebb7bd93b08c6e8c3f11d1c0cd373e2c82bbe3fa334ff559", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052d80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}], 0x80, "0bc0a15a111742"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005ac00)={0x0, ""/256, 0x0}) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r8 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) fcntl$lock(r8, 0x24, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x1}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, r5}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, r3}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, r4}, {}, {}, {}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0}], 0x0, "8c00008ec3732f"}) r193 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r193, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r8, 0xd000943e, &(0x7f0000051b80)={r121, r160, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r193, 0x81f8943c, &(0x7f0000052b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000052d80)={0x2, [{0x0, r30}, {0x0, r138}, {r56}, {r182}, {0x0, r116}, {r42}, {r113}, {0x0, r18}, {0x0, r189}, {0x0, r103}, {r33}, {0x0, r90}, {r165}, {0x0, r170}, {}, {}, {}, {0x0, r83}, {0x0, r94}, {r100, r124}, {r24}, {0x0, r166}, {}, {r85, r145}, {r160}, {}, {}, {0x0, r46}, {r137}, {r141, r50}, {0x0, r173}, {}, {r57}, {}, {0x0, r32}, {r128}, {r167, r19}, {r100}, {0x0, r20}, {r151}, {r44, r135}, {r104}, {}, {0x0, r71}, {}, {0x0, r114}, {r36}, {r79, r68}, {r107, r63}, {0x0, r67}, {}, {}, {}, {}, {r125}, {}, {r106, r9}, {r176}, {}, {0x0, r15}, {}, {r192}, {r159, r38}, {0x0, r39}, {r41}, {0x0, r172}, {0x0, r27}, {}, {r76}, {}, {r182}, {0x0, r191}, {0x0, r172}, {0x0, r60}, {r123}, {r142, r190}, {r180, r48}, {0x0, r34}, {r154}, {r47, r120}, {}, {}, {}, {0x0, r152}, {}, {0x0, r174}, {r75}, {0x0, r50}, {r140}, {0x0, r101}, {r144, r51}, {}, {r181}, {0x0, r153}, {}, {0x0, r129}, {r22, r11}, {}, {}, {}, {r187, r112}, {r89}, {}, {}, {r150, r25}, {r28}, {r111, r45}, {r161}, {}, {r181}, {0x0, r58}, {r98, r94}, {0x0, r50}, {}, {r72, r162}, {}, {r102}, {r57, r99}, {r26}, {r164}, {}, {}, {r122, r14}, {0x0, r48}, {}, {0x0, r87}, {}, {r62, r136}, {}, {}, {r17}, {}, {r49}, {r29}, {0x0, r103}, {r147}, {r55, r114}, {}, {}, {r43, r11}, {r79}, {0x0, r110}, {r169, r16}, {}, {0x0, r53}, {r163}, {r131}, {r23, r99}, {r150}, {r72}, {r179, r173}, {}, {r95}, {r31, r51}, {0x0, r174}, {0x0, r132}, {r77}, {}, {0x0, r118}, {0x0, r97}, {r149}, {r37}, {0x0, r126}, {}, {r108, r135}, {}, {0x0, r185}, {r168, r78}, {r161}, {0x0, r110}, {r171}, {r100, r143}, {}, {}, {r73, r91}, {0x0, r40}, {r65, r109}, {}, {r130}, {r113, r153}, {0x0, r152}, {0x0, r116}, {r70}, {0x0, r127}, {}, {}, {r157}, {r107, r148}, {}, {r102, r10}, {r12}, {r179, r185}, {r55, r66}, {0x0, r175}, {0x0, r120}, {r81, r83}, {}, {}, {}, {}, {}, {r93}, {0x0, r186}, {r96}, {r35, r186}, {r59}, {r184}, {r72}, {r183, r58}, {0x0, r82}, {r84, r67}, {}, {0x0, r86}, {0x0, r88}, {r119}, {r181, r115}, {0x0, r69}, {0x0, r90}, {0x0, r155}, {r74}, {}, {}, {0x0, r19}, {r117}, {}, {}, {r105}, {r42, r188}, {r21}, {r92}, {0x0, r40}, {r52}, {0x0, r39}, {0x0, r158}, {0x0, r61}, {r141}, {r105, r156}, {r54, r177}, {}, {r146, r139}, {r151}, {0x0, r170}, {r133}, {}, {r187}, {0x0, r134}, {}, {r178}, {r64, r15}, {r142, r80}, {r13}, {r37}, {}, {}, {r194, r195}], 0x80, "0bc0a15a111742"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005ae00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b000)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r6, r9}, {}, {}, {}, {r196}], 0x5, "134f27196b3177"}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 212.298127][T28926] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 212.306083][T28928] CPU: 0 PID: 28928 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 212.314495][T28928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.324623][T28928] Call Trace: [ 212.327895][T28928] dump_stack_lvl+0xd6/0x122 [ 212.332494][T28928] dump_stack+0x11/0x1b [ 212.336651][T28928] should_fail+0x23c/0x250 [ 212.341070][T28928] ? security_inode_alloc+0x30/0x180 [ 212.346396][T28928] __should_failslab+0x81/0x90 03:26:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 13) [ 212.351226][T28928] should_failslab+0x5/0x20 [ 212.355741][T28928] kmem_cache_alloc+0x4f/0x320 [ 212.360507][T28928] security_inode_alloc+0x30/0x180 [ 212.365624][T28928] inode_init_always+0x20b/0x430 [ 212.370561][T28928] ? shmem_match+0xa0/0xa0 [ 212.374980][T28928] new_inode_pseudo+0x6f/0x190 [ 212.379825][T28928] new_inode+0x21/0x100 [ 212.384046][T28928] shmem_get_inode+0xb7/0x460 [ 212.388788][T28928] __shmem_file_setup+0xf1/0x1d0 [ 212.393728][T28928] shmem_file_setup+0x37/0x40 [ 212.398532][T28928] __se_sys_memfd_create+0x1eb/0x390 [ 212.400147][T29032] FAULT_INJECTION: forcing a failure. [ 212.400147][T29032] name failslab, interval 1, probability 0, space 0, times 0 [ 212.403846][T28928] __x64_sys_memfd_create+0x2d/0x40 [ 212.403871][T28928] do_syscall_64+0x44/0xa0 [ 212.403890][T28928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 212.403914][T28928] RIP: 0033:0x7f5a8a809ae9 [ 212.436263][T28928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.455872][T28928] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 212.464275][T28928] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 212.472241][T28928] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 212.480233][T28928] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 212.488187][T28928] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 212.496148][T28928] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 212.504160][T29032] CPU: 1 PID: 29032 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 212.512596][T29032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.522645][T29032] Call Trace: [ 212.525912][T29032] dump_stack_lvl+0xd6/0x122 [ 212.530632][T29032] dump_stack+0x11/0x1b [ 212.534843][T29032] should_fail+0x23c/0x250 [ 212.539285][T29032] ? security_file_alloc+0x30/0x190 [ 212.544478][T29032] __should_failslab+0x81/0x90 [ 212.549262][T29032] should_failslab+0x5/0x20 [ 212.553813][T29032] kmem_cache_alloc+0x4f/0x320 [ 212.558627][T29032] security_file_alloc+0x30/0x190 [ 212.563631][T29032] __alloc_file+0x83/0x1a0 [ 212.568027][T29032] alloc_empty_file+0xcd/0x1c0 [ 212.572851][T29032] path_openat+0x6a/0x1eb0 [ 212.577263][T29032] ? avc_has_perm_noaudit+0x1c0/0x270 [ 212.582694][T29032] ? avc_has_perm+0x70/0x160 [ 212.587278][T29032] ? avc_has_perm+0xd5/0x160 [ 212.591850][T29032] do_filp_open+0x105/0x220 [ 212.596330][T29032] do_sys_openat2+0xb5/0x2b0 [ 212.601038][T29032] __x64_sys_openat+0xef/0x110 [ 212.605842][T29032] do_syscall_64+0x44/0xa0 [ 212.610238][T29032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 212.616228][T29032] RIP: 0033:0x7faf9ad01a04 [ 212.620751][T29032] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 212.640431][T29032] RSP: 002b:00007faf98ac4ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 03:26:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 17) 03:26:00 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) 03:26:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 5) [ 212.648827][T29032] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad01a04 [ 212.656793][T29032] RDX: 0000000000000002 RSI: 00007faf98ac5000 RDI: 00000000ffffff9c [ 212.664743][T29032] RBP: 00007faf98ac5000 R08: 0000000000000000 R09: ffffffffffffffff [ 212.672696][T29032] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 212.680647][T29032] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x2500) 03:26:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 14) [ 212.723994][T29037] loop4: detected capacity change from 0 to 262160 [ 212.734454][T29038] FAULT_INJECTION: forcing a failure. [ 212.734454][T29038] name failslab, interval 1, probability 0, space 0, times 0 [ 212.747080][T29038] CPU: 0 PID: 29038 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 212.755492][T29038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.765542][T29038] Call Trace: [ 212.768814][T29038] dump_stack_lvl+0xd6/0x122 [ 212.773517][T29038] dump_stack+0x11/0x1b [ 212.777822][T29038] should_fail+0x23c/0x250 [ 212.782244][T29038] ? __d_alloc+0x36/0x370 [ 212.786571][T29038] __should_failslab+0x81/0x90 [ 212.791424][T29038] should_failslab+0x5/0x20 [ 212.795928][T29038] kmem_cache_alloc+0x4f/0x320 [ 212.796783][T29037] FAULT_INJECTION: forcing a failure. [ 212.796783][T29037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.800693][T29038] ? security_inode_alloc+0x138/0x180 [ 212.800720][T29038] ? __init_rwsem+0x59/0x70 [ 212.800740][T29038] __d_alloc+0x36/0x370 [ 212.827865][T29038] ? debug_smp_processor_id+0x18/0x20 [ 212.833325][T29038] d_alloc_pseudo+0x1a/0x50 [ 212.837809][T29038] alloc_file_pseudo+0x77/0x150 [ 212.842643][T29038] __shmem_file_setup+0x14c/0x1d0 [ 212.847658][T29038] shmem_file_setup+0x37/0x40 [ 212.852360][T29038] __se_sys_memfd_create+0x1eb/0x390 [ 212.857645][T29038] __x64_sys_memfd_create+0x2d/0x40 [ 212.862829][T29038] do_syscall_64+0x44/0xa0 [ 212.867243][T29038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 212.873127][T29038] RIP: 0033:0x7f5a8a809ae9 [ 212.877556][T29038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 212.897147][T29038] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 212.905559][T29038] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 212.913567][T29038] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 212.921526][T29038] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 212.929511][T29038] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 212.937465][T29038] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 212.945482][T29037] CPU: 1 PID: 29037 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 212.953894][T29037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.963949][T29037] Call Trace: [ 212.967219][T29037] dump_stack_lvl+0xd6/0x122 [ 212.971825][T29037] dump_stack+0x11/0x1b [ 212.976004][T29037] should_fail+0x23c/0x250 [ 212.980419][T29037] __alloc_pages+0x102/0x330 [ 212.985011][T29037] alloc_pages+0x382/0x3d0 [ 212.989423][T29037] folio_alloc+0x1a/0x20 [ 212.993099][T29047] FAULT_INJECTION: forcing a failure. [ 212.993099][T29047] name failslab, interval 1, probability 0, space 0, times 0 [ 212.993684][T29037] filemap_alloc_folio+0x53/0xf0 [ 212.993704][T29037] __filemap_get_folio+0x443/0x690 [ 213.016262][T29037] pagecache_get_page+0x26/0xe0 [ 213.021104][T29037] grab_cache_page_write_begin+0x3f/0x50 [ 213.026726][T29037] cont_write_begin+0x53a/0x8b0 [ 213.031624][T29037] fat_write_begin+0x61/0xf0 [ 213.036222][T29037] ? fat_block_truncate_page+0x30/0x30 [ 213.041680][T29037] generic_perform_write+0x1b8/0x3e0 [ 213.046952][T29037] ? fat_write_begin+0xf0/0xf0 [ 213.051736][T29037] __generic_file_write_iter+0x195/0x2b0 [ 213.057352][T29037] ? generic_write_checks+0x250/0x290 [ 213.062711][T29037] generic_file_write_iter+0x75/0x130 [ 213.068132][T29037] do_iter_readv_writev+0x2de/0x380 [ 213.073331][T29037] do_iter_write+0x192/0x5c0 [ 213.077905][T29037] ? splice_from_pipe_next+0x34f/0x3b0 [ 213.083351][T29037] ? kmalloc_array+0x2d/0x40 [ 213.087926][T29037] vfs_iter_write+0x4c/0x70 [ 213.092411][T29037] iter_file_splice_write+0x43a/0x790 [ 213.097829][T29037] ? splice_from_pipe+0xd0/0xd0 [ 213.102668][T29037] direct_splice_actor+0x80/0xa0 [ 213.107591][T29037] splice_direct_to_actor+0x345/0x650 [ 213.113013][T29037] ? do_splice_direct+0x190/0x190 [ 213.118085][T29037] do_splice_direct+0x106/0x190 [ 213.122981][T29037] do_sendfile+0x675/0xc40 [ 213.127380][T29037] __x64_sys_sendfile64+0x102/0x140 [ 213.132566][T29037] do_syscall_64+0x44/0xa0 [ 213.137008][T29037] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.142886][T29037] RIP: 0033:0x7f3a88ac0ae9 [ 213.147284][T29037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 213.166873][T29037] RSP: 002b:00007f3a86837188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:26:01 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000001) 03:26:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 6) [ 213.175270][T29037] RAX: ffffffffffffffda RBX: 00007f3a88bd3f60 RCX: 00007f3a88ac0ae9 [ 213.183240][T29037] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 213.191193][T29037] RBP: 00007f3a868371d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.199145][T29037] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 213.207098][T29037] R13: 00007fffe8d1457f R14: 00007f3a86837300 R15: 0000000000022000 [ 213.215056][T29047] CPU: 0 PID: 29047 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 213.221235][T29042] FAULT_INJECTION: forcing a failure. [ 213.221235][T29042] name failslab, interval 1, probability 0, space 0, times 0 [ 213.223462][T29047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.223474][T29047] Call Trace: [ 213.223480][T29047] dump_stack_lvl+0xd6/0x122 [ 213.223505][T29047] dump_stack+0x11/0x1b [ 213.258150][T29047] should_fail+0x23c/0x250 [ 213.262556][T29047] ? __alloc_file+0x2e/0x1a0 [ 213.267131][T29047] __should_failslab+0x81/0x90 [ 213.271878][T29047] should_failslab+0x5/0x20 [ 213.276436][T29047] kmem_cache_alloc+0x4f/0x320 [ 213.281185][T29047] __alloc_file+0x2e/0x1a0 [ 213.285582][T29047] alloc_empty_file+0xcd/0x1c0 [ 213.290328][T29047] alloc_file+0x3a/0x280 [ 213.294554][T29047] alloc_file_pseudo+0xfa/0x150 [ 213.299536][T29047] __shmem_file_setup+0x14c/0x1d0 [ 213.304546][T29047] shmem_file_setup+0x37/0x40 [ 213.309207][T29047] __se_sys_memfd_create+0x1eb/0x390 [ 213.314480][T29047] __x64_sys_memfd_create+0x2d/0x40 [ 213.319740][T29047] do_syscall_64+0x44/0xa0 [ 213.324139][T29047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.330056][T29047] RIP: 0033:0x7f5a8a809ae9 [ 213.334451][T29047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 213.354043][T29047] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 213.362450][T29047] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 213.370486][T29047] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 213.378449][T29047] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 213.386400][T29047] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 213.394351][T29047] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 213.402362][T29042] CPU: 1 PID: 29042 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 213.410864][T29042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.420912][T29042] Call Trace: [ 213.424183][T29042] dump_stack_lvl+0xd6/0x122 [ 213.428777][T29042] dump_stack+0x11/0x1b [ 213.432933][T29042] should_fail+0x23c/0x250 [ 213.437346][T29042] ? kzalloc+0x16/0x20 [ 213.441413][T29042] __should_failslab+0x81/0x90 [ 213.446186][T29042] should_failslab+0x5/0x20 [ 213.450700][T29042] __kmalloc+0x6f/0x370 [ 213.454867][T29042] ? iput+0x1d2/0x510 [ 213.458834][T29042] kzalloc+0x16/0x20 [ 213.462717][T29042] alloc_workqueue+0x12f/0xad0 [ 213.467467][T29042] ? blkdev_get_by_dev+0xb65/0xc40 [ 213.472628][T29042] ? preempt_count_add+0x4e/0x90 [ 213.477602][T29042] ? _raw_spin_unlock+0x2e/0x50 [ 213.482436][T29042] ? bd_prepare_to_claim+0x1ac/0x200 [ 213.487706][T29042] loop_configure+0x70e/0xf30 [ 213.492481][T29042] lo_ioctl+0x583/0x1270 [ 213.496705][T29042] ? __rcu_read_unlock+0x5c/0x290 [ 213.501798][T29042] ? blkdev_common_ioctl+0x438/0x1120 [ 213.507155][T29042] ? do_vfs_ioctl+0x819/0x14a0 [ 213.511922][T29042] ? lo_release+0x120/0x120 [ 213.516408][T29042] blkdev_ioctl+0x20e/0x440 [ 213.520971][T29042] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 213.526480][T29042] __se_sys_ioctl+0xcb/0x140 [ 213.531090][T29042] __x64_sys_ioctl+0x3f/0x50 [ 213.535668][T29042] do_syscall_64+0x44/0xa0 [ 213.540100][T29042] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.546046][T29042] RIP: 0033:0x7faf9ad4e8a7 [ 213.550444][T29042] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 7) 03:26:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 18) [ 213.570102][T29042] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.578657][T29042] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 213.586612][T29042] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 213.594706][T29042] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 213.602715][T29042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 213.610670][T29042] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 15) 03:26:01 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) [ 213.646558][T29053] FAULT_INJECTION: forcing a failure. [ 213.646558][T29053] name failslab, interval 1, probability 0, space 0, times 0 [ 213.659216][T29053] CPU: 0 PID: 29053 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 213.667629][T29053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.677756][T29053] Call Trace: [ 213.681029][T29053] dump_stack_lvl+0xd6/0x122 [ 213.685660][T29053] dump_stack+0x11/0x1b [ 213.689821][T29053] should_fail+0x23c/0x250 [ 213.694313][T29053] ? security_file_alloc+0x30/0x190 [ 213.697107][T29058] FAULT_INJECTION: forcing a failure. [ 213.697107][T29058] name failslab, interval 1, probability 0, space 0, times 0 [ 213.699510][T29053] __should_failslab+0x81/0x90 [ 213.716858][T29053] should_failslab+0x5/0x20 [ 213.721396][T29053] kmem_cache_alloc+0x4f/0x320 [ 213.726149][T29053] security_file_alloc+0x30/0x190 [ 213.731159][T29053] __alloc_file+0x83/0x1a0 [ 213.735562][T29053] alloc_empty_file+0xcd/0x1c0 [ 213.740399][T29053] alloc_file+0x3a/0x280 [ 213.744757][T29053] alloc_file_pseudo+0xfa/0x150 [ 213.749630][T29053] __shmem_file_setup+0x14c/0x1d0 [ 213.754685][T29053] shmem_file_setup+0x37/0x40 [ 213.759349][T29053] __se_sys_memfd_create+0x1eb/0x390 [ 213.764636][T29053] __x64_sys_memfd_create+0x2d/0x40 [ 213.769862][T29053] do_syscall_64+0x44/0xa0 [ 213.774319][T29053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 213.780277][T29053] RIP: 0033:0x7f5a8a809ae9 [ 213.784756][T29053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 213.804380][T29053] RSP: 002b:00007f5a8857ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 213.812870][T29053] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007f5a8a809ae9 [ 213.820825][T29053] RDX: 0000000008002000 RSI: 0000000000000000 RDI: 00007f5a8a8630b3 [ 213.828806][T29053] RBP: 0000000000000002 R08: 0000010000001000 R09: ffffffffffffffff [ 213.836831][T29053] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 03:26:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 8) [ 213.844789][T29053] R13: 0000000020000100 R14: 0000000008002000 R15: 0000000020000000 [ 213.852855][T29058] CPU: 1 PID: 29058 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 213.861302][T29058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.871355][T29058] Call Trace: [ 213.874629][T29058] dump_stack_lvl+0xd6/0x122 [ 213.874616][T29060] loop4: detected capacity change from 0 to 262160 [ 213.885835][T29058] dump_stack+0x11/0x1b [ 213.890061][T29058] should_fail+0x23c/0x250 [ 213.894476][T29058] ? alloc_workqueue+0x15d/0xad0 [ 213.899496][T29058] __should_failslab+0x81/0x90 [ 213.904249][T29058] should_failslab+0x5/0x20 [ 213.908732][T29058] kmem_cache_alloc_trace+0x52/0x350 [ 213.914053][T29058] ? kzalloc+0x16/0x20 [ 213.918139][T29058] alloc_workqueue+0x15d/0xad0 [ 213.922896][T29058] ? blkdev_get_by_dev+0xb65/0xc40 [ 213.927986][T29058] ? preempt_count_add+0x4e/0x90 [ 213.932903][T29058] ? _raw_spin_unlock+0x2e/0x50 [ 213.937806][T29058] ? bd_prepare_to_claim+0x1ac/0x200 [ 213.943070][T29058] loop_configure+0x70e/0xf30 [ 213.947728][T29058] lo_ioctl+0x583/0x1270 [ 213.952050][T29058] ? __rcu_read_unlock+0x5c/0x290 [ 213.957092][T29058] ? blkdev_common_ioctl+0x438/0x1120 [ 213.962462][T29058] ? do_vfs_ioctl+0x819/0x14a0 [ 213.967297][T29058] ? lo_release+0x120/0x120 [ 213.971821][T29058] blkdev_ioctl+0x20e/0x440 [ 213.976305][T29058] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 213.981855][T29058] __se_sys_ioctl+0xcb/0x140 [ 213.986440][T29058] __x64_sys_ioctl+0x3f/0x50 [ 213.991012][T29058] do_syscall_64+0x44/0xa0 [ 213.995496][T29058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 214.001366][T29058] RIP: 0033:0x7faf9ad4e8a7 [ 214.005759][T29058] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 214.025371][T29058] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 214.033819][T29058] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 214.041767][T29058] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 214.049715][T29058] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 214.057666][T29058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 214.065701][T29058] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 214.077646][T29060] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 214.088535][T29103] FAULT_INJECTION: forcing a failure. 03:26:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 16) 03:26:02 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) [ 214.088535][T29103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 214.101804][T29103] CPU: 0 PID: 29103 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 214.110211][T29103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.120262][T29103] Call Trace: [ 214.123537][T29103] dump_stack_lvl+0xd6/0x122 [ 214.128132][T29103] dump_stack+0x11/0x1b [ 214.132292][T29103] should_fail+0x23c/0x250 [ 214.136709][T29103] __alloc_pages+0x102/0x330 [ 214.141307][T29103] alloc_pages_vma+0x5ee/0x770 [ 214.146119][T29103] shmem_getpage_gfp+0x983/0x1380 [ 214.151146][T29103] ? rmqueue+0x4a/0xd20 [ 214.155306][T29103] shmem_write_begin+0x7e/0x100 [ 214.160207][T29103] generic_perform_write+0x1b8/0x3e0 [ 214.165493][T29103] ? current_time+0xed/0x1a0 [ 214.170140][T29103] __generic_file_write_iter+0xf7/0x2b0 [ 214.175689][T29103] ? generic_write_checks+0x250/0x290 [ 214.181060][T29103] generic_file_write_iter+0x75/0x130 [ 214.184704][T29168] FAULT_INJECTION: forcing a failure. [ 214.184704][T29168] name failslab, interval 1, probability 0, space 0, times 0 [ 214.186503][T29103] vfs_write+0x7f5/0x950 [ 214.186525][T29103] __x64_sys_pwrite64+0xf5/0x150 [ 214.186542][T29103] do_syscall_64+0x44/0xa0 [ 214.186562][T29103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 214.186587][T29103] RIP: 0033:0x7f5a8a7bcab7 [ 214.186601][T29103] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 214.242484][T29103] RSP: 002b:00007f5a8857ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 214.250880][T29103] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bcab7 [ 214.258836][T29103] RDX: 0000000000000018 RSI: 0000000020000180 RDI: 0000000000000004 [ 214.266848][T29103] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 214.274806][T29103] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 214.282761][T29103] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 214.290725][T29168] CPU: 1 PID: 29168 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 214.299154][T29168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.309202][T29168] Call Trace: [ 214.312470][T29168] dump_stack_lvl+0xd6/0x122 [ 214.317145][T29168] dump_stack+0x11/0x1b [ 214.321349][T29168] should_fail+0x23c/0x250 [ 214.323539][T29173] FAULT_INJECTION: forcing a failure. [ 214.323539][T29173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.325762][T29168] ? kzalloc+0x16/0x20 [ 214.342818][T29168] __should_failslab+0x81/0x90 [ 214.347571][T29168] should_failslab+0x5/0x20 [ 214.352067][T29168] __kmalloc+0x6f/0x370 [ 214.356217][T29168] ? number+0xa13/0xb60 [ 214.360357][T29168] kzalloc+0x16/0x20 [ 214.364313][T29168] apply_wqattrs_prepare+0x3a/0x630 [ 214.369518][T29168] ? vsnprintf+0xe8f/0xed0 [ 214.373986][T29168] apply_workqueue_attrs+0x9e/0x100 [ 214.379171][T29168] alloc_workqueue+0x777/0xad0 [ 214.383924][T29168] ? preempt_count_add+0x4e/0x90 [ 214.388888][T29168] ? _raw_spin_unlock+0x2e/0x50 [ 214.393723][T29168] ? bd_prepare_to_claim+0x1ac/0x200 [ 214.398996][T29168] loop_configure+0x70e/0xf30 [ 214.403717][T29168] lo_ioctl+0x583/0x1270 [ 214.408012][T29168] ? __rcu_read_unlock+0x5c/0x290 [ 214.413108][T29168] ? blkdev_common_ioctl+0x438/0x1120 [ 214.418496][T29168] ? do_vfs_ioctl+0x819/0x14a0 [ 214.423246][T29168] ? lo_release+0x120/0x120 [ 214.427733][T29168] blkdev_ioctl+0x20e/0x440 [ 214.432273][T29168] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 214.437731][T29168] __se_sys_ioctl+0xcb/0x140 [ 214.442307][T29168] __x64_sys_ioctl+0x3f/0x50 [ 214.446883][T29168] do_syscall_64+0x44/0xa0 [ 214.451282][T29168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 214.457158][T29168] RIP: 0033:0x7faf9ad4e8a7 [ 214.461559][T29168] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 214.481170][T29168] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 214.489565][T29168] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 03:26:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 9) 03:26:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 214.497525][T29168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 214.505477][T29168] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 214.513428][T29168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 214.521439][T29168] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 214.529431][T29173] CPU: 0 PID: 29173 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 214.537926][T29173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.547967][T29173] Call Trace: [ 214.551229][T29173] dump_stack_lvl+0xd6/0x122 [ 214.555832][T29173] dump_stack+0x11/0x1b [ 214.560040][T29173] should_fail+0x23c/0x250 [ 214.564440][T29173] should_fail_usercopy+0x16/0x20 [ 214.569449][T29173] copy_page_from_iter_atomic+0x2f1/0xc60 [ 214.575226][T29173] ? shmem_write_begin+0x7e/0x100 [ 214.580318][T29173] generic_perform_write+0x201/0x3e0 [ 214.585720][T29173] ? current_time+0xed/0x1a0 [ 214.590342][T29173] __generic_file_write_iter+0xf7/0x2b0 [ 214.595887][T29173] ? generic_write_checks+0x250/0x290 [ 214.601246][T29173] generic_file_write_iter+0x75/0x130 [ 214.606667][T29173] vfs_write+0x7f5/0x950 [ 214.610903][T29173] __x64_sys_pwrite64+0xf5/0x150 [ 214.615823][T29173] do_syscall_64+0x44/0xa0 [ 214.620220][T29173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 214.626139][T29173] RIP: 0033:0x7f5a8a7bcab7 [ 214.630538][T29173] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 03:26:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 10) [ 214.650226][T29173] RSP: 002b:00007f5a8857ff20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 214.658624][T29173] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bcab7 [ 214.666590][T29173] RDX: 0000000000000018 RSI: 0000000020000180 RDI: 0000000000000004 [ 214.674588][T29173] RBP: 0000000000000002 R08: 0000000000000000 R09: ffffffffffffffff [ 214.682545][T29173] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 214.690577][T29173] R13: 0000000000000004 R14: 0000000020000240 R15: 0000000000000000 [ 214.728078][T29177] FAULT_INJECTION: forcing a failure. [ 214.728078][T29177] name failslab, interval 1, probability 0, space 0, times 0 [ 214.740727][T29177] CPU: 1 PID: 29177 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 214.749141][T29177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.759190][T29177] Call Trace: [ 214.762464][T29177] dump_stack_lvl+0xd6/0x122 [ 214.763963][T29182] FAULT_INJECTION: forcing a failure. [ 214.763963][T29182] name failslab, interval 1, probability 0, space 0, times 0 [ 214.767115][T29177] dump_stack+0x11/0x1b [ 214.767140][T29177] should_fail+0x23c/0x250 [ 214.788223][T29177] ? getname_flags+0x84/0x3f0 [ 214.792886][T29177] __should_failslab+0x81/0x90 [ 214.797634][T29177] should_failslab+0x5/0x20 [ 214.802161][T29177] kmem_cache_alloc+0x4f/0x320 [ 214.806911][T29177] getname_flags+0x84/0x3f0 [ 214.811459][T29177] ? vfs_write+0x667/0x950 [ 214.815856][T29177] getname+0x15/0x20 [ 214.819775][T29177] do_sys_openat2+0x6d/0x2b0 [ 214.824375][T29177] __x64_sys_openat+0xef/0x110 [ 214.829175][T29177] do_syscall_64+0x44/0xa0 [ 214.833639][T29177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 214.839592][T29177] RIP: 0033:0x7f5a8a7bca04 [ 214.844013][T29177] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 214.863623][T29177] RSP: 002b:00007f5a8857fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 03:26:02 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) 03:26:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 17) [ 214.872081][T29177] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bca04 [ 214.880035][T29177] RDX: 0000000000000002 RSI: 00007f5a88580000 RDI: 00000000ffffff9c [ 214.888043][T29177] RBP: 00007f5a88580000 R08: 0000000000000000 R09: ffffffffffffffff [ 214.895999][T29177] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 214.903956][T29177] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 214.911912][T29182] CPU: 0 PID: 29182 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 214.920321][T29182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.930391][T29182] Call Trace: [ 214.933664][T29182] dump_stack_lvl+0xd6/0x122 [ 214.938262][T29182] dump_stack+0x11/0x1b [ 214.942417][T29182] should_fail+0x23c/0x250 [ 214.946913][T29182] ? apply_wqattrs_prepare+0x5f/0x630 [ 214.952286][T29182] __should_failslab+0x81/0x90 [ 214.957049][T29182] should_failslab+0x5/0x20 [ 214.961631][T29182] kmem_cache_alloc_trace+0x52/0x350 [ 214.966985][T29182] ? kzalloc+0x16/0x20 [ 214.971094][T29182] apply_wqattrs_prepare+0x5f/0x630 03:26:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 11) [ 214.976291][T29182] ? vsnprintf+0xe8f/0xed0 [ 214.980709][T29182] apply_workqueue_attrs+0x9e/0x100 [ 214.985937][T29182] alloc_workqueue+0x777/0xad0 [ 214.990704][T29182] ? preempt_count_add+0x4e/0x90 [ 214.995411][T29285] FAULT_INJECTION: forcing a failure. [ 214.995411][T29285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.995639][T29182] ? _raw_spin_unlock+0x2e/0x50 [ 214.995660][T29182] ? bd_prepare_to_claim+0x1ac/0x200 [ 215.018752][T29182] loop_configure+0x70e/0xf30 [ 215.023496][T29182] lo_ioctl+0x583/0x1270 [ 215.027760][T29182] ? __rcu_read_unlock+0x5c/0x290 [ 215.032772][T29182] ? blkdev_common_ioctl+0x438/0x1120 [ 215.038180][T29182] ? do_vfs_ioctl+0x819/0x14a0 [ 215.042944][T29182] ? lo_release+0x120/0x120 [ 215.047485][T29182] blkdev_ioctl+0x20e/0x440 [ 215.051978][T29182] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 215.057433][T29182] __se_sys_ioctl+0xcb/0x140 [ 215.062039][T29182] __x64_sys_ioctl+0x3f/0x50 [ 215.066684][T29182] do_syscall_64+0x44/0xa0 [ 215.071084][T29182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.077025][T29182] RIP: 0033:0x7faf9ad4e8a7 [ 215.081424][T29182] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 215.101086][T29182] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 215.109528][T29182] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 215.117554][T29182] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 215.125509][T29182] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 215.133462][T29182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 215.141416][T29182] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 215.149375][T29285] CPU: 1 PID: 29285 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 215.157787][T29285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.167925][T29285] Call Trace: [ 215.171219][T29285] dump_stack_lvl+0xd6/0x122 [ 215.175809][T29285] dump_stack+0x11/0x1b [ 215.179998][T29285] should_fail+0x23c/0x250 [ 215.184412][T29285] should_fail_usercopy+0x16/0x20 [ 215.189438][T29285] strncpy_from_user+0x21/0x250 [ 215.194312][T29285] getname_flags+0xb8/0x3f0 [ 215.198790][T29285] ? vfs_write+0x667/0x950 [ 215.203180][T29285] getname+0x15/0x20 [ 215.207051][T29285] do_sys_openat2+0x6d/0x2b0 [ 215.211623][T29285] __x64_sys_openat+0xef/0x110 [ 215.216382][T29285] do_syscall_64+0x44/0xa0 [ 215.220777][T29285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.226670][T29285] RIP: 0033:0x7f5a8a7bca04 [ 215.231064][T29285] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 215.250694][T29285] RSP: 002b:00007f5a8857fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.259088][T29285] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bca04 [ 215.267037][T29285] RDX: 0000000000000002 RSI: 00007f5a88580000 RDI: 00000000ffffff9c 03:26:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) 03:26:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) r1 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7, 0x3f, 0x71, 0x5, 0x0, 0xffff, 0x21000, 0x11, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x0, 0xfffffffffffffc00}, 0x1c450, 0x2b09, 0x1, 0x0, 0x1ff, 0x3, 0x5, 0x0, 0xeb9e, 0x0, 0x6}, r0, 0x6, r1, 0x8) 03:26:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 18) 03:26:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 12) 03:26:03 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) [ 215.274983][T29285] RBP: 00007f5a88580000 R08: 0000000000000000 R09: ffffffffffffffff [ 215.282938][T29285] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 215.290994][T29285] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 215.336248][T29289] FAULT_INJECTION: forcing a failure. [ 215.336248][T29289] name failslab, interval 1, probability 0, space 0, times 0 [ 215.348896][T29289] CPU: 1 PID: 29289 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 215.357304][T29289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.363978][T29293] FAULT_INJECTION: forcing a failure. [ 215.363978][T29293] name failslab, interval 1, probability 0, space 0, times 0 [ 215.367350][T29289] Call Trace: [ 215.367358][T29289] dump_stack_lvl+0xd6/0x122 [ 215.387754][T29289] dump_stack+0x11/0x1b [ 215.391997][T29289] should_fail+0x23c/0x250 [ 215.396398][T29289] ? apply_wqattrs_prepare+0xbe/0x630 [ 215.401753][T29289] __should_failslab+0x81/0x90 [ 215.406507][T29289] should_failslab+0x5/0x20 [ 215.410996][T29289] kmem_cache_alloc_trace+0x52/0x350 [ 215.416342][T29289] ? apply_wqattrs_prepare+0x5f/0x630 [ 215.421697][T29289] apply_wqattrs_prepare+0xbe/0x630 [ 215.426953][T29289] ? vsnprintf+0xe8f/0xed0 [ 215.431426][T29289] apply_workqueue_attrs+0x9e/0x100 [ 215.436708][T29289] alloc_workqueue+0x777/0xad0 [ 215.441529][T29289] ? preempt_count_add+0x4e/0x90 [ 215.446456][T29289] ? _raw_spin_unlock+0x2e/0x50 [ 215.451289][T29289] ? bd_prepare_to_claim+0x1ac/0x200 [ 215.456631][T29289] loop_configure+0x70e/0xf30 [ 215.461353][T29289] lo_ioctl+0x583/0x1270 [ 215.465593][T29289] ? __rcu_read_unlock+0x5c/0x290 [ 215.470620][T29289] ? blkdev_common_ioctl+0x438/0x1120 [ 215.475979][T29289] ? do_vfs_ioctl+0x819/0x14a0 [ 215.480816][T29289] ? lo_release+0x120/0x120 [ 215.485370][T29289] blkdev_ioctl+0x20e/0x440 [ 215.489858][T29289] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 215.495301][T29289] __se_sys_ioctl+0xcb/0x140 [ 215.499877][T29289] __x64_sys_ioctl+0x3f/0x50 [ 215.504453][T29289] do_syscall_64+0x44/0xa0 [ 215.508917][T29289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.514793][T29289] RIP: 0033:0x7faf9ad4e8a7 [ 215.519188][T29289] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 215.538777][T29289] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 215.547186][T29289] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 215.555153][T29289] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 215.563107][T29289] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 215.571061][T29289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 215.579015][T29289] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 215.587020][T29293] CPU: 0 PID: 29293 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 215.589660][T29298] loop4: detected capacity change from 0 to 262160 [ 215.595424][T29293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.595435][T29293] Call Trace: [ 215.595442][T29293] dump_stack_lvl+0xd6/0x122 [ 215.595477][T29293] dump_stack+0x11/0x1b [ 215.624022][T29293] should_fail+0x23c/0x250 [ 215.628467][T29293] ? __alloc_file+0x2e/0x1a0 [ 215.633088][T29293] __should_failslab+0x81/0x90 03:26:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 19) [ 215.637861][T29293] should_failslab+0x5/0x20 [ 215.642413][T29293] kmem_cache_alloc+0x4f/0x320 [ 215.647184][T29293] __alloc_file+0x2e/0x1a0 [ 215.651606][T29293] alloc_empty_file+0xcd/0x1c0 [ 215.656367][T29293] path_openat+0x6a/0x1eb0 [ 215.660778][T29293] ? avc_has_perm_noaudit+0x1c0/0x270 [ 215.666195][T29293] ? avc_has_perm+0x70/0x160 [ 215.670841][T29293] ? avc_has_perm+0xd5/0x160 [ 215.675432][T29293] do_filp_open+0x105/0x220 [ 215.679943][T29293] do_sys_openat2+0xb5/0x2b0 [ 215.684575][T29293] __x64_sys_openat+0xef/0x110 [ 215.689427][T29293] do_syscall_64+0x44/0xa0 [ 215.693868][T29293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.699814][T29293] RIP: 0033:0x7f5a8a7bca04 [ 215.704221][T29293] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 215.723820][T29293] RSP: 002b:00007f5a8857fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 215.732277][T29293] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bca04 [ 215.732795][T29301] FAULT_INJECTION: forcing a failure. [ 215.732795][T29301] name failslab, interval 1, probability 0, space 0, times 0 [ 215.740240][T29293] RDX: 0000000000000002 RSI: 00007f5a88580000 RDI: 00000000ffffff9c [ 215.760809][T29293] RBP: 00007f5a88580000 R08: 0000000000000000 R09: ffffffffffffffff [ 215.768764][T29293] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 215.776786][T29293] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 215.784749][T29301] CPU: 1 PID: 29301 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 215.793199][T29301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.803253][T29301] Call Trace: [ 215.806526][T29301] dump_stack_lvl+0xd6/0x122 [ 215.811205][T29301] dump_stack+0x11/0x1b [ 215.815408][T29301] should_fail+0x23c/0x250 [ 215.819828][T29301] __should_failslab+0x81/0x90 [ 215.821295][T29304] FAULT_INJECTION: forcing a failure. [ 215.821295][T29304] name failslab, interval 1, probability 0, space 0, times 0 [ 215.824600][T29301] should_failslab+0x5/0x20 [ 215.841665][T29301] kmem_cache_alloc_node+0x61/0x2d0 [ 215.846852][T29301] ? should_fail+0xd6/0x250 [ 215.851342][T29301] ? should_fail+0xd6/0x250 [ 215.855922][T29301] ? alloc_unbound_pwq+0x3e6/0x780 [ 215.861025][T29301] alloc_unbound_pwq+0x3e6/0x780 [ 215.865971][T29301] apply_wqattrs_prepare+0x1ed/0x630 [ 215.871243][T29301] ? vsnprintf+0xe8f/0xed0 [ 215.875648][T29301] apply_workqueue_attrs+0x9e/0x100 [ 215.880914][T29301] alloc_workqueue+0x777/0xad0 [ 215.885663][T29301] ? preempt_count_add+0x4e/0x90 [ 215.890632][T29301] ? _raw_spin_unlock+0x2e/0x50 [ 215.895471][T29301] ? bd_prepare_to_claim+0x1ac/0x200 [ 215.900749][T29301] loop_configure+0x70e/0xf30 [ 215.905409][T29301] lo_ioctl+0x583/0x1270 [ 215.909636][T29301] ? __rcu_read_unlock+0x5c/0x290 [ 215.914797][T29301] ? blkdev_common_ioctl+0x438/0x1120 [ 215.920169][T29301] ? do_vfs_ioctl+0x819/0x14a0 [ 215.924921][T29301] ? lo_release+0x120/0x120 [ 215.929408][T29301] blkdev_ioctl+0x20e/0x440 [ 215.933926][T29301] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 215.939413][T29301] __se_sys_ioctl+0xcb/0x140 [ 215.943991][T29301] __x64_sys_ioctl+0x3f/0x50 [ 215.948571][T29301] do_syscall_64+0x44/0xa0 [ 215.952995][T29301] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 215.958946][T29301] RIP: 0033:0x7faf9ad4e8a7 [ 215.963346][T29301] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:03 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) 03:26:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 13) [ 215.982950][T29301] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 215.991350][T29301] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 215.999325][T29301] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 216.007337][T29301] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 216.015290][T29301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 216.023244][T29301] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 216.031198][T29304] CPU: 0 PID: 29304 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 216.039609][T29304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.049650][T29304] Call Trace: [ 216.052917][T29304] dump_stack_lvl+0xd6/0x122 [ 216.057653][T29304] dump_stack+0x11/0x1b [ 216.061792][T29304] should_fail+0x23c/0x250 [ 216.066199][T29304] ? security_file_alloc+0x30/0x190 [ 216.071382][T29304] __should_failslab+0x81/0x90 [ 216.076176][T29304] should_failslab+0x5/0x20 [ 216.080686][T29304] kmem_cache_alloc+0x4f/0x320 [ 216.085449][T29304] security_file_alloc+0x30/0x190 [ 216.090465][T29304] __alloc_file+0x83/0x1a0 [ 216.094866][T29304] alloc_empty_file+0xcd/0x1c0 [ 216.099613][T29304] path_openat+0x6a/0x1eb0 [ 216.104087][T29304] ? avc_has_perm_noaudit+0x1c0/0x270 [ 216.109512][T29304] ? avc_has_perm+0x70/0x160 [ 216.114085][T29304] ? avc_has_perm+0xd5/0x160 [ 216.118661][T29304] do_filp_open+0x105/0x220 [ 216.123214][T29304] do_sys_openat2+0xb5/0x2b0 [ 216.127791][T29304] __x64_sys_openat+0xef/0x110 [ 216.132542][T29304] do_syscall_64+0x44/0xa0 [ 216.136947][T29304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.142871][T29304] RIP: 0033:0x7f5a8a7bca04 [ 216.147270][T29304] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 216.166859][T29304] RSP: 002b:00007f5a8857fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 216.175253][T29304] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bca04 03:26:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 20) [ 216.183208][T29304] RDX: 0000000000000002 RSI: 00007f5a88580000 RDI: 00000000ffffff9c [ 216.191173][T29304] RBP: 00007f5a88580000 R08: 0000000000000000 R09: ffffffffffffffff [ 216.199129][T29304] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 216.207084][T29304] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:04 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) 03:26:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 03:26:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 14) [ 216.283529][T29410] FAULT_INJECTION: forcing a failure. [ 216.283529][T29410] name failslab, interval 1, probability 0, space 0, times 0 [ 216.286802][T29411] FAULT_INJECTION: forcing a failure. [ 216.286802][T29411] name failslab, interval 1, probability 0, space 0, times 0 [ 216.296206][T29410] CPU: 0 PID: 29410 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 216.317261][T29410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.327300][T29410] Call Trace: [ 216.330564][T29410] dump_stack_lvl+0xd6/0x122 [ 216.335196][T29410] dump_stack+0x11/0x1b [ 216.339421][T29410] should_fail+0x23c/0x250 [ 216.343824][T29410] ? __d_alloc+0x36/0x370 [ 216.348135][T29410] __should_failslab+0x81/0x90 [ 216.352898][T29410] should_failslab+0x5/0x20 [ 216.357425][T29410] kmem_cache_alloc+0x4f/0x320 [ 216.362183][T29410] __d_alloc+0x36/0x370 [ 216.366332][T29410] d_alloc_parallel+0x51/0xca0 [ 216.371111][T29410] ? __d_lookup+0x38b/0x3b0 [ 216.375595][T29410] ? preempt_count_add+0x41/0x90 [ 216.380555][T29410] ? __mnt_want_write+0x158/0x170 [ 216.385671][T29410] path_openat+0x689/0x1eb0 [ 216.390162][T29410] do_filp_open+0x105/0x220 [ 216.394703][T29410] do_sys_openat2+0xb5/0x2b0 [ 216.399331][T29410] __x64_sys_openat+0xef/0x110 [ 216.404094][T29410] do_syscall_64+0x44/0xa0 [ 216.408564][T29410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.414458][T29410] RIP: 0033:0x7f5a8a7bca04 [ 216.418878][T29410] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 216.438491][T29410] RSP: 002b:00007f5a8857fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 216.446889][T29410] RAX: ffffffffffffffda RBX: 00007f5a8a853970 RCX: 00007f5a8a7bca04 [ 216.454842][T29410] RDX: 0000000000000002 RSI: 00007f5a88580000 RDI: 00000000ffffff9c [ 216.462811][T29410] RBP: 00007f5a88580000 R08: 0000000000000000 R09: ffffffffffffffff [ 216.470764][T29410] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 216.478716][T29410] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 216.486742][T29411] CPU: 1 PID: 29411 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 216.495184][T29411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.505237][T29411] Call Trace: [ 216.508514][T29411] dump_stack_lvl+0xd6/0x122 [ 216.513166][T29411] dump_stack+0x11/0x1b [ 216.517309][T29411] should_fail+0x23c/0x250 [ 216.521711][T29411] ? kobject_uevent_env+0x1a7/0xc40 [ 216.526973][T29411] __should_failslab+0x81/0x90 [ 216.531736][T29411] should_failslab+0x5/0x20 [ 216.536230][T29411] kmem_cache_alloc_trace+0x52/0x350 [ 216.541501][T29411] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 216.547016][T29411] ? dev_uevent_filter+0x70/0x70 [ 216.551938][T29411] kobject_uevent_env+0x1a7/0xc40 [ 216.556947][T29411] ? preempt_count_add+0x4e/0x90 [ 216.561943][T29411] ? _raw_spin_unlock+0x2e/0x50 [ 216.566776][T29411] ? bd_prepare_to_claim+0x1ac/0x200 [ 216.572044][T29411] disk_force_media_change+0xe3/0x170 [ 216.577401][T29411] loop_configure+0x74d/0xf30 [ 216.582062][T29411] lo_ioctl+0x583/0x1270 [ 216.586287][T29411] ? __rcu_read_unlock+0x5c/0x290 [ 216.591297][T29411] ? blkdev_common_ioctl+0x438/0x1120 [ 216.596688][T29411] ? do_vfs_ioctl+0x819/0x14a0 [ 216.601483][T29411] ? lo_release+0x120/0x120 [ 216.605966][T29411] blkdev_ioctl+0x20e/0x440 [ 216.610594][T29411] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 216.616065][T29411] __se_sys_ioctl+0xcb/0x140 [ 216.620773][T29411] __x64_sys_ioctl+0x3f/0x50 [ 216.625347][T29411] do_syscall_64+0x44/0xa0 [ 216.629774][T29411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.635718][T29411] RIP: 0033:0x7faf9ad4e8a7 [ 216.640128][T29411] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 216.659794][T29411] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.668265][T29411] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 216.676218][T29411] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:26:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 15) 03:26:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x40, 0x20, 0xa1, 0xff, 0x0, 0x3f, 0x80010, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x440, 0x100000001, 0x401, 0x1, 0x100000001, 0x15b40, 0x630, 0x0, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) [ 216.684256][T29411] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 216.692226][T29411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 216.700180][T29411] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 216.708278][T29411] loop2: detected capacity change from 0 to 262160 03:26:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 21) [ 216.751739][T29417] loop4: detected capacity change from 0 to 262160 [ 216.765773][T29437] FAULT_INJECTION: forcing a failure. [ 216.765773][T29437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.778920][T29437] CPU: 0 PID: 29437 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 216.787537][T29437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.797680][T29437] Call Trace: [ 216.800953][T29437] dump_stack_lvl+0xd6/0x122 [ 216.805556][T29437] dump_stack+0x11/0x1b [ 216.809730][T29437] should_fail+0x23c/0x250 [ 216.814177][T29437] should_fail_usercopy+0x16/0x20 [ 216.819283][T29437] _copy_to_user+0x1c/0x90 [ 216.823701][T29437] simple_read_from_buffer+0xab/0x120 [ 216.829099][T29437] proc_fail_nth_read+0x10d/0x150 [ 216.834167][T29437] ? proc_fault_inject_write+0x230/0x230 [ 216.839827][T29437] vfs_read+0x1e6/0x750 [ 216.844049][T29437] ? __fget_light+0x219/0x260 03:26:04 executing program 0: prctl$PR_CAPBSET_DROP(0x18, 0x11) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 216.848806][T29437] ksys_read+0xd9/0x190 [ 216.852963][T29437] __x64_sys_read+0x3e/0x50 [ 216.857488][T29437] do_syscall_64+0x44/0xa0 [ 216.861936][T29437] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 216.867835][T29437] RIP: 0033:0x7f5a8a7bc69c [ 216.872283][T29437] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 216.892035][T29437] RSP: 002b:00007f5a88580170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 216.900450][T29437] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f5a8a7bc69c [ 216.908410][T29437] RDX: 000000000000000f RSI: 00007f5a885801e0 RDI: 0000000000000003 [ 216.916367][T29437] RBP: 00007f5a885801d0 R08: 0000000000000000 R09: ffffffffffffffff [ 216.924412][T29437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.932376][T29437] R13: 00007fff84c20bef R14: 00007f5a88580300 R15: 0000000000022000 03:26:05 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) [ 216.950514][T29522] FAULT_INJECTION: forcing a failure. [ 216.950514][T29522] name failslab, interval 1, probability 0, space 0, times 0 [ 216.963148][T29522] CPU: 0 PID: 29522 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 216.971630][T29522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.981682][T29522] Call Trace: [ 216.984955][T29522] dump_stack_lvl+0xd6/0x122 [ 216.989554][T29522] dump_stack+0x11/0x1b [ 216.993715][T29522] should_fail+0x23c/0x250 [ 216.998131][T29522] ? kzalloc+0x1d/0x30 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x18) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 217.002197][T29522] __should_failslab+0x81/0x90 [ 217.007036][T29522] should_failslab+0x5/0x20 [ 217.011551][T29522] __kmalloc+0x6f/0x370 [ 217.015715][T29522] kzalloc+0x1d/0x30 [ 217.019657][T29522] kobject_get_path+0x7c/0x110 [ 217.024468][T29522] kobject_uevent_env+0x1be/0xc40 [ 217.029574][T29522] ? preempt_count_add+0x4e/0x90 [ 217.034513][T29522] ? _raw_spin_unlock+0x2e/0x50 [ 217.039363][T29522] ? bd_prepare_to_claim+0x1ac/0x200 [ 217.044694][T29522] disk_force_media_change+0xe3/0x170 03:26:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000300)=ANY=[@ANYBLOB="08507cdf78eebd803f80f26f3af8cbfcfd50e8f73b5559ea87a216e35cfdd52301844645ce07391ddc2233a5ff7a2e3cfd0234cfd17a7bda82dfd3a7e47fb04905f34cdbe216d381a3a42c3f58db317b", @ANYRES32=r0, @ANYBLOB="81000000000000002e2f666ecb40734cc0363f49695f653000455afda95c2897b7394eb7506df9c3db407d902fe37b6dd275430be5d64f088249476b802b7ce1c9b2603f7afb4d4c83c60c274a91b407298652f721029bae99bf1be7b3b5bd32be541d43db6d881e5b746b9ffa44cf995730cd6237e22d250ea1df1fe1d9de606ce9529cba5d5b3812232ea44984d601c37ae48da76f064c28e507834d3cdb1573d6d43229f90ec0d13128bb5271123d83b8e5a8258a76a86c74d0477343eaa59c1298c894c8d82b3d28831f3e6a003e79c702286a25466b8704a71dc456c483a8be774c7fd88262478bfb"]) 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 217.050073][T29522] loop_configure+0x74d/0xf30 [ 217.054849][T29522] lo_ioctl+0x583/0x1270 [ 217.059151][T29522] ? __rcu_read_unlock+0x5c/0x290 [ 217.064208][T29522] ? blkdev_common_ioctl+0x438/0x1120 [ 217.069582][T29522] ? do_vfs_ioctl+0x819/0x14a0 [ 217.074346][T29522] ? lo_release+0x120/0x120 [ 217.078870][T29522] blkdev_ioctl+0x20e/0x440 [ 217.083430][T29522] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 217.088893][T29522] __se_sys_ioctl+0xcb/0x140 [ 217.093487][T29522] __x64_sys_ioctl+0x3f/0x50 [ 217.098279][T29522] do_syscall_64+0x44/0xa0 [ 217.102760][T29522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 217.108658][T29522] RIP: 0033:0x7faf9ad4e8a7 [ 217.113072][T29522] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.132748][T29522] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.141184][T29522] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 217.149153][T29522] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 217.157121][T29522] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 217.165133][T29522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 217.173099][T29522] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 217.181230][T29522] loop2: detected capacity change from 0 to 262160 03:26:05 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYBLOB="2c848bd46bab5180e23b36259f56539fe3622f1f3e6c734b2ec76854df0c1f95121a9a78dad3b877d4e122e3a5de5ae44997bc9350d2b0c7622b81175b343da7c0719bd509e268bf4fe56d36cc90a7bbc135fd7ef8366f7a0a3a314aa1a3c60aaa7f63a54ed8", @ANYRES16], 0xfffffff0) 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) 03:26:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 22) 03:26:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000240)=ANY=[@ANYBLOB="02b0be048c0f117c090000001992d539d90673c864baf592ae2279988523b088ff67a796642a1b4aac8d41a3fb5efe15b9d246ef722425ba83ce92796ee48c6e099f94fbdebf9929ac1de2335020a6966bbf2862362ed9c38c1d01b0b9df58ceaba9e38c33630426e67f799889b7b44fe8a89ac30225a2cf9a6fcca62fa5a7fbd7fd6970e460011ebb1415ed709014cdf26e2c5eec03482221e8fda9ff16c6dcc19dc442e9bb36f8000000000000008759458423114806c279793f38b9c065c77acf82bd9cce19ea692c406cdcc9"], 0xf, 0x1) [ 217.298675][T29742] FAULT_INJECTION: forcing a failure. [ 217.298675][T29742] name failslab, interval 1, probability 0, space 0, times 0 [ 217.311291][T29742] CPU: 0 PID: 29742 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 217.319694][T29742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.329804][T29742] Call Trace: [ 217.333080][T29742] dump_stack_lvl+0xd6/0x122 [ 217.337662][T29742] dump_stack+0x11/0x1b [ 217.341805][T29742] should_fail+0x23c/0x250 [ 217.346236][T29742] ? kobject_uevent_env+0x1a7/0xc40 [ 217.351443][T29742] __should_failslab+0x81/0x90 [ 217.356190][T29742] should_failslab+0x5/0x20 [ 217.360679][T29742] kmem_cache_alloc_trace+0x52/0x350 [ 217.365986][T29742] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 217.371468][T29742] ? dev_uevent_filter+0x70/0x70 [ 217.376457][T29742] kobject_uevent_env+0x1a7/0xc40 [ 217.381466][T29742] ? preempt_count_add+0x4e/0x90 [ 217.386437][T29742] ? _raw_spin_unlock+0x2e/0x50 [ 217.391294][T29742] ? bd_prepare_to_claim+0x1ac/0x200 [ 217.396564][T29742] disk_force_media_change+0xe3/0x170 [ 217.401917][T29742] loop_configure+0x74d/0xf30 [ 217.406601][T29742] lo_ioctl+0x583/0x1270 [ 217.410828][T29742] ? __rcu_read_unlock+0x5c/0x290 [ 217.415839][T29742] ? blkdev_common_ioctl+0x438/0x1120 [ 217.421237][T29742] ? do_vfs_ioctl+0x819/0x14a0 [ 217.426037][T29742] ? lo_release+0x120/0x120 [ 217.430521][T29742] blkdev_ioctl+0x20e/0x440 [ 217.435174][T29742] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 217.440622][T29742] __se_sys_ioctl+0xcb/0x140 [ 217.445195][T29742] __x64_sys_ioctl+0x3f/0x50 [ 217.449801][T29742] do_syscall_64+0x44/0xa0 [ 217.454199][T29742] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 217.460178][T29742] RIP: 0033:0x7faf9ad4e8a7 [ 217.464578][T29742] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.484346][T29742] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 217.492738][T29742] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 217.500721][T29742] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 217.508673][T29742] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 217.516627][T29742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 217.524577][T29742] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 217.532711][T29742] loop2: detected capacity change from 0 to 262160 03:26:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 23) [ 217.575686][T29744] loop4: detected capacity change from 0 to 262160 03:26:05 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) (fail_nth: 1) 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:05 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)=0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xba, 0x4, 0x3, 0x80, 0x0, 0x3, 0x85, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffff90c, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x2, 0x8, 0x1, 0x3, 0x2, 0x0, 0x2, 0x0, 0x7, 0x0, 0x7fffffff}, r1, 0x3, r3, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000001) process_vm_writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/58, 0x3a}], 0x1, &(0x7f0000001480)=[{&(0x7f0000000300)=""/88, 0x58}, {&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/158, 0x9e}], 0x4, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f00000000c0)={0x100, 0x3f, 0x2, 0x3, 0x1, [0x8, 0x8, 0x6]}) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) r7 = memfd_secret(0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r6, 0x80049370, &(0x7f0000000100)) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000014c0)=']#{\x00') timer_delete(r2) [ 217.639881][T29751] FAULT_INJECTION: forcing a failure. [ 217.639881][T29751] name failslab, interval 1, probability 0, space 0, times 0 [ 217.652581][T29751] CPU: 0 PID: 29751 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 217.660988][T29751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.671035][T29751] Call Trace: [ 217.674307][T29751] dump_stack_lvl+0xd6/0x122 [ 217.678906][T29751] dump_stack+0x11/0x1b [ 217.683086][T29751] should_fail+0x23c/0x250 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 217.687522][T29751] __should_failslab+0x81/0x90 [ 217.692292][T29751] should_failslab+0x5/0x20 [ 217.696908][T29751] kmem_cache_alloc_node_trace+0x61/0x310 [ 217.702657][T29751] ? __kmalloc_node_track_caller+0x30/0x40 [ 217.708464][T29751] __kmalloc_node_track_caller+0x30/0x40 [ 217.714209][T29751] ? alloc_uevent_skb+0x5b/0x120 [ 217.719149][T29751] __alloc_skb+0x1a1/0x440 [ 217.723588][T29751] alloc_uevent_skb+0x5b/0x120 [ 217.728397][T29751] kobject_uevent_env+0x863/0xc40 [ 217.733491][T29751] ? preempt_count_add+0x4e/0x90 [ 217.738518][T29751] ? _raw_spin_unlock+0x2e/0x50 [ 217.743369][T29751] ? bd_prepare_to_claim+0x1ac/0x200 [ 217.748665][T29751] disk_force_media_change+0xe3/0x170 [ 217.754143][T29751] loop_configure+0x74d/0xf30 [ 217.758819][T29751] lo_ioctl+0x583/0x1270 [ 217.763084][T29751] ? __rcu_read_unlock+0x5c/0x290 [ 217.768139][T29751] ? blkdev_common_ioctl+0x438/0x1120 [ 217.773531][T29751] ? do_vfs_ioctl+0x819/0x14a0 [ 217.778386][T29751] ? lo_release+0x120/0x120 [ 217.782889][T29751] blkdev_ioctl+0x20e/0x440 03:26:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 217.787391][T29751] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 217.792853][T29751] __se_sys_ioctl+0xcb/0x140 [ 217.797503][T29751] __x64_sys_ioctl+0x3f/0x50 [ 217.802110][T29751] do_syscall_64+0x44/0xa0 [ 217.806523][T29751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 217.812417][T29751] RIP: 0033:0x7faf9ad4e8a7 [ 217.816827][T29751] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.836506][T29751] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.844954][T29751] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 217.852992][T29751] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 217.860955][T29751] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 217.864047][T29756] FAULT_INJECTION: forcing a failure. [ 217.864047][T29756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.868916][T29751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 217.868930][T29751] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 217.897848][T29756] CPU: 1 PID: 29756 Comm: syz-executor.1 Not tainted 5.15.0-syzkaller #0 [ 217.897983][T29751] loop2: detected capacity change from 0 to 262160 [ 217.906258][T29756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.906271][T29756] Call Trace: [ 217.906277][T29756] dump_stack_lvl+0xd6/0x122 [ 217.930652][T29756] dump_stack+0x11/0x1b [ 217.934883][T29756] should_fail+0x23c/0x250 [ 217.939296][T29756] should_fail_usercopy+0x16/0x20 [ 217.944324][T29756] _copy_to_user+0x1c/0x90 [ 217.948735][T29756] simple_read_from_buffer+0xab/0x120 [ 217.954110][T29756] proc_fail_nth_read+0x10d/0x150 [ 217.959175][T29756] ? proc_fault_inject_write+0x230/0x230 [ 217.964803][T29756] vfs_read+0x1e6/0x750 [ 217.968992][T29756] ? __fget_light+0x219/0x260 [ 217.973669][T29756] ksys_read+0xd9/0x190 [ 217.977877][T29756] __x64_sys_read+0x3e/0x50 [ 217.982469][T29756] do_syscall_64+0x44/0xa0 [ 217.986878][T29756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 217.992770][T29756] RIP: 0033:0x7f9e8df1869c [ 217.997176][T29756] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 218.016776][T29756] RSP: 002b:00007f9e8bcdc170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 218.025194][T29756] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f9e8df1869c [ 218.033159][T29756] RDX: 000000000000000f RSI: 00007f9e8bcdc1e0 RDI: 0000000000000007 [ 218.041124][T29756] RBP: 00007f9e8bcdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 218.049089][T29756] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 218.057066][T29756] R13: 00007ffd57e761ef R14: 00007f9e8bcdc300 R15: 0000000000022000 03:26:06 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYRES16], 0xfffffff0) 03:26:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:06 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) 03:26:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 24) 03:26:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000003) 03:26:06 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r2, 0x8971, &(0x7f0000000000)={'sit0\x00', @ifru_flags}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000001) r7 = accept4$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14, 0x800) dup2(r5, r7) connect$packet(r7, &(0x7f00000014c0)={0x11, 0x5, r8, 0x1, 0x17, 0x6, @broadcast}, 0x14) sendfile(r3, r4, 0x0, 0x80000001) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000140)={"faeadb6f10cd0e04011b00", 0x0, 0x0, {0x9, 0x5}, {0x95, 0xed5}, 0x6, [0x400, 0x8, 0x401, 0x8, 0x1f, 0x80000000, 0xffffffff80000001, 0x0, 0x4d, 0x10001, 0x1f, 0x7ffd, 0x0, 0x5, 0x3f, 0x4]}) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f00000004c0)={{r0}, r9, 0x8, @inherit={0x88, &(0x7f0000000400)={0x0, 0x8, 0xfe00000000000000, 0x1, {0x22, 0x70, 0x400000bc9, 0x3ff, 0x3}, [0x7, 0x0, 0x5, 0x100008, 0x2008, 0x4, 0x81, 0x7ff]}}, @subvolid=0x209}) timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)=0x0) wait4(r10, &(0x7f0000000300), 0x8, &(0x7f0000000340)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x25, 0x4, 0x7, 0x7f, 0x0, 0x4, 0x800, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3651, 0x1, @perf_config_ext={0x3ff, 0x7}, 0x41100, 0x9, 0x3, 0x5, 0x1f, 0x2, 0x0, 0x0, 0x3, 0x0, 0x7fff}, r1, 0x2, r0, 0x8) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 218.244506][T29869] loop4: detected capacity change from 0 to 262160 [ 218.251695][T29872] FAULT_INJECTION: forcing a failure. [ 218.251695][T29872] name failslab, interval 1, probability 0, space 0, times 0 [ 218.264366][T29872] CPU: 1 PID: 29872 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 218.272773][T29872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.282879][T29872] Call Trace: [ 218.286149][T29872] dump_stack_lvl+0xd6/0x122 [ 218.290845][T29872] dump_stack+0x11/0x1b [ 218.295002][T29872] should_fail+0x23c/0x250 [ 218.299503][T29872] ? skb_clone+0x12c/0x1f0 [ 218.303923][T29872] __should_failslab+0x81/0x90 [ 218.308767][T29872] should_failslab+0x5/0x20 [ 218.313279][T29872] kmem_cache_alloc+0x4f/0x320 [ 218.318041][T29872] skb_clone+0x12c/0x1f0 [ 218.322288][T29872] netlink_broadcast_filtered+0x4fd/0xb60 [ 218.328076][T29872] ? skb_put+0xb9/0xf0 [ 218.332198][T29872] netlink_broadcast+0x35/0x50 [ 218.336987][T29872] kobject_uevent_env+0x8c9/0xc40 [ 218.342097][T29872] ? preempt_count_add+0x4e/0x90 [ 218.347039][T29872] ? _raw_spin_unlock+0x2e/0x50 [ 218.351962][T29872] ? bd_prepare_to_claim+0x1ac/0x200 [ 218.357253][T29872] disk_force_media_change+0xe3/0x170 [ 218.362614][T29872] loop_configure+0x74d/0xf30 [ 218.367372][T29872] lo_ioctl+0x583/0x1270 [ 218.371634][T29872] ? __rcu_read_unlock+0x5c/0x290 [ 218.376648][T29872] ? blkdev_common_ioctl+0x438/0x1120 [ 218.382016][T29872] ? do_vfs_ioctl+0x819/0x14a0 [ 218.386771][T29872] ? lo_release+0x120/0x120 [ 218.391255][T29872] blkdev_ioctl+0x20e/0x440 [ 218.395742][T29872] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 218.401205][T29872] __se_sys_ioctl+0xcb/0x140 [ 218.405781][T29872] __x64_sys_ioctl+0x3f/0x50 [ 218.410364][T29872] do_syscall_64+0x44/0xa0 [ 218.414767][T29872] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 218.420708][T29872] RIP: 0033:0x7faf9ad4e8a7 [ 218.425142][T29872] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 218.444729][T29872] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.453158][T29872] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 218.461150][T29872] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 218.469104][T29872] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 218.477057][T29872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 218.485091][T29872] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x26, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x70, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7e, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 218.493183][T29872] loop2: detected capacity change from 0 to 262160 03:26:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x207}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = syz_mount_image$nfs4(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000280)="8c682617f16fbfca3ca5f26c9a41b6c712bad8d69e89769f3c7fdbee6bfc8adee2139129f34d53dfc219cb661f3b997ae860437148f20823dcf68c334e0d028e66507e7731d5e5171ed30b1c08694ce979498b8b95368befa3e7b8741c835e", 0x5f, 0xf9c}, {&(0x7f0000000300)="d1e86e55b160e98bf3e4865980e18fd0bd4c7c64de77f03d876ff618020c5fee1f7eed76adaff4078bc3ad7282f2d4b3ac521e3f76f1c617532d1acda9d33a152f39d3f0dc0802922ad0b4b709c38aab80069643b2782f6050770074110fc2b9c4f8eb8e169299f3683642a551b07cd3a5e7b20d82975f", 0x77, 0x4}, {&(0x7f0000000380)="d7e6922cecb830a4d798a23651b9f8d0bf4c07d8c2c972cc6fef6f126e555ab55dda455baeec3f1e444bb53ef6328a75a24d8a63c5178c899b646b7ccc4ad1254549953bb4a7b4721dab78d57bfbc2bf6ba72d09fa037423c0117f9b2476bd10725023edeb6fd7079032ffd2510e0354de67b06fe757e91db7dadba2d994f0f6a0995a9581867cebae15d67fc4572e4e33d4feae55a3cc6ee1", 0x99, 0xfff}], 0x80000, &(0x7f00000004c0)={[{'!@-^'}], [{@context={'context', 0x3d, 'root'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) stat(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733dff48a9a801b574190f2c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',cache=mmap,loose,version=9p2000,euid<', @ANYRESDEC=r1, @ANYBLOB="2c6f626a5f726f6c653d2671212e2f3a2dc02425292c646f6e745f686173682c6673757569643d37366237313337372d646435322d346435342d373302362d346436390d32305e2c61707072616973652c00"]) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x20000, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x2) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) inotify_add_watch(r3, &(0x7f0000000700)='./file0\x00', 0x80000100) 03:26:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000004) [ 218.626227][T29996] loop4: detected capacity change from 0 to 262160 03:26:07 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES32, @ANYRES16], 0xfffffff0) 03:26:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 25) 03:26:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000005) 03:26:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1000) r1 = socket$inet(0x2, 0x0, 0x9000000) connect(r1, &(0x7f0000000140)=@x25, 0x80) 03:26:07 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) [ 219.172887][T30101] FAULT_INJECTION: forcing a failure. [ 219.172887][T30101] name failslab, interval 1, probability 0, space 0, times 0 [ 219.185649][T30101] CPU: 1 PID: 30101 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 219.194116][T30101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.204157][T30101] Call Trace: [ 219.207483][T30101] dump_stack_lvl+0xd6/0x122 [ 219.212062][T30101] dump_stack+0x11/0x1b [ 219.216239][T30101] should_fail+0x23c/0x250 [ 219.220667][T30101] ? __kernfs_new_node+0x6a/0x340 [ 219.225748][T30101] __should_failslab+0x81/0x90 [ 219.230515][T30101] should_failslab+0x5/0x20 [ 219.235067][T30101] kmem_cache_alloc+0x4f/0x320 [ 219.239870][T30101] ? __kfree_skb+0xfe/0x150 [ 219.244501][T30101] __kernfs_new_node+0x6a/0x340 [ 219.249340][T30101] ? ___cache_free+0x46/0x300 [ 219.254001][T30101] ? __kfree_skb+0xfe/0x150 [ 219.258571][T30101] ? debug_smp_processor_id+0x18/0x20 [ 219.263947][T30101] ? delay_tsc+0x96/0xe0 [ 219.268228][T30101] kernfs_create_dir_ns+0x5e/0x140 [ 219.273327][T30101] internal_create_group+0x148/0x860 [ 219.278661][T30101] sysfs_create_group+0x1b/0x20 [ 219.283499][T30101] loop_configure+0xc58/0xf30 [ 219.288214][T30101] lo_ioctl+0x583/0x1270 [ 219.292446][T30101] ? __rcu_read_unlock+0x5c/0x290 [ 219.297475][T30101] ? blkdev_common_ioctl+0x438/0x1120 [ 219.302860][T30101] ? do_vfs_ioctl+0x819/0x14a0 [ 219.307608][T30101] ? lo_release+0x120/0x120 [ 219.312095][T30101] blkdev_ioctl+0x20e/0x440 [ 219.316641][T30101] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 219.322160][T30101] __se_sys_ioctl+0xcb/0x140 [ 219.326766][T30101] __x64_sys_ioctl+0x3f/0x50 [ 219.331379][T30101] do_syscall_64+0x44/0xa0 [ 219.335777][T30101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 219.341655][T30101] RIP: 0033:0x7faf9ad4e8a7 [ 219.346152][T30101] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 219.365752][T30101] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:26:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 219.374147][T30101] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 219.382103][T30101] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 219.390129][T30101] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 219.398084][T30101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 219.406036][T30101] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 219.414084][T30101] loop2: detected capacity change from 0 to 262160 03:26:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1, 0x40) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x2) 03:26:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 26) [ 219.452472][T30197] loop4: detected capacity change from 0 to 262160 03:26:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000006) [ 219.549047][T30223] FAULT_INJECTION: forcing a failure. [ 219.549047][T30223] name failslab, interval 1, probability 0, space 0, times 0 [ 219.561689][T30223] CPU: 0 PID: 30223 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 219.570129][T30223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.580187][T30223] Call Trace: [ 219.583462][T30223] dump_stack_lvl+0xd6/0x122 [ 219.588064][T30223] dump_stack+0x11/0x1b [ 219.592260][T30223] should_fail+0x23c/0x250 [ 219.596681][T30223] ? __kernfs_new_node+0x6a/0x340 [ 219.601710][T30223] __should_failslab+0x81/0x90 [ 219.606470][T30223] should_failslab+0x5/0x20 [ 219.610972][T30223] kmem_cache_alloc+0x4f/0x320 [ 219.615826][T30223] __kernfs_new_node+0x6a/0x340 [ 219.620671][T30223] ? __down_write_common+0x42/0x860 [ 219.625859][T30223] ? idr_alloc_cyclic+0x26b/0x2f0 [ 219.630928][T30223] ? __down_write_common+0x42/0x860 [ 219.636121][T30223] ? rb_insert_color+0x7e/0x310 [ 219.641013][T30223] kernfs_new_node+0x5b/0xd0 [ 219.645706][T30223] __kernfs_create_file+0x45/0x1a0 [ 219.650877][T30223] sysfs_add_file_mode_ns+0x1c1/0x250 [ 219.656301][T30223] internal_create_group+0x2f4/0x860 [ 219.661646][T30223] sysfs_create_group+0x1b/0x20 [ 219.666538][T30223] loop_configure+0xc58/0xf30 [ 219.671200][T30223] lo_ioctl+0x583/0x1270 [ 219.675438][T30223] ? __rcu_read_unlock+0x5c/0x290 [ 219.680473][T30223] ? blkdev_common_ioctl+0x438/0x1120 [ 219.685831][T30223] ? do_vfs_ioctl+0x819/0x14a0 [ 219.690604][T30223] ? lo_release+0x120/0x120 [ 219.695094][T30223] blkdev_ioctl+0x20e/0x440 [ 219.699595][T30223] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 219.705041][T30223] __se_sys_ioctl+0xcb/0x140 [ 219.709626][T30223] __x64_sys_ioctl+0x3f/0x50 [ 219.714271][T30223] do_syscall_64+0x44/0xa0 [ 219.718692][T30223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 219.724575][T30223] RIP: 0033:0x7faf9ad4e8a7 [ 219.728996][T30223] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 219.748603][T30223] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 219.757003][T30223] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 219.764961][T30223] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 219.772933][T30223] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 219.780944][T30223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 219.788916][T30223] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 219.796929][T30223] loop2: detected capacity change from 0 to 262160 [ 219.853772][T30328] loop4: detected capacity change from 0 to 262160 03:26:08 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES16], 0xfffffff0) 03:26:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x5, 0x80, 0x1, 0x0, 0x7, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x80, 0x8, 0x0, 0x9, 0x1ff, 0x401, 0x180, 0x0, 0x6, 0x0, 0x100000001}, 0x0, 0x10, r1, 0xb) sendfile(r0, r1, 0x0, 0x80000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x5, 0x3, 0x3b, 0x79, 0x0, 0x7, 0x1, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xd1b00000, 0x1, @perf_config_ext={0x200, 0x8}, 0x2000, 0x7fff, 0xfffff801, 0x9, 0x6, 0x7, 0x37, 0x0, 0x3, 0x0, 0x7}) 03:26:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 27) 03:26:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) 03:26:08 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) [ 220.360457][T30336] FAULT_INJECTION: forcing a failure. [ 220.360457][T30336] name failslab, interval 1, probability 0, space 0, times 0 [ 220.373107][T30336] CPU: 1 PID: 30336 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 220.381634][T30336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.391694][T30336] Call Trace: [ 220.394958][T30336] dump_stack_lvl+0xd6/0x122 [ 220.399599][T30336] dump_stack+0x11/0x1b [ 220.403747][T30336] should_fail+0x23c/0x250 [ 220.408151][T30336] ? __kernfs_new_node+0x6a/0x340 [ 220.413173][T30336] __should_failslab+0x81/0x90 [ 220.417977][T30336] should_failslab+0x5/0x20 [ 220.422470][T30336] kmem_cache_alloc+0x4f/0x320 [ 220.427220][T30336] ? __down_write_common+0x42/0x860 [ 220.432403][T30336] __kernfs_new_node+0x6a/0x340 [ 220.437300][T30336] ? up_write+0x25/0xc0 [ 220.441525][T30336] kernfs_new_node+0x5b/0xd0 [ 220.446116][T30336] __kernfs_create_file+0x45/0x1a0 [ 220.451211][T30336] sysfs_add_file_mode_ns+0x1c1/0x250 [ 220.456630][T30336] internal_create_group+0x2f4/0x860 [ 220.461906][T30336] sysfs_create_group+0x1b/0x20 [ 220.466790][T30336] loop_configure+0xc58/0xf30 [ 220.471449][T30336] lo_ioctl+0x583/0x1270 [ 220.475739][T30336] ? __rcu_read_unlock+0x5c/0x290 [ 220.480750][T30336] ? blkdev_common_ioctl+0x438/0x1120 [ 220.486173][T30336] ? do_vfs_ioctl+0x819/0x14a0 [ 220.490969][T30336] ? lo_release+0x120/0x120 [ 220.495453][T30336] blkdev_ioctl+0x20e/0x440 [ 220.500006][T30336] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 220.505450][T30336] __se_sys_ioctl+0xcb/0x140 [ 220.510047][T30336] __x64_sys_ioctl+0x3f/0x50 [ 220.514624][T30336] do_syscall_64+0x44/0xa0 [ 220.519034][T30336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 220.524928][T30336] RIP: 0033:0x7faf9ad4e8a7 [ 220.529327][T30336] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 220.548914][T30336] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.557308][T30336] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 220.565359][T30336] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 220.573314][T30336] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 220.581361][T30336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 220.589314][T30336] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 220.597443][T30336] loop2: detected capacity change from 0 to 262160 [ 220.598330][T30340] loop4: detected capacity change from 0 to 262160 03:26:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 28) 03:26:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1800, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000008) [ 220.749120][T30450] FAULT_INJECTION: forcing a failure. [ 220.749120][T30450] name failslab, interval 1, probability 0, space 0, times 0 [ 220.761776][T30450] CPU: 0 PID: 30450 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 220.770276][T30450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.780326][T30450] Call Trace: [ 220.783608][T30450] dump_stack_lvl+0xd6/0x122 [ 220.788272][T30450] dump_stack+0x11/0x1b [ 220.792428][T30450] should_fail+0x23c/0x250 [ 220.796845][T30450] ? __kernfs_new_node+0x6a/0x340 [ 220.801908][T30450] __should_failslab+0x81/0x90 [ 220.806707][T30450] should_failslab+0x5/0x20 [ 220.811288][T30450] kmem_cache_alloc+0x4f/0x320 [ 220.816053][T30450] ? __down_write_common+0x42/0x860 [ 220.821260][T30450] __kernfs_new_node+0x6a/0x340 [ 220.826118][T30450] ? up_write+0x25/0xc0 [ 220.830341][T30450] kernfs_new_node+0x5b/0xd0 [ 220.835014][T30450] __kernfs_create_file+0x45/0x1a0 [ 220.840131][T30450] sysfs_add_file_mode_ns+0x1c1/0x250 [ 220.845505][T30450] internal_create_group+0x2f4/0x860 [ 220.850862][T30450] sysfs_create_group+0x1b/0x20 [ 220.855740][T30450] loop_configure+0xc58/0xf30 [ 220.860488][T30450] lo_ioctl+0x583/0x1270 [ 220.864768][T30450] ? __rcu_read_unlock+0x5c/0x290 [ 220.869799][T30450] ? blkdev_common_ioctl+0x438/0x1120 [ 220.875229][T30450] ? do_vfs_ioctl+0x819/0x14a0 [ 220.879995][T30450] ? lo_release+0x120/0x120 [ 220.884532][T30450] blkdev_ioctl+0x20e/0x440 [ 220.889114][T30450] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 220.894573][T30450] __se_sys_ioctl+0xcb/0x140 03:26:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 220.899210][T30450] __x64_sys_ioctl+0x3f/0x50 [ 220.903804][T30450] do_syscall_64+0x44/0xa0 [ 220.908238][T30450] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 220.914134][T30450] RIP: 0033:0x7faf9ad4e8a7 [ 220.918545][T30450] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 220.938161][T30450] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:26:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) [ 220.946575][T30450] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 220.954559][T30450] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 220.962527][T30450] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 220.970494][T30450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 220.978459][T30450] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 220.986532][T30450] loop2: detected capacity change from 0 to 262160 [ 221.029345][T30458] loop4: detected capacity change from 0 to 262160 03:26:09 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16=r4, @ANYRES16], 0xfffffff0) 03:26:09 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000003) 03:26:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2600, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x2, 0xf8, 0x40, 0xff, 0x0, 0x100000001, 0x488, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x6}, 0x18c0, 0x1f, 0xf609, 0x9, 0xfffffffffffffff1, 0x0, 0x200, 0x0, 0x1, 0x0, 0x5}, r1, 0x2, r0, 0xa) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r2 = syz_io_uring_complete(0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) bind(r2, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x0, 0x3, {0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1b93}}}, 0x80) futimesat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r3, r4/1000+60000}, {r5, r6/1000+60000}}) 03:26:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000009) 03:26:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 29) [ 221.414169][T30467] loop4: detected capacity change from 0 to 262160 [ 221.423649][T30473] FAULT_INJECTION: forcing a failure. [ 221.423649][T30473] name failslab, interval 1, probability 0, space 0, times 0 [ 221.436269][T30473] CPU: 0 PID: 30473 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 221.444681][T30473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.454744][T30473] Call Trace: [ 221.458006][T30473] dump_stack_lvl+0xd6/0x122 [ 221.462594][T30473] dump_stack+0x11/0x1b [ 221.466763][T30473] should_fail+0x23c/0x250 [ 221.471168][T30473] ? radix_tree_node_alloc+0x142/0x200 [ 221.476602][T30473] __should_failslab+0x81/0x90 [ 221.481424][T30473] should_failslab+0x5/0x20 [ 221.485947][T30473] kmem_cache_alloc+0x4f/0x320 [ 221.490690][T30473] radix_tree_node_alloc+0x142/0x200 [ 221.495963][T30473] ? delete_node+0x45c/0x480 [ 221.500538][T30473] idr_get_free+0x22a/0x5d0 [ 221.505148][T30473] ? kernfs_xattr_get+0x63/0x70 [ 221.509990][T30473] idr_alloc_cyclic+0xf4/0x2f0 [ 221.514783][T30473] __kernfs_new_node+0xb4/0x340 [ 221.519617][T30473] ? up_write+0x25/0xc0 [ 221.523753][T30473] kernfs_new_node+0x5b/0xd0 [ 221.528343][T30473] __kernfs_create_file+0x45/0x1a0 [ 221.533434][T30473] sysfs_add_file_mode_ns+0x1c1/0x250 [ 221.538786][T30473] internal_create_group+0x2f4/0x860 [ 221.544183][T30473] sysfs_create_group+0x1b/0x20 [ 221.549026][T30473] loop_configure+0xc58/0xf30 [ 221.553685][T30473] lo_ioctl+0x583/0x1270 [ 221.557909][T30473] ? __rcu_read_unlock+0x5c/0x290 [ 221.562923][T30473] ? blkdev_common_ioctl+0x438/0x1120 [ 221.568338][T30473] ? do_vfs_ioctl+0x819/0x14a0 [ 221.573106][T30473] ? lo_release+0x120/0x120 [ 221.577626][T30473] blkdev_ioctl+0x20e/0x440 [ 221.582112][T30473] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 221.587548][T30473] __se_sys_ioctl+0xcb/0x140 [ 221.592150][T30473] __x64_sys_ioctl+0x3f/0x50 [ 221.596777][T30473] do_syscall_64+0x44/0xa0 [ 221.601172][T30473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 221.607049][T30473] RIP: 0033:0x7faf9ad4e8a7 [ 221.611446][T30473] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 221.631077][T30473] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 221.639461][T30473] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 221.647483][T30473] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 221.655433][T30473] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 03:26:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 221.663392][T30473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 221.671341][T30473] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 221.679450][T30473] loop2: detected capacity change from 0 to 262160 03:26:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) 03:26:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xd1, 0x40, 0x1, 0x20, 0x0, 0x85, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa00, 0x4, @perf_config_ext={0x100, 0x3}, 0xac0, 0x8000, 0x8000, 0x5, 0x1da, 0x5, 0x7, 0x0, 0xffff, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r0, 0x0) 03:26:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 30) [ 221.811353][T30666] loop4: detected capacity change from 0 to 262160 [ 221.821346][T30668] FAULT_INJECTION: forcing a failure. [ 221.821346][T30668] name failslab, interval 1, probability 0, space 0, times 0 [ 221.833997][T30668] CPU: 1 PID: 30668 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 221.842423][T30668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.852491][T30668] Call Trace: [ 221.855798][T30668] dump_stack_lvl+0xd6/0x122 [ 221.860381][T30668] dump_stack+0x11/0x1b [ 221.864538][T30668] should_fail+0x23c/0x250 [ 221.869189][T30668] ? __kernfs_new_node+0x6a/0x340 [ 221.874262][T30668] __should_failslab+0x81/0x90 [ 221.879050][T30668] should_failslab+0x5/0x20 [ 221.883548][T30668] kmem_cache_alloc+0x4f/0x320 [ 221.888305][T30668] ? __down_write_common+0x42/0x860 [ 221.893499][T30668] __kernfs_new_node+0x6a/0x340 [ 221.898367][T30668] ? up_write+0x25/0xc0 [ 221.902575][T30668] kernfs_new_node+0x5b/0xd0 [ 221.907179][T30668] __kernfs_create_file+0x45/0x1a0 [ 221.912280][T30668] sysfs_add_file_mode_ns+0x1c1/0x250 [ 221.917636][T30668] internal_create_group+0x2f4/0x860 [ 221.922923][T30668] sysfs_create_group+0x1b/0x20 [ 221.927831][T30668] loop_configure+0xc58/0xf30 [ 221.932493][T30668] lo_ioctl+0x583/0x1270 [ 221.936778][T30668] ? __rcu_read_unlock+0x5c/0x290 [ 221.941809][T30668] ? blkdev_common_ioctl+0x438/0x1120 [ 221.947178][T30668] ? do_vfs_ioctl+0x819/0x14a0 [ 221.951984][T30668] ? lo_release+0x120/0x120 [ 221.956476][T30668] blkdev_ioctl+0x20e/0x440 [ 221.961046][T30668] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 221.966493][T30668] __se_sys_ioctl+0xcb/0x140 [ 221.971107][T30668] __x64_sys_ioctl+0x3f/0x50 [ 221.975696][T30668] do_syscall_64+0x44/0xa0 [ 221.980135][T30668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 221.986077][T30668] RIP: 0033:0x7faf9ad4e8a7 [ 221.990488][T30668] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 222.010083][T30668] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 222.018556][T30668] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 222.026538][T30668] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 222.034492][T30668] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 222.042445][T30668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 222.050398][T30668] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 222.058455][T30668] loop2: detected capacity change from 0 to 262160 03:26:10 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16], 0xfffffff0) 03:26:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) writev(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)="ad12", 0x2}, {&(0x7f0000000400)="6b6af0fe1a0754346d42393fc2f8abb49561577a4d3690f8e4b726399367c558f8318295d8fbfd04123511e48ff8f608a7e677b39d139d4b44700f79b9afdad9a3c42b681a1dd8f5c66f5b162cee4fb7675ee64abe7f491694f904cf1e546ccb9e", 0x61}, {&(0x7f0000000480)="7fa1834d4f5e43d79324f0909ba5c4620668c62f16dac9176f69", 0x1a}, {&(0x7f00000004c0)="785f16402de0d23d21553a9a64ae84fd136d3f7c3868db58370793983a7dec94c65d13dbdccc9edb0848531973f789c0324bc882500cf9d8655294a68363b3a1da25c918592217e99edab4dcbc89a680b3174fdee906e1f8beb09829fa778876bbf6dfbaebbaad341d019687c76d708d2d0f5d2b552bbfc5d6c78b8b58103f1a50719f9e00ccbed58b568ac5c29202479af73cfe13e2", 0x96}, {&(0x7f0000000580)="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", 0xfe}, {&(0x7f0000001840)="58a99b5224a9dda5251d9c8aa96517d4e71c23d1427fc959998e35956502e5aeba2cd3e7ac6913cd4a37f45badddd9eb4ae06a90e5f7e0365d65e95d8e759901f635723a836dfb3186423392be0a0faa1d2c386fe45b1b5de9c5a5d9fed70e0fd56739c0c5fe58e5e587d4d151ee8af587a68d7fe4e3faa3ba59702dc1ff4b7999796026be8e61724351a33c3ed4a71316ee28e1f6f353386f9276953a5d033465cfed2defcc4385264c12a694003a4571d3386f26231c59f73c433f739a093abd2ec70aa52a83a2dc35c2fd727898962205d435cb4e8e4ea7eb24ded3e05586ad4a7485e5d4e7826982b42c90b0c59a9c8c211c45414ea11623d0567525cfb20e7d609934e34f5d02dfd364a84ec24395143342d3d7c02c840f247e826816affee193ab48fd75a8138549e2c983037b3682994375d97870f99f62b42183a56576a3f1a9aa36697fd55e31a83219cc23c7b8c875811d64382f9924e6e3bcb058f7686a682d22dd5bcca0cb1ca745f49c502d2014f13db27f85d35539e07577eb01462ef1c72b185604422567c316e3818472916331f0fa9c51a2a26b12a92fdba0d03c22a5d98ee14c50ac967d10a003a8cd9cbb043ed9d05cf38bcc20a4f9e8dce81135f21740622cd9bad27b737ad3c10a499141af53b76d23ad27486e62976f4c9368a2b9ffa17b269188dd3828d0070e9ae3fc507b9211c1c75622fe8f73e27b18a0743c32221d26809097987494b8fc8b12bdc08057402d152aa705d6636945e36e63e20273e8878acecc757c26a69733a036b68a1b90a139f15f0f061ca5c906a9464d6d4a34563c22303eeb9f625c36fbd33f21ef30221ee190c1d224cd620bec1e5fc38a56cc24ce4cfb9198741b39ade7f67c76ea0135301f8cf4aec82315cc7d050bfcb67a2e0216b960c1cc6bd714e9a76276bced9fb3dc5d18d9b7f7ad14d12c2181de8435607622534c07d940217ec13678a7f12aaa6d8c20756be18e62b95c23be5831c5dcbaaa9a818f6968f619ecbafabb9c067cd2c7ed134c2231081fa22297081160ecfcf0827885972e895cf5f16f33f2bccbe6e06d8da0f53c8ab03fd5a2de24685b565c4400471beb3fc491952a5f6065f42aa0d232c27f07303c41635d8c032a87a33f9bf9683d7aaebdf130aa5f0c655daf21fc29711a1d19751e38f39d45cdcaa125aaa3a9c7e64ceb94ee836d04adb248fff0fa1dc3f56bdf229c24cf0487c72f5304673900a5dec4df8c47997a4aa73662aa907a07c781aa5c9f8ffb33e4feb422082a3062668aa6f676059c192e4f86bb1ed764be15824b522737d4ed95d2cda980df927f6c2f323564511b026b191d277a4bb472416d435b1d0218720ed2f0622871a38cf580a06cdca991ae6ba55231969bc7be5b30213143bf3de103ca92b6497186dd8563f91a3f7339aa7c73952bcc2248c2bad363ead73ec0df893adc86e4165b3db040c88910329669f088004f4520e95850dd5604f4c1041a33e168a474933d0c1048e08ff8d0803a2b73f605d60b45fca61c67bd92acd1f1954396d7f203380bfe1969f1b149b5649bf0c930998c1ec2685b881db70caaee94444abc94a8f7a8d5b32c5f7add51e42e2ecc06b66dad1c6f08c0c65375cf2348171cb2895127aea8fd37357830313524430eba3faef4370badd81440aa5cd93b5f8d725b81339bb9e8c16c41575af3cf26939fce4d429e6b8b8ef5c0ba1d3fd1b714afbfef66ed202864bfd207044ea32d5fe511f094b9597286ac689224bfb1815fb3f262079fd244d784a8ffacdc94e028aa90006833f2578f1b9b1df86f0bf296e877d4fb89e3399599627e30eb8af6c6fdfc50f7eaa06a9dec4768645b46aa339ad0d48a524e6aca11ffb05e0a9606a955b7c0b56e1530eb022601e1e1262763787d5ca274860212592dc59f8dbc7b23036593f97496ae583f93906e1ec0f24d0e31e0a70a012ced1d48166c10e2bee51cef5728fed911f48fbc07e07c6cd16d68ff1fab28cb2cf9f171b3823581f73918dcfa6c44c71e1c70291575fe00c669b85ee976da84f641c797aeaf098b845f7d6d78442906980b5e91115be1baff799807084ee77c2f6a1b3d593568e6071abf3f3af62d6fca85034fce3ae84c575067104153fb43ff68fcb105ab520f373d7e8a57201c211e96febb7dec42af618aa88a237fd562248cf46cb7206488291a10342c473df62795b29c7bf13fbd7b58ee6ea0dced6b40d67995d816cf0198dcc9359892e582709c0dd03c9162d529bcf2c63e9e3bd10e4a2a7660ac5e54bc53309bc61f5d47e9ede998eda429c899020819c0d0aab45e38697129f95ea7c041922e1a38f8e85831e1df4c309ff24a6259b02c643947baa0ed5f3d410bef62d74473451b514532ea8b9e42a4177817ce2c1c14066a5d300fcdbade7a11efcaf702457dabde360c14f8d3429d434ed540f326642119dc32f8853be3f58a0f86053006b524beef3df6be900d7d7d7f03baa41067e89f2ba600fd3380045f2c5b12901604795fa81b13a9a70edee7b29daa98ffbef2da05e28bd8561570bc68430158f6ccc1eb60f1194caf8af7f11c9cd8d9009a1a67665ae768b9a1c9956d1c6069df02593660f1ed3f0cb998c751604bcf2c3c3765295af4440c7d192643fdd34df22f7190926129e6486ecfb851eaa5cb04974f0397dc835068c8d82f1f8f96ff5911ab7014514a7fd1d5854009da5b1266b96c8762b26930913d57c7a59b9f1a1a659a796932bcc7ef411e683353db54a116b9a254578c17503ed061939c1b33bf15899c19b66fa35d28fd3b033cd828e3ec87ad0a232a5d0f3f527f0233f22f4b4f62fb2ad1c1b48d1c5f615c7dee054fb2ddf0ebe82f68711242fe75b81c969e7cabafbd47172913a97f05259514707a8cdffd56e9e3ab5856186a6b121b171144e7f97311401ce9b2f72abbe2db096045b33d1bcb0c57a6e4f2def8365b1813f6c88931eb5e3636f48916ecbe8470ab33fe9c36c9ee9e44b80ca7ff8edfd6274d595883bf59b0c1f9c0c888cda65d707204d4b51f56969d68d257e16bfbd9f74bd4462a2c8f1fcb590896aa787d049f36ff17b1ebcbe058e8a586d8e5a491abf89eeff7febf396d23a02df0628d6659b8a16c87b45d33279b9f73258683761ac074018b41402404f56798fa95a535f490bf3efb511fe1cd5786a4fc45ce07431be56f053c0409a940df44ca658da25caf88aab5cbbf21f1ce284ec433c1624a6b042323d573ceaa1629ba1643e438aba5e709e0cd15d1088eba6fcf1c985aed256a160a6be2b6edf59a6640ac06417c325dc42b6b977cffde3d06b1c012e2be8503a27b12899c64236272e1b3db6c7ffc96f43032e991b73b53b572fe4f9a752592a6b84a7395ad239fbf45aa27de9419275f3b0e98afc631b5280b89269d2a315e65c6cf6c05209459eef4ba44fc7411b23aa0119448c095ee75b20ae25d07f86c5f089e2ad79af0aff6e724b5d0cee25dc749eb43ccb68649e32ac4af8095ca4934ceb19aa5a1f653f15eca51880d6ac30bde0e92a8eddd2487279094fe46a000d49046d0f1b75297907f575834c0b0a247216e6d9647010785df6a80a708f628f2dc7292ae6310375ba29f886278040d587aafecc40c7b77bd573177a44e344100c0507073f905c9beaba8457b4674d2753934c8f1f640759c9a32dc5191df2d8896ed1f24985e409a83a0c562949c76ee8baa7afbafa622d72afd4a79e82bab533c475bfd3b3740794b876fc9265523e9909bf5ccebc58e0bd160c138227c139a707b2b8162bd5c700be79287e2dd6f7930d22612e91272522550d258f23c9ae426ff48cb3d4aacdb34377b8e900694a229f63d6f8fa698af84c6fadc1d273be187a29c04c5764fd1b0d12220f29a9fff532447370d744e355c5aa448d3e2b0ed376d2e5e02f573cf00a595343445b7b2bf5b2629d95cd9707623e8032d5f9f9a46e1a8dabae72ef7e86dd1d960aa63b0a63aa5ba4a02845ce22616a322ec05999abbd3f1ba74147153fc666c340e733d51e0313dcb80a9c6037aaf88972ce4d8b13e3e7232d585400127d538001a89e353560e11f2c1ad05ce450210cd98bf99c4ff782511d961381b0f36f51fcf348c215118638bf6a61095e3e15cef916b2d547351e3c2852bceb7d7a13d6a80403e0507f82b609fc40d311dc9510ce680eb8cba6f8b364b84540600bc52548930cb160f91ff0790001eda83d1f0b323ac4dec9c8bea932f66dd59aca58ff6448776f01f5262367b9f5a5bd66e4c5150ff65cebf2a68cb676342f0a156185a861c51ffccb5eff3f16b26dae2039d2ca1a5c051ea32c11a8952c1952bf3b7e68b27e88689ad5f6104ca59bc98ed67a3aade326140df47b09ef3e32634ae240de6f7e4a82c64c0cedefc3c02e7faad0d35e3038322d2e8906210281d5bae7038397305471fd48673395b65ab81cfdd2f280c6655e60571222a1c4fa556a77a14dbf13948b0c385a08896b86a92b3852a61d0f5dc91c5126855b452b8da5f28d1c107a4621d6548243722c5009428331c9808d72c252c9089a03a48adf77f5eed82d40b9607b51e325923af52507aa57d00dd6c12720dcc3747094ba5494df846d70d3de9e26877af213a373d1be4c80b09dff7f21ba1b42092ecab41ee5e5029c1ca3038f5d2147b3eba8992c2fa4954f56b43504798f3399fcca05d557194a3c143ceb78e59c268b339d788900711de216cae8a228e73d6b0d67b2adeb8e00143a93157a978edbcfed4503dcb7d8206bed42f51d78a67b642aefce1981b2ff2c4e7a25eaa4bab456ad3864c065fdccfd7d4bae7eff98f6ea23144d27c5b2f8793d8b3a0fba04f74a686ff75bbf9ca661a758bf51ca27dfab4fae9b4d0ffe8949d9e21d50ece9092121bb7cc6862f654b699b9e2a08f971ea97824edd6cc294da67b5c2d3b361e5137a5088daf074df6ad1c980a0f2cc6f793913ebf88459974b18cfebe2bd598c2de589f2f86a63c8ab10461b03bc62afddbeff20fdf594f484c48e5ffea460154e49f1ec80b406b36a9ad57eaa78009600092c08a4f144ed285c08253e1479f833abea7232f4625b7500e306a4279ecf1ce9092832d1ffe5666985ccedc85c4ee760b3152982a0a3100a978f1811244552041c4f194e3d7092310d3fc07c77e58226888dee43548d09885388c916b6635972b69b240bd4567f6bf5a44944f5b9339fbeddcc0e3ffda66c53af4804351ee6889ad3324e007b05eff1eb859dc715cf6f0fcd1af7d0c1d77a02244a7f75ff3a23b39137bd99b30c8bce0d8b72703d0790e23a6bcb3fc51590cd14332ad58496e874b5e342a1c29e8e76449ce94cd4f8e4cfbd1730e6ffb44a7698f833d3eee7630117a8eaf78fd9155667e1583ea621fa1f087381376e85123740a2b7bd0a28e2d4d1548692dee0bb5435ea0c6b36283afe41004f4924faff2d2f460ae7ee78d8564f070288cfcc48df812d3ba290d2c06cead67f62b07355e8a787090a557db214c20b0e953ccfc31e16dc4958d8210a9d487ebdd37cc7466601b94fa011e25c2c6de5078d90913663cc7e653d3196e6eb4f9ba519c67d3a5497cd307250b69b426cb94a0e44283971ce36c6eff50c2b8c778b1a6e6c6848e50f543c093b30af2d294edde70d1051affcc90533cc9c62987407257a8720482a3d0d24695a602bde09f01ec3b8f290daccde48221ffcf6efd0658ff91379e73dc80ec4b8f81497701ccd05ba20d99667c775e13cf500a2efd7adc84032f97", 0x1000}, {&(0x7f0000000680)="0eaca194da448e", 0x7}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f00000006c0)="40f900edf13f31fbc910a0e832afda37ac2c8fdb7085115c101908c1a027441e81f17a4b0b90bc7f", 0x28}], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='/dev/sg#\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3c46, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x3) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x15) syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7e00, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:10 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000004) 03:26:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 31) 03:26:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) [ 222.480891][T30699] FAULT_INJECTION: forcing a failure. [ 222.480891][T30699] name failslab, interval 1, probability 0, space 0, times 0 [ 222.493525][T30699] CPU: 1 PID: 30699 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 222.501968][T30699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.512051][T30699] Call Trace: [ 222.515328][T30699] dump_stack_lvl+0xd6/0x122 [ 222.519920][T30699] dump_stack+0x11/0x1b [ 222.524075][T30699] should_fail+0x23c/0x250 [ 222.528485][T30699] ? __kernfs_new_node+0x6a/0x340 [ 222.533556][T30699] __should_failslab+0x81/0x90 [ 222.538318][T30699] should_failslab+0x5/0x20 [ 222.542889][T30699] kmem_cache_alloc+0x4f/0x320 [ 222.547731][T30699] ? __down_write_common+0x42/0x860 [ 222.552927][T30699] __kernfs_new_node+0x6a/0x340 [ 222.557918][T30699] ? up_write+0x25/0xc0 [ 222.562067][T30699] kernfs_new_node+0x5b/0xd0 [ 222.566653][T30699] __kernfs_create_file+0x45/0x1a0 [ 222.571833][T30699] sysfs_add_file_mode_ns+0x1c1/0x250 [ 222.577203][T30699] internal_create_group+0x2f4/0x860 [ 222.582565][T30699] sysfs_create_group+0x1b/0x20 [ 222.587485][T30699] loop_configure+0xc58/0xf30 [ 222.592192][T30699] lo_ioctl+0x583/0x1270 [ 222.596427][T30699] ? __rcu_read_unlock+0x5c/0x290 [ 222.601486][T30699] ? blkdev_common_ioctl+0x438/0x1120 [ 222.606917][T30699] ? do_vfs_ioctl+0x819/0x14a0 [ 222.611689][T30699] ? lo_release+0x120/0x120 [ 222.616222][T30699] blkdev_ioctl+0x20e/0x440 [ 222.620826][T30699] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 222.626279][T30699] __se_sys_ioctl+0xcb/0x140 [ 222.630919][T30699] __x64_sys_ioctl+0x3f/0x50 [ 222.635557][T30699] do_syscall_64+0x44/0xa0 [ 222.639968][T30699] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 222.645856][T30699] RIP: 0033:0x7faf9ad4e8a7 [ 222.650370][T30699] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 222.669971][T30699] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 222.678380][T30699] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 222.686386][T30699] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 222.694352][T30699] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 222.702319][T30699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 222.710289][T30699] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 222.718325][T30699] loop2: detected capacity change from 0 to 262160 03:26:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8008, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 222.726099][T30701] loop4: detected capacity change from 0 to 262160 03:26:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000c) 03:26:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xeffd, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfdef, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 32) [ 222.814282][T30714] loop4: detected capacity change from 0 to 262160 [ 222.879476][T30821] loop2: detected capacity change from 0 to 262160 [ 222.886025][T30821] FAULT_INJECTION: forcing a failure. [ 222.886025][T30821] name failslab, interval 1, probability 0, space 0, times 0 [ 222.898695][T30821] CPU: 0 PID: 30821 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 222.907125][T30821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.917166][T30821] Call Trace: [ 222.920429][T30821] dump_stack_lvl+0xd6/0x122 [ 222.925015][T30821] dump_stack+0x11/0x1b [ 222.929202][T30821] should_fail+0x23c/0x250 [ 222.933606][T30821] ? kobject_uevent_env+0x1a7/0xc40 [ 222.938785][T30821] __should_failslab+0x81/0x90 [ 222.943532][T30821] should_failslab+0x5/0x20 [ 222.948050][T30821] kmem_cache_alloc_trace+0x52/0x350 [ 222.953321][T30821] ? _printk+0x76/0x97 [ 222.957371][T30821] ? dev_uevent_filter+0x70/0x70 [ 222.962371][T30821] kobject_uevent_env+0x1a7/0xc40 [ 222.967383][T30821] kobject_uevent+0x18/0x20 [ 222.971946][T30821] loop_configure+0xd70/0xf30 [ 222.976606][T30821] lo_ioctl+0x583/0x1270 [ 222.980893][T30821] ? __rcu_read_unlock+0x5c/0x290 [ 222.985925][T30821] ? blkdev_common_ioctl+0x438/0x1120 [ 222.991286][T30821] ? do_vfs_ioctl+0x819/0x14a0 [ 222.996034][T30821] ? lo_release+0x120/0x120 [ 223.000597][T30821] blkdev_ioctl+0x20e/0x440 [ 223.005169][T30821] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 223.010628][T30821] __se_sys_ioctl+0xcb/0x140 [ 223.015212][T30821] __x64_sys_ioctl+0x3f/0x50 [ 223.019789][T30821] do_syscall_64+0x44/0xa0 [ 223.024188][T30821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 223.030079][T30821] RIP: 0033:0x7faf9ad4e8a7 [ 223.034480][T30821] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 223.054072][T30821] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.062594][T30821] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 223.070548][T30821] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:26:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 223.078522][T30821] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 223.086477][T30821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 223.094446][T30821] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:11 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32=r2, @ANYRES16], 0xfffffff0) 03:26:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000d) 03:26:11 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000005) 03:26:11 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) tee(r0, 0xffffffffffffffff, 0x400, 0x2) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) fallocate(r2, 0x11, 0x7ff, 0xd12) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x80000001) r6 = open_tree(r4, &(0x7f0000000200)='./file0\x00', 0x8000) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x7, 0x0, 0x7, 0x8, 0x0, 0x20, 0x6120, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x216}, 0x4010c, 0xff, 0x9, 0x1, 0x0, 0x82, 0x8001, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x4, r6, 0x2) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1, 0x4, 0x7, 0x3, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4dcc, 0x952876bc51c0a272, @perf_bp={&(0x7f00000000c0), 0xd}, 0x800, 0x20, 0x4, 0x1, 0x6, 0x3, 0x7, 0x0, 0x7, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r5, 0x9) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 33) [ 223.645867][T30831] loop2: detected capacity change from 0 to 262160 [ 223.652481][T30831] FAULT_INJECTION: forcing a failure. [ 223.652481][T30831] name failslab, interval 1, probability 0, space 0, times 0 [ 223.665177][T30831] CPU: 1 PID: 30831 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 223.673587][T30831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.683742][T30831] Call Trace: [ 223.687122][T30831] dump_stack_lvl+0xd6/0x122 [ 223.691737][T30831] dump_stack+0x11/0x1b [ 223.695901][T30831] should_fail+0x23c/0x250 [ 223.700312][T30831] ? kzalloc+0x1d/0x30 [ 223.704374][T30831] __should_failslab+0x81/0x90 [ 223.709194][T30831] should_failslab+0x5/0x20 [ 223.713708][T30831] __kmalloc+0x6f/0x370 [ 223.717908][T30831] kzalloc+0x1d/0x30 [ 223.721820][T30831] kobject_get_path+0x7c/0x110 [ 223.726587][T30831] kobject_uevent_env+0x1be/0xc40 [ 223.731682][T30831] kobject_uevent+0x18/0x20 [ 223.736241][T30831] loop_configure+0xd70/0xf30 [ 223.740926][T30831] lo_ioctl+0x583/0x1270 [ 223.745185][T30831] ? __rcu_read_unlock+0x5c/0x290 [ 223.750214][T30831] ? blkdev_common_ioctl+0x438/0x1120 [ 223.755679][T30831] ? do_vfs_ioctl+0x819/0x14a0 [ 223.760442][T30831] ? lo_release+0x120/0x120 [ 223.764937][T30831] blkdev_ioctl+0x20e/0x440 [ 223.769493][T30831] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 223.774949][T30831] __se_sys_ioctl+0xcb/0x140 [ 223.779538][T30831] __x64_sys_ioctl+0x3f/0x50 [ 223.784144][T30831] do_syscall_64+0x44/0xa0 [ 223.788561][T30831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 223.794527][T30831] RIP: 0033:0x7faf9ad4e8a7 [ 223.798938][T30831] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 223.818597][T30831] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 223.827004][T30831] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 223.834974][T30831] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:26:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 223.842936][T30831] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 223.850900][T30831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 223.858922][T30831] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x80040, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 223.892963][T30837] loop4: detected capacity change from 0 to 262160 03:26:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 34) [ 223.992207][T30949] loop2: detected capacity change from 0 to 262160 [ 223.998850][T30949] FAULT_INJECTION: forcing a failure. [ 223.998850][T30949] name failslab, interval 1, probability 0, space 0, times 0 [ 224.011515][T30949] CPU: 1 PID: 30949 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 224.020019][T30949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.030118][T30949] Call Trace: [ 224.033393][T30949] dump_stack_lvl+0xd6/0x122 [ 224.038071][T30949] dump_stack+0x11/0x1b [ 224.042228][T30949] should_fail+0x23c/0x250 [ 224.046923][T30949] __should_failslab+0x81/0x90 [ 224.051744][T30949] should_failslab+0x5/0x20 [ 224.056302][T30949] kmem_cache_alloc_node+0x61/0x2d0 [ 224.061496][T30949] ? __alloc_skb+0xed/0x440 [ 224.066077][T30949] __alloc_skb+0xed/0x440 [ 224.070409][T30949] alloc_uevent_skb+0x5b/0x120 [ 224.075234][T30949] kobject_uevent_env+0x863/0xc40 [ 224.080309][T30949] kobject_uevent+0x18/0x20 [ 224.084853][T30949] loop_configure+0xd70/0xf30 [ 224.089594][T30949] lo_ioctl+0x583/0x1270 [ 224.093871][T30949] ? __rcu_read_unlock+0x5c/0x290 [ 224.098931][T30949] ? blkdev_common_ioctl+0x438/0x1120 [ 224.104368][T30949] ? do_vfs_ioctl+0x819/0x14a0 [ 224.109132][T30949] ? lo_release+0x120/0x120 [ 224.113678][T30949] blkdev_ioctl+0x20e/0x440 [ 224.118197][T30949] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 224.123709][T30949] __se_sys_ioctl+0xcb/0x140 [ 224.128395][T30949] __x64_sys_ioctl+0x3f/0x50 [ 224.132985][T30949] do_syscall_64+0x44/0xa0 [ 224.137459][T30949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 224.143354][T30949] RIP: 0033:0x7faf9ad4e8a7 [ 224.147841][T30949] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 224.167444][T30949] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 224.175854][T30949] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 224.183824][T30949] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:26:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000e) 03:26:12 executing program 0: ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f00000000c0)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005580)=[{{&(0x7f0000000100), 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000180)=""/169, 0xa9}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/243, 0xf3}, {&(0x7f0000001440)=""/116, 0x74}], 0x5, &(0x7f0000001540)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}, {{&(0x7f0000001680), 0x6e, &(0x7f0000001900)=[{&(0x7f0000001700)=""/47, 0x2f}, {&(0x7f0000001740)=""/192, 0xc0}, {&(0x7f0000001800)=""/103, 0x67}, {&(0x7f0000001880)=""/71, 0x47}], 0x4, &(0x7f0000001940)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f00000019c0), 0x6e, &(0x7f0000002c00)=[{&(0x7f0000001a40)=""/28, 0x1c}, {&(0x7f0000001a80)=""/67, 0x43}, {&(0x7f0000001b00)=""/18, 0x12}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/189, 0xbd}], 0x5, &(0x7f0000002c80)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000002cc0)=@abs, 0x6e, &(0x7f0000003100)=[{&(0x7f0000002d40)=""/116, 0x74}, {&(0x7f0000002dc0)=""/103, 0x67}, {&(0x7f0000002e40)=""/250, 0xfa}, {&(0x7f0000002f40)=""/97, 0x61}, {&(0x7f0000002fc0)}, {&(0x7f0000003000)=""/10, 0xa}, {&(0x7f0000003040)=""/131, 0x83}], 0x7, &(0x7f0000003180)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f00000031c0)=""/115, 0x73}, {&(0x7f0000003240)=""/200, 0xc8}, {&(0x7f0000003340)=""/25, 0x19}, {&(0x7f0000003380)=""/188, 0xbc}], 0x4, &(0x7f0000003480)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000004640)=[{&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)}, {&(0x7f0000004500)}, {&(0x7f0000004540)=""/40, 0x28}, {&(0x7f0000004580)=""/169, 0xa9}], 0x5, &(0x7f00000046c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000004740), 0x6e, &(0x7f00000048c0)=[{&(0x7f00000047c0)=""/26, 0x1a}, {&(0x7f0000004800)=""/9, 0x9}, {&(0x7f0000004840)=""/112, 0x70}], 0x3, &(0x7f0000004900)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000004980), 0x6e, &(0x7f0000004e00)=[{&(0x7f0000004a00)=""/30, 0x1e}, {&(0x7f0000004a40)=""/238, 0xee}, {&(0x7f0000004b40)=""/241, 0xf1}, {&(0x7f0000004c40)=""/58, 0x3a}, {&(0x7f0000004c80)=""/33, 0x21}, {&(0x7f0000004cc0)=""/249, 0xf9}, {&(0x7f0000004dc0)=""/55, 0x37}], 0x7, &(0x7f0000004e80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}}, {{&(0x7f0000004f80)=@abs, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000005000)=""/39, 0x27}, {&(0x7f0000005040)=""/31, 0x1f}, {&(0x7f0000005080)=""/89, 0x59}, {&(0x7f0000005100)=""/48, 0x30}, {&(0x7f0000005140)=""/130, 0x82}, {&(0x7f0000005200)=""/104, 0x68}, {&(0x7f0000005280)=""/110, 0x6e}, {&(0x7f0000005300)=""/68, 0x44}, {&(0x7f0000005380)=""/85, 0x55}, {&(0x7f0000005400)=""/138, 0x8a}], 0xa}}], 0x9, 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f00000057c0)={0x0, 0x2, [0x4, 0x1, 0xde, 0x140000000000, 0x5, 0x18aed33]}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 224.191787][T30949] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 224.199756][T30949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 224.207724][T30949] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 224.272706][T31028] loop4: detected capacity change from 0 to 262160 03:26:12 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES16], 0xfffffff0) 03:26:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 35) 03:26:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:12 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000006) 03:26:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000f) [ 224.770512][T31061] loop2: detected capacity change from 0 to 262160 [ 224.777137][T31061] FAULT_INJECTION: forcing a failure. [ 224.777137][T31061] name failslab, interval 1, probability 0, space 0, times 0 [ 224.789768][T31061] CPU: 0 PID: 31061 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 224.798184][T31061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.808274][T31061] Call Trace: [ 224.811544][T31061] dump_stack_lvl+0xd6/0x122 [ 224.816139][T31061] dump_stack+0x11/0x1b [ 224.820355][T31061] should_fail+0x23c/0x250 [ 224.824780][T31061] __should_failslab+0x81/0x90 [ 224.829549][T31061] should_failslab+0x5/0x20 [ 224.834092][T31061] kmem_cache_alloc_node_trace+0x61/0x310 [ 224.839838][T31061] ? __kmalloc_node_track_caller+0x30/0x40 [ 224.845722][T31061] __kmalloc_node_track_caller+0x30/0x40 [ 224.851402][T31061] ? alloc_uevent_skb+0x5b/0x120 [ 224.856352][T31061] __alloc_skb+0x1a1/0x440 [ 224.860777][T31061] alloc_uevent_skb+0x5b/0x120 [ 224.865580][T31061] kobject_uevent_env+0x863/0xc40 [ 224.870623][T31061] kobject_uevent+0x18/0x20 [ 224.875126][T31061] loop_configure+0xd70/0xf30 [ 224.879808][T31061] lo_ioctl+0x583/0x1270 [ 224.884074][T31061] ? __rcu_read_unlock+0x5c/0x290 [ 224.889138][T31061] ? blkdev_common_ioctl+0x438/0x1120 [ 224.894602][T31061] ? do_vfs_ioctl+0x819/0x14a0 [ 224.899440][T31061] ? lo_release+0x120/0x120 [ 224.903943][T31061] blkdev_ioctl+0x20e/0x440 [ 224.908496][T31061] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 224.913957][T31061] __se_sys_ioctl+0xcb/0x140 03:26:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/psched\x00') getsockopt(r0, 0x5, 0x2, &(0x7f00000001c0)=""/33, &(0x7f0000000200)=0x21) timerfd_gettime(r0, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x5c, 0x0, 0x0, 0x4070bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7a}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x5}]}, 0x5c}}, 0xc088054) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r1}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x80, 0x0) 03:26:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x200008, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 224.918611][T31061] __x64_sys_ioctl+0x3f/0x50 [ 224.923246][T31061] do_syscall_64+0x44/0xa0 [ 224.927797][T31061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 224.933750][T31061] RIP: 0033:0x7faf9ad4e8a7 [ 224.938337][T31061] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 224.957965][T31061] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 224.966373][T31061] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 224.974360][T31061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 224.982330][T31061] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 224.982390][T31061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 224.982402][T31061] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 [ 224.984423][T31065] loop4: detected capacity change from 0 to 262160 03:26:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf0ff7f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 36) 03:26:13 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000007) 03:26:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='\x00') move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) preadv(r1, &(0x7f0000001100)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x7, 0x0) r2 = open(&(0x7f0000001140)='./bus/file0\x00', 0x10000, 0x2) getpeername(r2, &(0x7f0000001180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000001200)=0x80) [ 225.034724][T31065] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 225.093801][T31065] loop4: detected capacity change from 0 to 262160 [ 225.104086][T31065] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 225.127487][T31189] loop2: detected capacity change from 0 to 262160 [ 225.134094][T31189] FAULT_INJECTION: forcing a failure. [ 225.134094][T31189] name failslab, interval 1, probability 0, space 0, times 0 [ 225.146707][T31189] CPU: 0 PID: 31189 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 225.155183][T31189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.165258][T31189] Call Trace: [ 225.168533][T31189] dump_stack_lvl+0xd6/0x122 [ 225.173177][T31189] dump_stack+0x11/0x1b [ 225.177360][T31189] should_fail+0x23c/0x250 [ 225.181782][T31189] ? skb_clone+0x12c/0x1f0 [ 225.186217][T31189] __should_failslab+0x81/0x90 [ 225.191007][T31189] should_failslab+0x5/0x20 [ 225.195549][T31189] kmem_cache_alloc+0x4f/0x320 [ 225.200329][T31189] skb_clone+0x12c/0x1f0 [ 225.204577][T31189] netlink_broadcast_filtered+0x4fd/0xb60 [ 225.210303][T31189] ? skb_put+0xb9/0xf0 [ 225.214394][T31189] netlink_broadcast+0x35/0x50 [ 225.219159][T31189] kobject_uevent_env+0x8c9/0xc40 [ 225.224200][T31189] kobject_uevent+0x18/0x20 [ 225.228707][T31189] loop_configure+0xd70/0xf30 [ 225.233422][T31189] lo_ioctl+0x583/0x1270 [ 225.237661][T31189] ? __rcu_read_unlock+0x5c/0x290 [ 225.242723][T31189] ? blkdev_common_ioctl+0x438/0x1120 [ 225.248110][T31189] ? do_vfs_ioctl+0x819/0x14a0 [ 225.252880][T31189] ? lo_release+0x120/0x120 [ 225.257380][T31189] blkdev_ioctl+0x20e/0x440 [ 225.261930][T31189] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 225.267386][T31189] __se_sys_ioctl+0xcb/0x140 [ 225.271979][T31189] __x64_sys_ioctl+0x3f/0x50 [ 225.276593][T31189] do_syscall_64+0x44/0xa0 [ 225.281016][T31189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 225.286914][T31189] RIP: 0033:0x7faf9ad4e8a7 [ 225.291357][T31189] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 225.311068][T31189] RSP: 002b:00007faf98ac4f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 225.319476][T31189] RAX: ffffffffffffffda RBX: 00007faf9ad98970 RCX: 00007faf9ad4e8a7 [ 225.327441][T31189] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 225.335406][T31189] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 225.343456][T31189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 225.351460][T31189] R13: 0000000000000004 R14: 0000000020000270 R15: 0000000000000002 03:26:13 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES16], 0xfffffff0) 03:26:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000010) 03:26:13 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000008) 03:26:13 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x88000, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, @perf_config_ext, 0x0, 0x0, 0x3f, 0x7, 0x0, 0x0, 0x9}, 0x0, 0x20000000, r0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 37) 03:26:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 225.694440][T31299] loop2: detected capacity change from 0 to 262160 [ 225.701223][T31299] FAULT_INJECTION: forcing a failure. [ 225.701223][T31299] name failslab, interval 1, probability 0, space 0, times 0 [ 225.713841][T31299] CPU: 0 PID: 31299 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 225.720293][T31300] loop4: detected capacity change from 0 to 262160 [ 225.722272][T31299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.738802][T31299] Call Trace: [ 225.742071][T31299] dump_stack_lvl+0xd6/0x122 [ 225.746670][T31299] dump_stack+0x11/0x1b [ 225.750831][T31299] should_fail+0x23c/0x250 [ 225.755277][T31299] ? getname_flags+0x84/0x3f0 [ 225.759952][T31299] __should_failslab+0x81/0x90 [ 225.764793][T31299] should_failslab+0x5/0x20 [ 225.769301][T31299] kmem_cache_alloc+0x4f/0x320 [ 225.774124][T31299] getname_flags+0x84/0x3f0 [ 225.778675][T31299] __x64_sys_mkdir+0x31/0x50 [ 225.783262][T31299] do_syscall_64+0x44/0xa0 [ 225.787675][T31299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 225.793584][T31299] RIP: 0033:0x7faf9ad4dbf7 [ 225.797997][T31299] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 225.817588][T31299] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 225.826057][T31299] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 225.834012][T31299] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:26:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 225.842027][T31299] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 225.850021][T31299] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 225.857976][T31299] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) 03:26:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) 03:26:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 38) [ 225.971292][T31417] loop4: detected capacity change from 0 to 262160 [ 226.069712][T31521] loop2: detected capacity change from 0 to 262160 [ 226.078354][T31521] FAULT_INJECTION: forcing a failure. [ 226.078354][T31521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.091436][T31521] CPU: 0 PID: 31521 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 226.099894][T31521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.109984][T31521] Call Trace: [ 226.113274][T31521] dump_stack_lvl+0xd6/0x122 [ 226.117889][T31521] dump_stack+0x11/0x1b [ 226.122061][T31521] should_fail+0x23c/0x250 [ 226.126513][T31521] should_fail_usercopy+0x16/0x20 [ 226.131560][T31521] strncpy_from_user+0x21/0x250 [ 226.136485][T31521] getname_flags+0xb8/0x3f0 [ 226.140982][T31521] __x64_sys_mkdir+0x31/0x50 [ 226.145568][T31521] do_syscall_64+0x44/0xa0 [ 226.150028][T31521] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 226.155917][T31521] RIP: 0033:0x7faf9ad4dbf7 [ 226.160326][T31521] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 226.179927][T31521] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 226.188417][T31521] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 226.196387][T31521] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 226.204430][T31521] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 226.212395][T31521] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 226.220410][T31521] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:14 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES16], 0xfffffff0) 03:26:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000012) 03:26:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x2) read(r1, &(0x7f00000001c0)=""/78, 0x4e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x80, 0x1, 0x0, 0x3, 0x0, 0x1, 0x80010, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x4000, 0x5, 0x5, 0x0, 0x81, 0x7fff, 0x2, 0x0, 0x8, 0x0, 0x10001}, r2, 0xd, r0, 0x1) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:14 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000009) 03:26:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 39) [ 226.633991][T31526] loop2: detected capacity change from 0 to 262160 [ 226.644026][T31529] loop4: detected capacity change from 0 to 262160 [ 226.652389][T31526] FAULT_INJECTION: forcing a failure. [ 226.652389][T31526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.665472][T31526] CPU: 1 PID: 31526 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 226.673880][T31526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:26:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffc100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 226.683988][T31526] Call Trace: [ 226.687281][T31526] dump_stack_lvl+0xd6/0x122 [ 226.691892][T31526] dump_stack+0x11/0x1b [ 226.696054][T31526] should_fail+0x23c/0x250 [ 226.700474][T31526] should_fail_usercopy+0x16/0x20 [ 226.705669][T31526] strncpy_from_user+0x21/0x250 [ 226.710519][T31526] getname_flags+0xb8/0x3f0 [ 226.715038][T31526] __x64_sys_mkdir+0x31/0x50 [ 226.719693][T31526] do_syscall_64+0x44/0xa0 [ 226.724149][T31526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 226.730064][T31526] RIP: 0033:0x7faf9ad4dbf7 [ 226.734540][T31526] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 226.754231][T31526] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 226.762640][T31526] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 226.770609][T31526] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:26:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 226.778663][T31526] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 226.786629][T31526] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 226.794601][T31526] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 226.804058][T31529] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 03:26:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 40) 03:26:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x1, 0x4, 0x11, 0x1, 0x0, 0x5, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x21001, 0x2, 0x6, 0x4, 0x101, 0x7, 0x7, 0x0, 0x5, 0x0, 0x9}, r1, 0xf, r0, 0x2) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) wait4(r1, &(0x7f0000000180), 0x8, 0x0) 03:26:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 226.884111][T31529] loop4: detected capacity change from 0 to 262160 [ 226.896078][T31529] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 226.899197][T31646] loop2: detected capacity change from 0 to 262160 [ 226.914049][T31646] FAULT_INJECTION: forcing a failure. [ 226.914049][T31646] name failslab, interval 1, probability 0, space 0, times 0 [ 226.926705][T31646] CPU: 1 PID: 31646 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 226.935285][T31646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.945372][T31646] Call Trace: [ 226.948649][T31646] dump_stack_lvl+0xd6/0x122 [ 226.953243][T31646] dump_stack+0x11/0x1b [ 226.957398][T31646] should_fail+0x23c/0x250 [ 226.961812][T31646] ? ext4_alloc_inode+0x27/0x300 [ 226.966749][T31646] __should_failslab+0x81/0x90 [ 226.971551][T31646] ? set_qf_name+0x230/0x230 [ 226.976289][T31646] should_failslab+0x5/0x20 [ 226.980812][T31646] kmem_cache_alloc+0x4f/0x320 [ 226.985571][T31646] ? set_qf_name+0x230/0x230 [ 226.990266][T31646] ext4_alloc_inode+0x27/0x300 [ 226.995040][T31646] ? set_qf_name+0x230/0x230 [ 226.999631][T31646] new_inode_pseudo+0x38/0x190 [ 227.004396][T31646] new_inode+0x21/0x100 [ 227.008604][T31646] __ext4_new_inode+0x13f/0x2fc0 [ 227.013546][T31646] ? avc_has_perm+0xd5/0x160 [ 227.018144][T31646] ext4_mkdir+0x28a/0x760 [ 227.022521][T31646] vfs_mkdir+0x2c3/0x3e0 [ 227.026760][T31646] do_mkdirat+0x12e/0x2c0 [ 227.031129][T31646] __x64_sys_mkdir+0x40/0x50 [ 227.035717][T31646] do_syscall_64+0x44/0xa0 [ 227.040132][T31646] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 227.046026][T31646] RIP: 0033:0x7faf9ad4dbf7 [ 227.050434][T31646] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 227.070032][T31646] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 227.078453][T31646] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 227.086417][T31646] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 227.094445][T31646] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 227.102410][T31646] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 227.110369][T31646] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:15 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000013) 03:26:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8002000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 41) 03:26:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 03:26:15 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000a) [ 227.581583][T31754] loop2: detected capacity change from 0 to 262160 [ 227.593407][T31754] FAULT_INJECTION: forcing a failure. [ 227.593407][T31754] name failslab, interval 1, probability 0, space 0, times 0 [ 227.593935][T31758] loop4: detected capacity change from 0 to 262160 [ 227.606094][T31754] CPU: 0 PID: 31754 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 227.620980][T31754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.631126][T31754] Call Trace: [ 227.634401][T31754] dump_stack_lvl+0xd6/0x122 [ 227.639031][T31754] dump_stack+0x11/0x1b [ 227.643227][T31754] should_fail+0x23c/0x250 [ 227.647650][T31754] ? ext4_alloc_inode+0x27/0x300 [ 227.652582][T31754] __should_failslab+0x81/0x90 [ 227.657390][T31754] ? set_qf_name+0x230/0x230 [ 227.661981][T31754] should_failslab+0x5/0x20 [ 227.666504][T31754] kmem_cache_alloc+0x4f/0x320 [ 227.671263][T31754] ? set_qf_name+0x230/0x230 [ 227.675919][T31754] ext4_alloc_inode+0x27/0x300 [ 227.680681][T31754] ? set_qf_name+0x230/0x230 [ 227.685267][T31754] new_inode_pseudo+0x38/0x190 [ 227.690089][T31754] new_inode+0x21/0x100 [ 227.694240][T31754] __ext4_new_inode+0x13f/0x2fc0 [ 227.699202][T31754] ? avc_has_perm+0xd5/0x160 [ 227.703798][T31754] ext4_mkdir+0x28a/0x760 [ 227.708125][T31754] vfs_mkdir+0x2c3/0x3e0 [ 227.712363][T31754] do_mkdirat+0x12e/0x2c0 [ 227.716690][T31754] __x64_sys_mkdir+0x40/0x50 [ 227.721299][T31754] do_syscall_64+0x44/0xa0 [ 227.725712][T31754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 227.731604][T31754] RIP: 0033:0x7faf9ad4dbf7 [ 227.736012][T31754] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 227.755620][T31754] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 227.764059][T31754] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 227.772028][T31754] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 227.780009][T31754] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 227.788012][T31754] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 227.795977][T31754] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 42) 03:26:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8800000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x25}, {0x20}, {0x6, 0x0, 0x0, 0x7fffffff}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') [ 227.876135][T31869] loop2: detected capacity change from 0 to 262160 [ 227.891586][T31869] FAULT_INJECTION: forcing a failure. [ 227.891586][T31869] name failslab, interval 1, probability 0, space 0, times 0 [ 227.904287][T31869] CPU: 0 PID: 31869 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 227.912753][T31869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.922804][T31869] Call Trace: [ 227.926082][T31869] dump_stack_lvl+0xd6/0x122 [ 227.930682][T31869] dump_stack+0x11/0x1b [ 227.934840][T31869] should_fail+0x23c/0x250 [ 227.939286][T31869] ? jbd2__journal_start+0xf7/0x3f0 [ 227.944496][T31869] __should_failslab+0x81/0x90 [ 227.949247][T31869] should_failslab+0x5/0x20 [ 227.953754][T31869] kmem_cache_alloc+0x4f/0x320 [ 227.958517][T31869] ? find_group_orlov+0x52d/0x840 [ 227.963532][T31869] jbd2__journal_start+0xf7/0x3f0 [ 227.968545][T31869] __ext4_journal_start_sb+0x159/0x310 [ 227.974016][T31869] __ext4_new_inode+0xd95/0x2fc0 [ 227.978946][T31869] ext4_mkdir+0x28a/0x760 [ 227.983342][T31869] vfs_mkdir+0x2c3/0x3e0 [ 227.987626][T31869] do_mkdirat+0x12e/0x2c0 [ 227.991961][T31869] __x64_sys_mkdir+0x40/0x50 [ 227.996585][T31869] do_syscall_64+0x44/0xa0 [ 228.001032][T31869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 228.006934][T31869] RIP: 0033:0x7faf9ad4dbf7 [ 228.011330][T31869] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 228.030918][T31869] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 228.039349][T31869] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 228.047305][T31869] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 228.055306][T31869] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 228.063291][T31869] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 03:26:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 43) [ 228.071283][T31869] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 228.079354][T31869] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory 03:26:16 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000b) [ 228.141980][T31979] loop2: detected capacity change from 0 to 262160 [ 228.163565][T31979] FAULT_INJECTION: forcing a failure. [ 228.163565][T31979] name failslab, interval 1, probability 0, space 0, times 0 [ 228.176241][T31979] CPU: 1 PID: 31979 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 228.184650][T31979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.194689][T31979] Call Trace: [ 228.197951][T31979] dump_stack_lvl+0xd6/0x122 [ 228.202563][T31979] dump_stack+0x11/0x1b [ 228.206746][T31979] should_fail+0x23c/0x250 [ 228.211167][T31979] ? sidtab_sid2str_get+0xb0/0x140 [ 228.216306][T31979] __should_failslab+0x81/0x90 [ 228.221096][T31979] should_failslab+0x5/0x20 [ 228.225648][T31979] __kmalloc_track_caller+0x6d/0x370 [ 228.230930][T31979] kmemdup+0x21/0x50 [ 228.234896][T31979] sidtab_sid2str_get+0xb0/0x140 [ 228.239825][T31979] security_sid_to_context_core+0x1d0/0x2d0 [ 228.245777][T31979] security_sid_to_context_force+0x2f/0x40 [ 228.251582][T31979] selinux_inode_init_security+0x4e4/0x590 [ 228.257383][T31979] security_inode_init_security+0xe4/0x260 [ 228.263283][T31979] ? ext4_init_security+0x40/0x40 [ 228.268290][T31979] ext4_init_security+0x30/0x40 [ 228.273124][T31979] __ext4_new_inode+0x29a3/0x2fc0 [ 228.278149][T31979] ext4_mkdir+0x28a/0x760 [ 228.282519][T31979] vfs_mkdir+0x2c3/0x3e0 [ 228.286762][T31979] do_mkdirat+0x12e/0x2c0 [ 228.291095][T31979] __x64_sys_mkdir+0x40/0x50 [ 228.295677][T31979] do_syscall_64+0x44/0xa0 [ 228.300094][T31979] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 228.305970][T31979] RIP: 0033:0x7faf9ad4dbf7 [ 228.310366][T31979] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 228.329958][T31979] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 228.338413][T31979] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 228.346379][T31979] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 228.354388][T31979] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 228.362343][T31979] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 228.370309][T31979] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:16 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="bdebddd9ae128cfc5d3366ec38e7df1a1e68d787a6c17769610229ff66982add5d74c1942134a594bc0df6fec498fc5d6d0d6e0fab3d7571006fd0d18d9b36daf65711b4bb958727eb87a0952642a7741344479d0bfa9eee1d01b9cda577948edb6eba8fda34a937ef5651dcb977bb0f3966096acd84be4ef99fe6a3c0173ec761347a9ecc11c61c1c5070b3a690b58d8f", 0x91, 0x4000, &(0x7f00000001c0)={0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1f}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x26000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000014) 03:26:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 44) 03:26:16 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000c) [ 228.804925][T31989] loop2: detected capacity change from 0 to 262160 [ 228.813749][T31987] loop4: detected capacity change from 0 to 262160 [ 228.834797][T31989] FAULT_INJECTION: forcing a failure. [ 228.834797][T31989] name failslab, interval 1, probability 0, space 0, times 0 03:26:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 228.847490][T31989] CPU: 0 PID: 31989 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 228.855904][T31989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.865952][T31989] Call Trace: [ 228.869224][T31989] dump_stack_lvl+0xd6/0x122 [ 228.873881][T31989] dump_stack+0x11/0x1b [ 228.878063][T31989] should_fail+0x23c/0x250 [ 228.882477][T31989] ? kcalloc+0x32/0x50 [ 228.886543][T31989] __should_failslab+0x81/0x90 [ 228.891366][T31989] should_failslab+0x5/0x20 [ 228.895908][T31989] __kmalloc+0x6f/0x370 [ 228.900055][T31989] ? __crc32c_le_base+0x250/0x350 [ 228.905087][T31989] kcalloc+0x32/0x50 [ 228.909039][T31989] ext4_find_extent+0x21c/0x7f0 [ 228.913902][T31989] ext4_ext_map_blocks+0x115/0x20a0 [ 228.919123][T31989] ? ext4_es_lookup_extent+0x221/0x500 [ 228.924593][T31989] ext4_map_blocks+0x1cf/0xf00 [ 228.929353][T31989] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 228.935019][T31989] ext4_getblk+0xc6/0x3e0 [ 228.939348][T31989] ext4_bread+0x28/0x100 [ 228.943602][T31989] ext4_append+0xd1/0x1c0 [ 228.947935][T31989] ext4_init_new_dir+0x177/0x500 [ 228.952898][T31989] ext4_mkdir+0x329/0x760 [ 228.957236][T31989] vfs_mkdir+0x2c3/0x3e0 [ 228.961481][T31989] do_mkdirat+0x12e/0x2c0 [ 228.965897][T31989] __x64_sys_mkdir+0x40/0x50 [ 228.970507][T31989] do_syscall_64+0x44/0xa0 [ 228.974977][T31989] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 228.980894][T31989] RIP: 0033:0x7faf9ad4dbf7 [ 228.985387][T31989] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 229.005094][T31989] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 229.013508][T31989] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 229.021519][T31989] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 229.029569][T31989] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 229.037534][T31989] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 229.045498][T31989] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000015) 03:26:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 45) 03:26:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x40000800, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:17 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r1 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x2f, 0x24, 0x8, 0x0, 0xe6ae, 0x9028, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x4}, 0xb012, 0x2, 0x8, 0x2, 0x3f, 0x7f, 0x401, 0x0, 0x80, 0x0, 0x6}, r1, 0x80003, r0, 0x8) r2 = fsmount(0xffffffffffffffff, 0x0, 0xd4) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xff, 0x68, 0x7f, 0x6, 0x0, 0x8, 0xd4258, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x80}, 0x40480, 0x6, 0x31ac452e, 0x8, 0x400000000000000, 0x4, 0x1, 0x0, 0x5, 0x0, 0x51}, 0xffffffffffffffff, 0x0, r2, 0x5) [ 229.148764][T32107] loop2: detected capacity change from 0 to 262160 [ 229.169654][T32110] loop4: detected capacity change from 0 to 262160 [ 229.176709][T32107] FAULT_INJECTION: forcing a failure. [ 229.176709][T32107] name failslab, interval 1, probability 0, space 0, times 0 [ 229.189332][T32107] CPU: 1 PID: 32107 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 229.197802][T32107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.207917][T32107] Call Trace: [ 229.211190][T32107] dump_stack_lvl+0xd6/0x122 [ 229.215821][T32107] dump_stack+0x11/0x1b [ 229.219975][T32107] should_fail+0x23c/0x250 [ 229.224451][T32107] ? kcalloc+0x32/0x50 [ 229.228572][T32107] __should_failslab+0x81/0x90 [ 229.233396][T32107] should_failslab+0x5/0x20 [ 229.237899][T32107] __kmalloc+0x6f/0x370 [ 229.242067][T32107] ? __crc32c_le_base+0x250/0x350 [ 229.247121][T32107] kcalloc+0x32/0x50 [ 229.251010][T32107] ext4_find_extent+0x21c/0x7f0 [ 229.255870][T32107] ext4_ext_map_blocks+0x115/0x20a0 [ 229.261116][T32107] ? ext4_es_lookup_extent+0x221/0x500 [ 229.266582][T32107] ext4_map_blocks+0x1cf/0xf00 [ 229.271392][T32107] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 229.277051][T32107] ext4_getblk+0xc6/0x3e0 [ 229.281374][T32107] ext4_bread+0x28/0x100 [ 229.285665][T32107] ext4_append+0xd1/0x1c0 [ 229.289991][T32107] ext4_init_new_dir+0x177/0x500 [ 229.295007][T32107] ext4_mkdir+0x329/0x760 [ 229.299336][T32107] vfs_mkdir+0x2c3/0x3e0 [ 229.303574][T32107] do_mkdirat+0x12e/0x2c0 [ 229.307904][T32107] __x64_sys_mkdir+0x40/0x50 [ 229.312490][T32107] do_syscall_64+0x44/0xa0 [ 229.316910][T32107] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 229.322823][T32107] RIP: 0033:0x7faf9ad4dbf7 [ 229.327248][T32107] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 229.346879][T32107] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 229.355328][T32107] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 229.363371][T32107] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 229.371336][T32107] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 229.379299][T32107] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 229.387266][T32107] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:18 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x4480, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000240)={0x2, {0x2, 0x8, 0x7fff, 0xfff9, 0x8}}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000}, 0x441c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x6) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7f, 0x0, 0x40, 0x7, 0x0, 0x1, 0x1020, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef2, 0x1, @perf_bp={&(0x7f0000000100)}, 0x10040, 0x3, 0x1, 0x0, 0x47, 0xc28, 0x0, 0x0, 0x5, 0x0, 0x100000001}, r1, 0x1, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) mknod(&(0x7f00000000c0)='./file0\x00', 0x10, 0x10001) 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x70000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000016) 03:26:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 46) 03:26:18 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000d) 03:26:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) [ 229.946312][T32223] loop2: detected capacity change from 0 to 262160 [ 229.947577][ T23] audit: type=1400 audit(1635823578.061:1572): avc: denied { append } for pid=32219 comm="syz-executor.0" name="hwrng" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 229.957907][T32223] FAULT_INJECTION: forcing a failure. [ 229.957907][T32223] name failslab, interval 1, probability 0, space 0, times 0 [ 229.989224][T32223] CPU: 1 PID: 32223 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 229.997653][T32223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.007708][T32223] Call Trace: [ 230.011001][T32223] dump_stack_lvl+0xd6/0x122 [ 230.015598][T32223] dump_stack+0x11/0x1b [ 230.019775][T32223] should_fail+0x23c/0x250 [ 230.024276][T32223] ? kcalloc+0x32/0x50 [ 230.028358][T32223] __should_failslab+0x81/0x90 [ 230.033120][T32223] should_failslab+0x5/0x20 [ 230.037638][T32223] __kmalloc+0x6f/0x370 [ 230.041897][T32223] kcalloc+0x32/0x50 [ 230.045875][T32223] ext4_find_extent+0x21c/0x7f0 [ 230.050777][T32223] ? kfree+0xf8/0x1f0 [ 230.054826][T32223] ext4_ext_map_blocks+0x115/0x20a0 [ 230.057841][T32232] loop5: detected capacity change from 0 to 262160 [ 230.060029][T32223] ext4_map_blocks+0x71e/0xf00 [ 230.060049][T32223] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 230.060068][T32223] ext4_getblk+0xc6/0x3e0 [ 230.081203][T32223] ext4_bread+0x28/0x100 [ 230.085528][T32223] ext4_append+0xd1/0x1c0 [ 230.089892][T32223] ext4_init_new_dir+0x177/0x500 [ 230.094838][T32223] ext4_mkdir+0x329/0x760 [ 230.099168][T32223] vfs_mkdir+0x2c3/0x3e0 [ 230.103410][T32223] do_mkdirat+0x12e/0x2c0 [ 230.107739][T32223] __x64_sys_mkdir+0x40/0x50 [ 230.112357][T32223] do_syscall_64+0x44/0xa0 [ 230.116807][T32223] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 230.122695][T32223] RIP: 0033:0x7faf9ad4dbf7 [ 230.127120][T32223] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7e000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 230.146767][T32223] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 230.155202][T32223] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 230.163260][T32223] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 230.171263][T32223] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 230.179270][T32223] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 230.187308][T32223] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 230.196555][T32229] loop4: detected capacity change from 0 to 262160 [ 230.206974][T32229] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 03:26:18 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 47) 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7ffff000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x61421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda4af2178dd2c50c, @perf_config_ext, 0x4381, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 230.306710][T32343] FAULT_INJECTION: forcing a failure. [ 230.306710][T32343] name failslab, interval 1, probability 0, space 0, times 0 [ 230.319371][T32343] CPU: 0 PID: 32343 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 230.327792][T32343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.337837][T32343] Call Trace: [ 230.341147][T32343] dump_stack_lvl+0xd6/0x122 [ 230.345840][T32343] dump_stack+0x11/0x1b [ 230.349998][T32343] should_fail+0x23c/0x250 [ 230.354430][T32343] ? alloc_pipe_info+0xac/0x350 [ 230.359298][T32343] __should_failslab+0x81/0x90 [ 230.364130][T32343] should_failslab+0x5/0x20 [ 230.368792][T32343] kmem_cache_alloc_trace+0x52/0x350 [ 230.374103][T32343] ? __pagevec_lru_add+0x243/0x270 [ 230.379211][T32343] alloc_pipe_info+0xac/0x350 [ 230.383997][T32343] splice_direct_to_actor+0x5f7/0x650 [ 230.389366][T32343] ? security_file_permission+0x7c/0xa0 [ 230.394960][T32343] ? do_splice_direct+0x190/0x190 [ 230.399991][T32343] ? security_file_permission+0x87/0xa0 [ 230.405591][T32343] do_splice_direct+0x106/0x190 [ 230.410636][T32343] do_sendfile+0x675/0xc40 [ 230.415049][T32343] __x64_sys_sendfile64+0x102/0x140 [ 230.420252][T32343] do_syscall_64+0x44/0xa0 [ 230.424670][T32343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 230.430577][T32343] RIP: 0033:0x7f1c59bd0ae9 [ 230.435014][T32343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xeffdffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:18 executing program 0: clone3(&(0x7f00000005c0)={0x10000100, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0, {0xa}, &(0x7f0000000500)=""/2, 0x2, &(0x7f0000000540)=""/50, &(0x7f0000000580)=[0x0], 0x1}, 0x58) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff8}, r0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 230.454605][T32343] RSP: 002b:00007f1c57947188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 230.462996][T32343] RAX: ffffffffffffffda RBX: 00007f1c59ce3f60 RCX: 00007f1c59bd0ae9 [ 230.470949][T32343] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 230.478977][T32343] RBP: 00007f1c579471d0 R08: 0000000000000000 R09: 0000000000000000 [ 230.486947][T32343] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 230.494899][T32343] R13: 00007ffda6706acf R14: 00007f1c57947300 R15: 0000000000022000 [ 230.506691][T32342] loop2: detected capacity change from 0 to 262160 [ 230.528400][T32342] FAULT_INJECTION: forcing a failure. [ 230.528400][T32342] name failslab, interval 1, probability 0, space 0, times 0 [ 230.541110][T32342] CPU: 0 PID: 32342 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 230.549560][T32342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.559606][T32342] Call Trace: [ 230.562871][T32342] dump_stack_lvl+0xd6/0x122 [ 230.567464][T32342] dump_stack+0x11/0x1b [ 230.571674][T32342] should_fail+0x23c/0x250 [ 230.576105][T32342] ? ext4_mb_new_blocks+0x328/0x1ee0 [ 230.581467][T32342] __should_failslab+0x81/0x90 [ 230.586230][T32342] should_failslab+0x5/0x20 [ 230.590850][T32342] kmem_cache_alloc+0x4f/0x320 [ 230.595611][T32342] ext4_mb_new_blocks+0x328/0x1ee0 [ 230.600717][T32342] ? kcalloc+0x32/0x50 [ 230.604778][T32342] ? ext4_find_extent+0x6cf/0x7f0 [ 230.609800][T32342] ? ext4_ext_search_right+0x300/0x540 [ 230.615257][T32342] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 230.621042][T32342] ext4_ext_map_blocks+0x15f4/0x20a0 [ 230.626331][T32342] ext4_map_blocks+0x71e/0xf00 [ 230.631090][T32342] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 230.636716][T32342] ext4_getblk+0xc6/0x3e0 [ 230.641042][T32342] ext4_bread+0x28/0x100 [ 230.645279][T32342] ext4_append+0xd1/0x1c0 [ 230.649619][T32342] ext4_init_new_dir+0x177/0x500 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 230.654577][T32342] ext4_mkdir+0x329/0x760 [ 230.659029][T32342] vfs_mkdir+0x2c3/0x3e0 [ 230.663265][T32342] do_mkdirat+0x12e/0x2c0 [ 230.667600][T32342] __x64_sys_mkdir+0x40/0x50 [ 230.672241][T32342] do_syscall_64+0x44/0xa0 [ 230.676666][T32342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 230.682560][T32342] RIP: 0033:0x7faf9ad4dbf7 [ 230.686966][T32342] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 230.706593][T32342] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 230.715054][T32342] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 230.723090][T32342] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 230.731099][T32342] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 230.739063][T32342] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 230.747070][T32342] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 230.755954][T32225] loop4: detected capacity change from 0 to 262160 03:26:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 48) 03:26:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:18 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000000f) 03:26:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000017) 03:26:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8a, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="af05d4025e9509ab5fe074a5fd0af57cb4b918f9d43db10b0a3454232da6017e62b704eaf04756d00b9843d0fb9a437e857c846c8e48b3a0a4c537068aef160ef13894c3ad9ec7262542d243089955f8f6d0e0fad94f6200ac98b2ea27277ada8c7886d2e529271b94b2056188d13f618e07dbc41de306e013c24f7558170c4820e635a2f9f11807d4c7c035382e60528f0da28a96437d10028c8107b40a56c5ab3a6af6b95e829c48af16812c6abc1f26caeaf4f84d42d9d1f60cf9ccc14bad896778348bfa6f6d9c95", 0xca, 0x98}, {&(0x7f0000000240)="ad5b52ea9332501fb81c188402fa4662b63c61657f9c14c53558ad28e0163d6fc1db95d830df0cd28bb623960238e24d99d3c4d0d895dafd01a412271e69304ecd2c437081f7339df408fd15cfa3911763d2b2661aed9ab9a79b9f081249d4dc4a913bcd47b9930449cb15ef81fd", 0x6e, 0x5}], 0xc0008, &(0x7f0000000300)={[{@uid={'uid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x38, 0x33, 0x39]}}], [{@dont_hash}]}) unlinkat(r0, &(0x7f0000000340)='./file0\x00', 0x0) [ 230.813185][T32225] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 230.872233][T32459] loop2: detected capacity change from 0 to 262160 [ 230.879071][T32459] FAULT_INJECTION: forcing a failure. [ 230.879071][T32459] name failslab, interval 1, probability 0, space 0, times 0 [ 230.891748][T32459] CPU: 1 PID: 32459 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 230.900280][T32459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.910331][T32459] Call Trace: [ 230.913694][T32459] dump_stack_lvl+0xd6/0x122 [ 230.918287][T32459] dump_stack+0x11/0x1b [ 230.922448][T32459] should_fail+0x23c/0x250 [ 230.926864][T32459] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 230.932225][T32459] __should_failslab+0x81/0x90 [ 230.937030][T32459] should_failslab+0x5/0x20 [ 230.941532][T32459] kmem_cache_alloc+0x4f/0x320 [ 230.946410][T32459] ext4_mb_new_blocks+0x73e/0x1ee0 [ 230.951519][T32459] ? kcalloc+0x32/0x50 [ 230.955579][T32459] ? ext4_find_extent+0x6cf/0x7f0 [ 230.960653][T32459] ? ext4_ext_search_right+0x300/0x540 [ 230.966120][T32459] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 230.971888][T32459] ext4_ext_map_blocks+0x15f4/0x20a0 [ 230.977182][T32459] ext4_map_blocks+0x71e/0xf00 [ 230.981936][T32459] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 230.987610][T32459] ext4_getblk+0xc6/0x3e0 [ 230.991943][T32459] ext4_bread+0x28/0x100 [ 230.996179][T32459] ext4_append+0xd1/0x1c0 [ 231.000540][T32459] ext4_init_new_dir+0x177/0x500 [ 231.005518][T32459] ext4_mkdir+0x329/0x760 [ 231.009850][T32459] vfs_mkdir+0x2c3/0x3e0 [ 231.014091][T32459] do_mkdirat+0x12e/0x2c0 [ 231.018417][T32459] __x64_sys_mkdir+0x40/0x50 [ 231.023105][T32459] do_syscall_64+0x44/0xa0 [ 231.027514][T32459] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 231.033465][T32459] RIP: 0033:0x7faf9ad4dbf7 [ 231.037876][T32459] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.057491][T32459] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 231.065895][T32459] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 231.073866][T32459] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 231.081872][T32459] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 231.089836][T32459] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 231.097801][T32459] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 231.164710][T32560] loop4: detected capacity change from 0 to 262160 03:26:19 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 2) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffdef, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 49) 03:26:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000000c0)) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 231.243946][T32569] loop2: detected capacity change from 0 to 262160 [ 231.257697][T32569] FAULT_INJECTION: forcing a failure. [ 231.257697][T32569] name failslab, interval 1, probability 0, space 0, times 0 [ 231.270422][T32569] CPU: 1 PID: 32569 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 231.278870][T32569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.288918][T32569] Call Trace: [ 231.292192][T32569] dump_stack_lvl+0xd6/0x122 [ 231.296783][T32569] dump_stack+0x11/0x1b [ 231.300978][T32569] should_fail+0x23c/0x250 [ 231.305439][T32569] ? __es_insert_extent+0x546/0xe80 [ 231.310697][T32569] __should_failslab+0x81/0x90 [ 231.315529][T32569] should_failslab+0x5/0x20 [ 231.320026][T32569] kmem_cache_alloc+0x4f/0x320 [ 231.324792][T32569] __es_insert_extent+0x546/0xe80 [ 231.329825][T32569] ? ext4_ext_map_blocks+0x1128/0x20a0 [ 231.335329][T32569] ext4_es_insert_extent+0x1cb/0x19c0 [ 231.340790][T32569] ext4_map_blocks+0xa5d/0xf00 [ 231.345587][T32569] ext4_getblk+0xc6/0x3e0 [ 231.349911][T32569] ext4_bread+0x28/0x100 [ 231.354145][T32569] ext4_append+0xd1/0x1c0 [ 231.358473][T32569] ext4_init_new_dir+0x177/0x500 [ 231.363526][T32569] ext4_mkdir+0x329/0x760 [ 231.367901][T32569] vfs_mkdir+0x2c3/0x3e0 [ 231.372135][T32569] do_mkdirat+0x12e/0x2c0 [ 231.376561][T32569] __x64_sys_mkdir+0x40/0x50 [ 231.381182][T32569] do_syscall_64+0x44/0xa0 [ 231.385641][T32569] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 231.391611][T32569] RIP: 0033:0x7faf9ad4dbf7 [ 231.396014][T32569] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.415615][T32569] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 231.424019][T32569] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 231.431983][T32569] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:26:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000018) [ 231.439958][T32569] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 231.447968][T32569] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 231.455936][T32569] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 231.475246][T32580] FAULT_INJECTION: forcing a failure. [ 231.475246][T32580] name failslab, interval 1, probability 0, space 0, times 0 [ 231.487866][T32580] CPU: 0 PID: 32580 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 231.496277][T32580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.506380][T32580] Call Trace: [ 231.509645][T32580] dump_stack_lvl+0xd6/0x122 [ 231.514229][T32580] dump_stack+0x11/0x1b [ 231.518370][T32580] should_fail+0x23c/0x250 [ 231.522824][T32580] ? kcalloc+0x32/0x40 [ 231.526892][T32580] __should_failslab+0x81/0x90 [ 231.531643][T32580] should_failslab+0x5/0x20 [ 231.536229][T32580] __kmalloc+0x6f/0x370 [ 231.540423][T32580] ? kmem_cache_alloc_trace+0x24b/0x350 [ 231.545954][T32580] kcalloc+0x32/0x40 [ 231.549869][T32580] alloc_pipe_info+0x1be/0x350 [ 231.554687][T32580] splice_direct_to_actor+0x5f7/0x650 [ 231.560045][T32580] ? security_file_permission+0x7c/0xa0 [ 231.565579][T32580] ? do_splice_direct+0x190/0x190 [ 231.570650][T32580] ? security_file_permission+0x87/0xa0 [ 231.576182][T32580] do_splice_direct+0x106/0x190 [ 231.581017][T32580] do_sendfile+0x675/0xc40 [ 231.585418][T32580] __x64_sys_sendfile64+0x102/0x140 [ 231.590707][T32580] do_syscall_64+0x44/0xa0 [ 231.595167][T32580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 231.601048][T32580] RIP: 0033:0x7f1c59bd0ae9 [ 231.605447][T32580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.625040][T32580] RSP: 002b:00007f1c57947188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 231.633439][T32580] RAX: ffffffffffffffda RBX: 00007f1c59ce3f60 RCX: 00007f1c59bd0ae9 03:26:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 50) [ 231.641395][T32580] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 231.649365][T32580] RBP: 00007f1c579471d0 R08: 0000000000000000 R09: 0000000000000000 [ 231.657333][T32580] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 231.665346][T32580] R13: 00007ffda6706acf R14: 00007f1c57947300 R15: 0000000000022000 03:26:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 231.721636][T32681] loop4: detected capacity change from 0 to 262160 [ 231.737288][T32683] loop2: detected capacity change from 0 to 262160 [ 231.746736][T32683] FAULT_INJECTION: forcing a failure. [ 231.746736][T32683] name failslab, interval 1, probability 0, space 0, times 0 [ 231.759383][T32683] CPU: 0 PID: 32683 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 231.767845][T32683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.777893][T32683] Call Trace: [ 231.781169][T32683] dump_stack_lvl+0xd6/0x122 [ 231.785771][T32683] dump_stack+0x11/0x1b [ 231.790250][T32683] should_fail+0x23c/0x250 [ 231.794667][T32683] ? jbd2_journal_add_journal_head+0x6c/0x3a0 [ 231.800749][T32683] __should_failslab+0x81/0x90 [ 231.805543][T32683] should_failslab+0x5/0x20 [ 231.810142][T32683] kmem_cache_alloc+0x4f/0x320 [ 231.814903][T32683] jbd2_journal_add_journal_head+0x6c/0x3a0 [ 231.820837][T32683] jbd2_journal_get_create_access+0x2c/0x290 [ 231.826817][T32683] __ext4_journal_get_create_access+0x65/0x320 [ 231.832973][T32683] ext4_getblk+0x22b/0x3e0 [ 231.837389][T32683] ext4_bread+0x28/0x100 [ 231.841630][T32683] ext4_append+0xd1/0x1c0 [ 231.845984][T32683] ext4_init_new_dir+0x177/0x500 [ 231.850913][T32683] ext4_mkdir+0x329/0x760 [ 231.855248][T32683] vfs_mkdir+0x2c3/0x3e0 [ 231.859501][T32683] do_mkdirat+0x12e/0x2c0 [ 231.863907][T32683] __x64_sys_mkdir+0x40/0x50 [ 231.868495][T32683] do_syscall_64+0x44/0xa0 [ 231.872947][T32683] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 231.878838][T32683] RIP: 0033:0x7faf9ad4dbf7 [ 231.883253][T32683] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 231.903065][T32683] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 231.911555][T32683] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4dbf7 [ 231.919527][T32683] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 231.927523][T32683] RBP: 00007faf98ac5040 R08: 0000000000000000 R09: ffffffffffffffff [ 231.935585][T32683] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000040 [ 231.943580][T32683] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 231.951580][T32683] ENOMEM in journal_alloc_journal_head, retrying. 03:26:20 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000010) 03:26:20 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000000c0)=""/83, 0x53, 0x40) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:20 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 3) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 51) 03:26:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7ffffffff000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000019) 03:26:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) wait4(0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000100)) 03:26:20 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000011) 03:26:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x800800000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 232.386624][ T335] loop2: detected capacity change from 0 to 262160 [ 232.397695][ T339] loop4: detected capacity change from 0 to 262160 [ 232.411542][ T335] FAULT_INJECTION: forcing a failure. [ 232.411542][ T335] name failslab, interval 1, probability 0, space 0, times 0 [ 232.424191][ T335] CPU: 1 PID: 335 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 03:26:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001580)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f00000015c0)=0x3) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 232.432432][ T335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.442553][ T335] Call Trace: [ 232.445825][ T335] dump_stack_lvl+0xd6/0x122 [ 232.450418][ T335] dump_stack+0x11/0x1b [ 232.454614][ T335] should_fail+0x23c/0x250 [ 232.459043][ T335] ? __se_sys_mount+0x4e/0x2f0 [ 232.463801][ T335] __should_failslab+0x81/0x90 [ 232.468568][ T335] should_failslab+0x5/0x20 [ 232.473145][ T335] __kmalloc_track_caller+0x6d/0x370 [ 232.478473][ T335] ? debug_smp_processor_id+0x18/0x20 03:26:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x400, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 232.483850][ T335] ? perf_trace_kmem_cache_free+0x5a/0x150 [ 232.489687][ T335] ? strnlen_user+0x137/0x1c0 [ 232.494459][ T335] strndup_user+0x73/0x120 [ 232.498959][ T335] __se_sys_mount+0x4e/0x2f0 [ 232.503554][ T335] ? debug_smp_processor_id+0x18/0x20 [ 232.508971][ T335] __x64_sys_mount+0x63/0x70 [ 232.513555][ T335] do_syscall_64+0x44/0xa0 [ 232.517967][ T335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 232.523863][ T335] RIP: 0033:0x7faf9ad5001a 03:26:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 232.528292][ T335] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.547925][ T335] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 232.556331][ T335] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 232.564299][ T335] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 232.572268][ T335] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 03:26:20 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 232.580325][ T335] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 232.588290][ T335] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 232.630764][ T605] FAULT_INJECTION: forcing a failure. [ 232.630764][ T605] name failslab, interval 1, probability 0, space 0, times 0 [ 232.643476][ T605] CPU: 1 PID: 605 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 232.651710][ T605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.661763][ T605] Call Trace: [ 232.665042][ T605] dump_stack_lvl+0xd6/0x122 [ 232.669704][ T605] dump_stack+0x11/0x1b [ 232.673884][ T605] should_fail+0x23c/0x250 [ 232.678297][ T605] ? kmalloc_array+0x2d/0x40 [ 232.682884][ T605] __should_failslab+0x81/0x90 [ 232.687691][ T605] should_failslab+0x5/0x20 [ 232.692200][ T605] __kmalloc+0x6f/0x370 [ 232.696351][ T605] kmalloc_array+0x2d/0x40 [ 232.700823][ T605] iter_file_splice_write+0xd5/0x790 [ 232.706109][ T605] ? atime_needs_update+0x2ba/0x390 [ 232.711305][ T605] ? touch_atime+0x11f/0x2e0 [ 232.715890][ T605] ? generic_file_splice_read+0x2a9/0x330 [ 232.721653][ T605] ? splice_from_pipe+0xd0/0xd0 [ 232.726497][ T605] direct_splice_actor+0x80/0xa0 [ 232.731482][ T605] splice_direct_to_actor+0x345/0x650 [ 232.736873][ T605] ? do_splice_direct+0x190/0x190 [ 232.741896][ T605] do_splice_direct+0x106/0x190 [ 232.746762][ T605] do_sendfile+0x675/0xc40 [ 232.751175][ T605] __x64_sys_sendfile64+0x102/0x140 [ 232.756369][ T605] do_syscall_64+0x44/0xa0 [ 232.760852][ T605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 232.766806][ T605] RIP: 0033:0x7f1c59bd0ae9 [ 232.771290][ T605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 232.790888][ T605] RSP: 002b:00007f1c57947188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 232.799295][ T605] RAX: ffffffffffffffda RBX: 00007f1c59ce3f60 RCX: 00007f1c59bd0ae9 [ 232.807301][ T605] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 232.815316][ T605] RBP: 00007f1c579471d0 R08: 0000000000000000 R09: 0000000000000000 [ 232.823297][ T605] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 232.831266][ T605] R13: 00007ffda6706acf R14: 00007f1c57947300 R15: 0000000000022000 03:26:21 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 4) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 52) 03:26:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001a) 03:26:21 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000201) [ 233.256269][ T713] loop2: detected capacity change from 0 to 262160 [ 233.271642][ T713] FAULT_INJECTION: forcing a failure. [ 233.271642][ T713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.284773][ T713] CPU: 0 PID: 713 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 233.293167][ T713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.298994][ T714] loop4: detected capacity change from 0 to 262160 [ 233.303275][ T713] Call Trace: [ 233.303284][ T713] dump_stack_lvl+0xd6/0x122 [ 233.303318][ T713] dump_stack+0x11/0x1b [ 233.303343][ T713] should_fail+0x23c/0x250 [ 233.303363][ T713] should_fail_usercopy+0x16/0x20 [ 233.331257][ T713] _copy_from_user+0x1c/0xd0 [ 233.335876][ T713] strndup_user+0xb0/0x120 [ 233.340362][ T713] __se_sys_mount+0x4e/0x2f0 [ 233.344950][ T713] ? __this_cpu_preempt_check+0x18/0x20 [ 233.350557][ T713] ? switch_fpu_return+0xc9/0x190 [ 233.355661][ T713] __x64_sys_mount+0x63/0x70 [ 233.360271][ T713] do_syscall_64+0x44/0xa0 [ 233.364760][ T713] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 233.370649][ T713] RIP: 0033:0x7faf9ad5001a [ 233.375093][ T713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.394699][ T713] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.403136][ T713] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 233.411115][ T713] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 233.419085][ T713] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 233.427051][ T713] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 233.435089][ T713] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 233.452532][ T717] FAULT_INJECTION: forcing a failure. [ 233.452532][ T717] name failslab, interval 1, probability 0, space 0, times 0 [ 233.465188][ T717] CPU: 0 PID: 717 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 233.473457][ T717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.483492][ T717] Call Trace: [ 233.486751][ T717] dump_stack_lvl+0xd6/0x122 [ 233.491400][ T717] dump_stack+0x11/0x1b [ 233.495545][ T717] should_fail+0x23c/0x250 [ 233.499960][ T717] ? jbd2__journal_start+0xf7/0x3f0 [ 233.505141][ T717] __should_failslab+0x81/0x90 [ 233.509893][ T717] should_failslab+0x5/0x20 [ 233.514381][ T717] kmem_cache_alloc+0x4f/0x320 [ 233.519131][ T717] jbd2__journal_start+0xf7/0x3f0 [ 233.524240][ T717] __ext4_journal_start_sb+0x159/0x310 [ 233.529683][ T717] ? ext4_file_write_iter+0x471/0x11f0 [ 233.535128][ T717] ext4_file_write_iter+0x97d/0x11f0 [ 233.540397][ T717] ? ext4_file_write_iter+0x471/0x11f0 [ 233.545893][ T717] do_iter_readv_writev+0x2de/0x380 [ 233.551117][ T717] do_iter_write+0x192/0x5c0 [ 233.555708][ T717] ? splice_from_pipe_next+0x34f/0x3b0 [ 233.561309][ T717] ? kmalloc_array+0x2d/0x40 [ 233.565883][ T717] vfs_iter_write+0x4c/0x70 [ 233.570383][ T717] iter_file_splice_write+0x43a/0x790 [ 233.575744][ T717] ? splice_from_pipe+0xd0/0xd0 [ 233.580576][ T717] direct_splice_actor+0x80/0xa0 [ 233.585540][ T717] splice_direct_to_actor+0x345/0x650 [ 233.590897][ T717] ? do_splice_direct+0x190/0x190 [ 233.595906][ T717] do_splice_direct+0x106/0x190 [ 233.600739][ T717] do_sendfile+0x675/0xc40 [ 233.605225][ T717] __x64_sys_sendfile64+0x102/0x140 [ 233.610427][ T717] do_syscall_64+0x44/0xa0 [ 233.614881][ T717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 233.620789][ T717] RIP: 0033:0x7f1c59bd0ae9 [ 233.625189][ T717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.644805][ T717] RSP: 002b:00007f1c57947188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:26:21 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x588cbd54}}, './file0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0) 03:26:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x20000800000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 233.653202][ T717] RAX: ffffffffffffffda RBX: 00007f1c59ce3f60 RCX: 00007f1c59bd0ae9 [ 233.661157][ T717] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 233.669176][ T717] RBP: 00007f1c579471d0 R08: 0000000000000000 R09: 0000000000000000 [ 233.677199][ T717] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 233.685150][ T717] R13: 00007ffda6706acf R14: 00007f1c57947300 R15: 0000000000022000 03:26:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 53) [ 233.768592][ T826] loop2: detected capacity change from 0 to 262160 [ 233.793892][ T826] FAULT_INJECTION: forcing a failure. [ 233.793892][ T826] name failslab, interval 1, probability 0, space 0, times 0 [ 233.806523][ T826] CPU: 1 PID: 826 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 233.814748][ T826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.824800][ T826] Call Trace: [ 233.828062][ T826] dump_stack_lvl+0xd6/0x122 [ 233.832646][ T826] dump_stack+0x11/0x1b [ 233.836790][ T826] should_fail+0x23c/0x250 [ 233.841243][ T826] ? __se_sys_mount+0x91/0x2f0 [ 233.845990][ T826] __should_failslab+0x81/0x90 [ 233.850741][ T826] should_failslab+0x5/0x20 [ 233.855247][ T826] __kmalloc_track_caller+0x6d/0x370 [ 233.860518][ T826] ? strnlen_user+0x137/0x1c0 [ 233.865177][ T826] strndup_user+0x73/0x120 [ 233.869634][ T826] __se_sys_mount+0x91/0x2f0 [ 233.874214][ T826] ? __this_cpu_preempt_check+0x18/0x20 [ 233.879791][ T826] ? switch_fpu_return+0xc9/0x190 [ 233.884875][ T826] __x64_sys_mount+0x63/0x70 [ 233.889449][ T826] do_syscall_64+0x44/0xa0 [ 233.893848][ T826] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 233.899759][ T826] RIP: 0033:0x7faf9ad5001a [ 233.904163][ T826] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 233.923858][ T826] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.932259][ T826] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 233.940219][ T826] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 233.948258][ T826] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 233.956232][ T826] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001b) 03:26:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf0ff7f00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 233.964191][ T826] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 234.061870][ T833] loop4: detected capacity change from 0 to 262160 03:26:22 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) (fail_nth: 5) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:22 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000281) 03:26:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 54) 03:26:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf0ffffff7f0000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001c) [ 234.309800][ T839] loop2: detected capacity change from 0 to 262160 [ 234.322873][ T843] loop4: detected capacity change from 0 to 262160 [ 234.328431][ T839] FAULT_INJECTION: forcing a failure. [ 234.328431][ T839] name failslab, interval 1, probability 0, space 0, times 0 [ 234.341981][ T839] CPU: 0 PID: 839 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 234.350291][ T839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.360342][ T839] Call Trace: [ 234.363616][ T839] dump_stack_lvl+0xd6/0x122 [ 234.368351][ T839] dump_stack+0x11/0x1b [ 234.372514][ T839] should_fail+0x23c/0x250 [ 234.376929][ T839] ? __se_sys_mount+0x91/0x2f0 [ 234.381688][ T839] __should_failslab+0x81/0x90 [ 234.386501][ T839] should_failslab+0x5/0x20 [ 234.391102][ T839] __kmalloc_track_caller+0x6d/0x370 [ 234.396390][ T839] ? strnlen_user+0x137/0x1c0 [ 234.401070][ T839] strndup_user+0x73/0x120 [ 234.405567][ T839] __se_sys_mount+0x91/0x2f0 [ 234.410151][ T839] ? debug_smp_processor_id+0x18/0x20 [ 234.415522][ T839] __x64_sys_mount+0x63/0x70 [ 234.420138][ T839] do_syscall_64+0x44/0xa0 [ 234.424555][ T839] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 234.430496][ T839] RIP: 0033:0x7faf9ad5001a [ 234.434905][ T839] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:22 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000300) [ 234.454556][ T839] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 234.462964][ T839] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 234.470933][ T839] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 234.478952][ T839] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 234.486921][ T839] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 234.495009][ T839] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) 03:26:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001d) 03:26:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 234.610235][ T917] loop4: detected capacity change from 0 to 262160 03:26:23 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 55) 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000001e) 03:26:23 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000301) [ 235.084036][ T973] loop4: detected capacity change from 0 to 262160 [ 235.087345][ T975] loop2: detected capacity change from 0 to 262160 [ 235.103358][ T975] FAULT_INJECTION: forcing a failure. [ 235.103358][ T975] name failslab, interval 1, probability 0, space 0, times 0 [ 235.115975][ T975] CPU: 0 PID: 975 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 235.124246][ T975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.134319][ T975] Call Trace: [ 235.137593][ T975] dump_stack_lvl+0xd6/0x122 [ 235.142241][ T975] dump_stack+0x11/0x1b [ 235.146461][ T975] should_fail+0x23c/0x250 [ 235.150864][ T975] ? __se_sys_mount+0xf7/0x2f0 [ 235.155614][ T975] __should_failslab+0x81/0x90 [ 235.160368][ T975] should_failslab+0x5/0x20 [ 235.164857][ T975] kmem_cache_alloc_trace+0x52/0x350 [ 235.170177][ T975] ? _copy_from_user+0x94/0xd0 [ 235.174963][ T975] __se_sys_mount+0xf7/0x2f0 [ 235.179549][ T975] ? debug_smp_processor_id+0x18/0x20 [ 235.184934][ T975] __x64_sys_mount+0x63/0x70 [ 235.189529][ T975] do_syscall_64+0x44/0xa0 [ 235.194006][ T975] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 235.199886][ T975] RIP: 0033:0x7faf9ad5001a [ 235.204283][ T975] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 235.223948][ T975] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 235.232342][ T975] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 235.240296][ T975] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 235.248252][ T975] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 235.256219][ T975] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 235.264172][ T975] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:23 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000501) 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2600000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffff000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000021) 03:26:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 56) 03:26:24 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000600) [ 236.251726][ T1007] loop2: detected capacity change from 0 to 262160 [ 236.264770][ T1007] FAULT_INJECTION: forcing a failure. [ 236.264770][ T1007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.265059][ T1009] loop4: detected capacity change from 0 to 262160 [ 236.277885][ T1007] CPU: 1 PID: 1007 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 236.292661][ T1007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.302705][ T1007] Call Trace: [ 236.305980][ T1007] dump_stack_lvl+0xd6/0x122 [ 236.310579][ T1007] dump_stack+0x11/0x1b [ 236.314740][ T1007] should_fail+0x23c/0x250 [ 236.319173][ T1007] should_fail_usercopy+0x16/0x20 [ 236.324247][ T1007] _copy_from_user+0x1c/0xd0 [ 236.328834][ T1007] __se_sys_mount+0x119/0x2f0 [ 236.333570][ T1007] ? __this_cpu_preempt_check+0x18/0x20 [ 236.339156][ T1007] ? switch_fpu_return+0xc9/0x190 [ 236.344183][ T1007] __x64_sys_mount+0x63/0x70 [ 236.348813][ T1007] do_syscall_64+0x44/0xa0 [ 236.353228][ T1007] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 236.359119][ T1007] RIP: 0033:0x7faf9ad5001a [ 236.363523][ T1007] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.383113][ T1007] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 236.391507][ T1007] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 236.399459][ T1007] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 236.407483][ T1007] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 236.415504][ T1007] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 236.423457][ T1007] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7000000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7e00000000000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:24 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000601) 03:26:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000022) [ 236.733809][ T1032] loop4: detected capacity change from 0 to 262160 03:26:25 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000002) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xeffdffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000023) 03:26:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 57) 03:26:25 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000700) 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 237.344734][ T1042] loop4: detected capacity change from 0 to 262160 [ 237.378228][ T1045] loop2: detected capacity change from 0 to 262160 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 237.418300][ T1045] FAULT_INJECTION: forcing a failure. [ 237.418300][ T1045] name failslab, interval 1, probability 0, space 0, times 0 [ 237.430952][ T1045] CPU: 1 PID: 1045 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 237.439340][ T1045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.449392][ T1045] Call Trace: [ 237.452668][ T1045] dump_stack_lvl+0xd6/0x122 [ 237.457372][ T1045] dump_stack+0x11/0x1b [ 237.461539][ T1045] should_fail+0x23c/0x250 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfeffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 237.465960][ T1045] ? getname_flags+0x84/0x3f0 [ 237.470637][ T1045] __should_failslab+0x81/0x90 [ 237.475411][ T1045] should_failslab+0x5/0x20 [ 237.479923][ T1045] kmem_cache_alloc+0x4f/0x320 [ 237.484687][ T1045] getname_flags+0x84/0x3f0 [ 237.489245][ T1045] ? should_fail+0xd6/0x250 [ 237.493807][ T1045] user_path_at_empty+0x28/0x110 [ 237.498747][ T1045] __se_sys_mount+0x217/0x2f0 [ 237.503429][ T1045] __x64_sys_mount+0x63/0x70 [ 237.508017][ T1045] do_syscall_64+0x44/0xa0 [ 237.512435][ T1045] entry_SYSCALL_64_after_hwframe+0x44/0xae 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 237.518336][ T1045] RIP: 0033:0x7faf9ad5001a [ 237.522777][ T1045] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.542412][ T1045] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 237.550890][ T1045] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 237.558870][ T1045] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 03:26:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffdef, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 237.566909][ T1045] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 237.574880][ T1045] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 237.582877][ T1045] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000024) [ 237.700716][ T1067] loop4: detected capacity change from 0 to 262160 03:26:26 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000003) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 58) 03:26:26 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000701) 03:26:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000025) 03:26:26 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000051b80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000052b80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052d80)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x80, "0bc0a15a111742"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000043f80)={{r0, 0x4, 0x6, 0x5, 0x6, 0x71b, 0xa0, 0x7, 0xbe3, 0x4a99, 0x2, 0x9, 0x5, 0x7fff, 0x1}, 0x10, [0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000052240)={{r0, 0x7, 0xffff, 0x3, 0x9, 0x100000000, 0x6, 0xa56, 0x0, 0xbd04, 0x1000, 0x1ff, 0x5, 0x9, 0x7}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053240)={0x400, [{r1, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0}, {0x0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {0x0, r7}, {r1}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r1}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {r1}, {r1}, {r0, r2}, {r1, r2}, {r1, r2}, {r1}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0}, {r0, r2}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {0x0, r2}, {r0}, {r1, r2}, {r1, r2}, {r1, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {0x0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {}, {r0, r2}, {r0}, {r0, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {0x0, r2}, {r1, r2}, {r1, r2}, {r1}, {r0}, {r1, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0}, {r1, r2}, {}, {r0, r2}, {r0}, {r0, r2}, {r1, r2}, {r0}, {r0, r2}, {r0, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r9}, {r1, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r0}, {r1, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {0x0, r2}, {r0, r2}, {}, {r1, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {0x0, r2}, {r0}, {0x0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r1}, {r0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {r0, r2}, {0x0, r2}, {r1, r2}, {0x0, r2}, {r0, r2}, {r1, r2}, {r0}, {r0, r2}, {r1, r2}, {0x0, r2}, {r1, r2}], 0x1, "9a51108aac0f45"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000054240)=ANY=[@ANYRES64=r1, @ANYBLOB="5ac40000000000000000000000000000fffffffffeffffff81000000000000004230cf5300000000070000000000000000000400000000000009000000000000002000000000000000010000000154bdc2b0a83da9950000000000fa9cc0920000"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000005c0)={r6, r5, "0dcacd1b51da5dc542fb1be254c5087775dd7bd1b8046069b74aacff16ab28b50e8ad971789457148ac75224ebe895c523af5ba30ce0a6f039a73eea03467261c3d58cea935e60b9946f3668a8ab27f9592e19ad21c2ec06b7bdb2a078bae753347cc71f8e64ebdbf95014cc603a68d6ef85a523e5c458fc905bc32c92b331ca71ca982acb8131aee6ebea741271e1d5cf1dee6782197106d0e194c3e26b8dd87be6c55897eb58143117e7582996c09ca81eaf87e5000cd0e0cddecce67b315f99fcdc0d036f50bf132de79767e610f72d73f8d97118351f1f60593baf3b8375cbfc15d2dfc9de4d14d25b269f99d04afcc027621ae508c1f81a1484374d2a1a", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000542c0)={0x1, [{}, {}, {r1, r2}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {r0}, {r1}, {r0}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {r1}, {r1}, {r1, r2}, {0x0, r2}, {r0}, {r1}, {r0}, {r0, r2}, {}, {}, {r1}, {r1}, {}, {r1, r2}, {r0}, {}, {}, {}, {0x0, r2}, {r1}, {}, {}, {r0, r2}, {0x0, r2}, {}, {}, {}, {}, {r1, r2}, {0x0, r2}, {}, {}, {0x0, r2}, {}, {}, {}, {r0}, {0x0, r2}, {r0, r2}, {r0}, {r1, r2}, {0x0, r2}, {r1}, {r1}, {0x0, r2}, {0x0, r2}, {r1}, {r0}, {0x0, r2}, {}, {r0, r2}, {}, {r0}, {r0, r2}, {0x0, r2}, {r1, r2}, {}, {}, {r1}, {r0}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {}, {0x0, r2}, {}, {r1, r2}, {}, {}, {r1}, {0x0, r2}, {r1, r2}, {r1}, {r1, r2}, {r1}, {}, {r0}, {r0}, {0x0, r2}, {}, {r1, r2}, {r8}, {0x0, r2}, {}, {r1}, {r0}, {r0, r2}, {r0, r2}, {r0, r2}, {r1}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {r0}, {r0}, {r0}, {0x0, r2}, {r0, r2}, {r0}, {r1, r2}, {r1}, {}, {}, {r1, r2}, {r0, r2}, {r0, r2}, {r1}, {0x0, r2}, {r0, r2}, {r0}, {r1, r2}, {r0, r2}, {0x0, r2}, {0x0, r2}, {}, {r0}, {}, {r1}, {}, {}, {r0, r2}, {0x0, r2}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {r0, r2}, {0x0, r2}, {}, {0x0, r2}, {}, {r0, r2}, {}, {r1}, {r0}, {}, {r1, r2}, {0x0, r2}, {r0}, {r0}, {}, {r0}, {0x0, r2}, {}, {r1, r2}, {}, {}, {0x0, r2}, {0x0, r2}, {0x0, r2}, {}, {0x0, r2}, {0x0, r2}, {r1, r2}, {r0, r2}, {}, {}, {0x0, r2}, {r1}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {r1, r2}, {}, {}, {}, {r1, r2}, {}, {r0}, {r1, r2}, {r0, r2}, {r1, r2}, {}, {0x0, r2}, {r0, r2}, {}, {0x0, r2}, {}, {r1}, {0x0, r2}, {0x0, r2}, {}, {r1}, {r0, r2}, {0x0, r2}, {0x0, r2}, {r0, r2}, {r0}, {r0}, {r0, r2}, {r1}, {}, {0x0, r2}, {r1, r2}, {r0}, {}, {r0, r2}, {}, {0x0, r2}, {0x0, r2}, {r0, r2}, {r0, r2}, {r1, r2}, {0x0, r2}, {}, {r0, r2}, {}, {r0}, {0x0, r2}, {}, {r1}, {0x0, r2}, {0x0, r2}, {r1}, {0x0, r2}, {}, {r0}, {r0, r2}, {0x0, r2}, {}, {r13, r2}, {r0, r2}, {r1}, {r10, r2}, {r1, r2}, {r11}, {r12, r2}, {r1}], 0x9, "6f8a53b9df0563"}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x5, 0x2, 0x81, 0x8, 0x0, 0x101, 0x800, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x50020, 0x7, 0x67, 0x5, 0x5, 0x2, 0x0, 0x0, 0xef, 0x0, 0x6}, 0x0, 0x20, 0xffffffffffffffff, 0xa) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r14 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @thr={&(0x7f0000000180)="714eb1bac73936e8239ea2474c26c61f21732a04fd83b79ad10fe67f2ff75d42ad18a4cd66b4c58b0d4a13ca3122b6b99d13f17a8c4c42a850e63c7e03e84533f094885bed041459aa470c232882215510b6fb7958c566ffa9471eaa4b131a752949ccf702b2a0a1592e4e60865f657a8d43d34251b5b699b51d0459bcf36f1b288e69ce950383405478", &(0x7f0000000240)="4ac42a5f3f9e62f5069f0105815fa2c7db5da737a5e3c3bc58b8b61c190bba871a9d18d6a5d83d208f"}}, &(0x7f0000044000)) statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/51) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1, 0x3, 0x8, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1400, 0x8fc0, 0x5, 0x8, 0x0, 0x101, 0x4, 0x0, 0x1, 0x0, 0x1}, r14, 0xb, 0xffffffffffffffff, 0x8) [ 238.381290][ T1078] loop2: detected capacity change from 0 to 262160 [ 238.388982][ T1077] loop4: detected capacity change from 0 to 262160 [ 238.437517][ T1078] FAULT_INJECTION: forcing a failure. [ 238.437517][ T1078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.450604][ T1078] CPU: 0 PID: 1078 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 238.458928][ T1078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.468979][ T1078] Call Trace: [ 238.472262][ T1078] dump_stack_lvl+0xd6/0x122 [ 238.476861][ T1078] dump_stack+0x11/0x1b [ 238.481019][ T1078] should_fail+0x23c/0x250 [ 238.485442][ T1078] should_fail_usercopy+0x16/0x20 [ 238.490488][ T1078] strncpy_from_user+0x21/0x250 [ 238.495417][ T1078] getname_flags+0xb8/0x3f0 [ 238.499923][ T1078] ? should_fail+0xd6/0x250 [ 238.504436][ T1078] user_path_at_empty+0x28/0x110 [ 238.509373][ T1078] __se_sys_mount+0x217/0x2f0 [ 238.514100][ T1078] __x64_sys_mount+0x63/0x70 [ 238.518756][ T1078] do_syscall_64+0x44/0xa0 [ 238.523210][ T1078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 238.529113][ T1078] RIP: 0033:0x7faf9ad5001a [ 238.533523][ T1078] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.553135][ T1078] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.561545][ T1078] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 238.569582][ T1078] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 238.577659][ T1078] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 03:26:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x85, 0x40, 0x5, 0x1, 0x0, 0x1, 0x6020, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x9}, 0x90, 0x5, 0xfffffffa, 0x6, 0x20, 0x2, 0x1, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) r0 = gettid() timer_create(0x0, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000240)={{r3, r4+10000000}}, &(0x7f0000000280)) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x8, 0x5, 0x7, 0x3b, 0x0, 0x1, 0x14202, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x90dd, 0x40}, 0x882, 0x8, 0x8, 0x9, 0xfffffffffffffff8, 0x8, 0x7fff, 0x0, 0x7fffffff, 0x0, 0x100}, r0, 0xd, r1, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80000001) sendfile(r1, r6, &(0x7f00000002c0)=0x5, 0x7ff) 03:26:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 238.585625][ T1078] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 238.593624][ T1078] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 59) 03:26:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000026) [ 238.690359][ T1196] loop2: detected capacity change from 0 to 262160 [ 238.699195][ T1196] FAULT_INJECTION: forcing a failure. [ 238.699195][ T1196] name failslab, interval 1, probability 0, space 0, times 0 [ 238.711970][ T1196] CPU: 1 PID: 1196 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 238.720369][ T1196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.730434][ T1196] Call Trace: [ 238.733715][ T1196] dump_stack_lvl+0xd6/0x122 [ 238.738312][ T1196] dump_stack+0x11/0x1b [ 238.742559][ T1196] should_fail+0x23c/0x250 [ 238.746983][ T1196] ? alloc_fs_context+0x46/0x500 [ 238.751994][ T1196] __should_failslab+0x81/0x90 [ 238.756798][ T1196] should_failslab+0x5/0x20 [ 238.761306][ T1196] kmem_cache_alloc_trace+0x52/0x350 [ 238.766712][ T1196] alloc_fs_context+0x46/0x500 [ 238.771484][ T1196] ? strncmp+0x34/0x70 [ 238.775597][ T1196] fs_context_for_mount+0x1d/0x20 [ 238.780625][ T1196] path_mount+0xdf0/0x1c40 [ 238.785100][ T1196] __se_sys_mount+0x24b/0x2f0 [ 238.789793][ T1196] __x64_sys_mount+0x63/0x70 [ 238.794409][ T1196] do_syscall_64+0x44/0xa0 [ 238.798894][ T1196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 238.804858][ T1196] RIP: 0033:0x7faf9ad5001a [ 238.809307][ T1196] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.828920][ T1196] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 238.837339][ T1196] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 238.845312][ T1196] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 238.853276][ T1196] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 238.861345][ T1196] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 238.869329][ T1196] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 238.920041][ T1300] loop4: detected capacity change from 0 to 262160 03:26:27 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000004) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x62d}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x20, 0xbe, 0x5, 0xfa, 0x0, 0x0, 0x2004, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x5, 0xffffffff}, 0x824, 0x4000, 0x7, 0xf, 0xfffffffffffffff9, 0x1000, 0xee26, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x9) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) 03:26:27 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000801) 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 60) 03:26:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000027) [ 239.415833][ T1309] loop2: detected capacity change from 0 to 262160 [ 239.436099][ T1311] loop4: detected capacity change from 0 to 262160 [ 239.439822][ T1309] FAULT_INJECTION: forcing a failure. [ 239.439822][ T1309] name failslab, interval 1, probability 0, space 0, times 0 [ 239.455273][ T1309] CPU: 1 PID: 1309 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 239.463594][ T1309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.473728][ T1309] Call Trace: [ 239.477025][ T1309] dump_stack_lvl+0xd6/0x122 [ 239.481674][ T1309] dump_stack+0x11/0x1b [ 239.485837][ T1309] should_fail+0x23c/0x250 [ 239.490330][ T1309] ? legacy_init_fs_context+0x2d/0x70 [ 239.495707][ T1309] __should_failslab+0x81/0x90 [ 239.500503][ T1309] should_failslab+0x5/0x20 [ 239.505120][ T1309] kmem_cache_alloc_trace+0x52/0x350 [ 239.510414][ T1309] ? kmem_cache_alloc_trace+0x24b/0x350 [ 239.516017][ T1309] legacy_init_fs_context+0x2d/0x70 [ 239.521210][ T1309] alloc_fs_context+0x419/0x500 [ 239.526069][ T1309] fs_context_for_mount+0x1d/0x20 [ 239.531202][ T1309] path_mount+0xdf0/0x1c40 [ 239.535720][ T1309] __se_sys_mount+0x24b/0x2f0 [ 239.540416][ T1309] ? __this_cpu_preempt_check+0x18/0x20 [ 239.545970][ T1309] __x64_sys_mount+0x63/0x70 [ 239.550641][ T1309] do_syscall_64+0x44/0xa0 [ 239.555062][ T1309] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 239.561004][ T1309] RIP: 0033:0x7faf9ad5001a [ 239.565423][ T1309] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.585026][ T1309] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 239.593438][ T1309] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 239.601408][ T1309] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0700000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0804000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0802000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0803000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000028) [ 239.609449][ T1309] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 239.617485][ T1309] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 239.625456][ T1309] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 239.713778][ T1430] loop4: detected capacity change from 0 to 262160 03:26:28 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000005) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0804000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 61) 03:26:28 executing program 0: r0 = creat(0x0, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, 0x0, 0x0) read$usbmon(r0, &(0x7f0000000140)=""/244, 0xf4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x20, 0x0, 0xc9, 0x1, 0x0, 0x7, 0x1b405, 0x7, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x8000, 0xccef}, 0x248, 0xfffffffffe5c8f6e, 0x4, 0x1, 0x0, 0x1, 0xffff, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x4, r1, 0xa) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000029) 03:26:28 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000900) [ 240.228050][ T1441] loop4: detected capacity change from 0 to 262160 [ 240.230867][ T1443] loop2: detected capacity change from 0 to 262160 [ 240.249927][ T1443] FAULT_INJECTION: forcing a failure. [ 240.249927][ T1443] name failslab, interval 1, probability 0, space 0, times 0 [ 240.262618][ T1443] CPU: 0 PID: 1443 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 240.270944][ T1443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.281202][ T1443] Call Trace: [ 240.284475][ T1443] dump_stack_lvl+0xd6/0x122 [ 240.289135][ T1443] dump_stack+0x11/0x1b [ 240.293380][ T1443] should_fail+0x23c/0x250 [ 240.297844][ T1443] ? vfs_parse_fs_string+0x6d/0xd0 [ 240.302969][ T1443] __should_failslab+0x81/0x90 [ 240.307818][ T1443] should_failslab+0x5/0x20 [ 240.312395][ T1443] __kmalloc_track_caller+0x6d/0x370 [ 240.317729][ T1443] kmemdup_nul+0x27/0x70 [ 240.321995][ T1443] vfs_parse_fs_string+0x6d/0xd0 [ 240.326990][ T1443] path_mount+0xf94/0x1c40 [ 240.331407][ T1443] __se_sys_mount+0x24b/0x2f0 [ 240.336086][ T1443] __x64_sys_mount+0x63/0x70 [ 240.340675][ T1443] do_syscall_64+0x44/0xa0 [ 240.345113][ T1443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.351056][ T1443] RIP: 0033:0x7faf9ad5001a [ 240.355474][ T1443] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002a) 03:26:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0805000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 240.375178][ T1443] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.383605][ T1443] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 240.391610][ T1443] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 240.399625][ T1443] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 240.407668][ T1443] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 240.415678][ T1443] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0808000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:28 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000901) 03:26:28 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000800)=0x0) tkill(r0, 0x17) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000780)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000740)=[{{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/92, 0x5c}, {&(0x7f0000000240)=""/95, 0x5f}, {&(0x7f00000002c0)=""/222, 0xde}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/241, 0xf1}, {&(0x7f0000000580)=""/183, 0xb7}], 0x6, &(0x7f00000006c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}], 0x1, 0x2, &(0x7f00000007c0)={r1, r2+60000000}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x4, 0x1, 0x4, 0x0, 0xfffffffffffffffb, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x0, @perf_config_ext={0x1f, 0xfff}, 0x10004, 0x1, 0x1, 0x0, 0x2, 0x8, 0x3f, 0x0, 0x10000, 0x0, 0x1fe000000000000}, 0x0, 0xe, r3, 0x2) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) [ 240.462766][ T1491] loop4: detected capacity change from 0 to 262160 03:26:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 62) [ 240.539748][ T1562] loop2: detected capacity change from 0 to 262160 [ 240.561794][ T1562] FAULT_INJECTION: forcing a failure. [ 240.561794][ T1562] name failslab, interval 1, probability 0, space 0, times 0 [ 240.574657][ T1562] CPU: 0 PID: 1562 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 240.582980][ T1562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.593030][ T1562] Call Trace: [ 240.596384][ T1562] dump_stack_lvl+0xd6/0x122 [ 240.600986][ T1562] dump_stack+0x11/0x1b [ 240.605151][ T1562] should_fail+0x23c/0x250 [ 240.609646][ T1562] ? vfat_mount+0x40/0x40 [ 240.614046][ T1562] ? getname_kernel+0x37/0x1d0 [ 240.618868][ T1562] __should_failslab+0x81/0x90 [ 240.623635][ T1562] should_failslab+0x5/0x20 [ 240.628187][ T1562] kmem_cache_alloc+0x4f/0x320 [ 240.633046][ T1562] ? avc_has_perm_noaudit+0x1c0/0x270 [ 240.638421][ T1562] ? vfat_mount+0x40/0x40 [ 240.642757][ T1562] getname_kernel+0x37/0x1d0 [ 240.647344][ T1562] ? vfat_mount+0x40/0x40 [ 240.651752][ T1562] kern_path+0x1d/0x100 [ 240.655948][ T1562] ? vfat_mount+0x40/0x40 [ 240.660384][ T1562] blkdev_get_by_path+0x63/0x220 [ 240.665432][ T1562] mount_bdev+0x47/0x290 [ 240.669724][ T1562] ? tsan.module_ctor+0x10/0x10 [ 240.674680][ T1562] vfat_mount+0x2d/0x40 [ 240.678840][ T1562] legacy_get_tree+0x70/0xc0 [ 240.683434][ T1562] vfs_get_tree+0x4a/0x1a0 [ 240.687860][ T1562] path_mount+0x11cf/0x1c40 [ 240.692442][ T1562] __se_sys_mount+0x24b/0x2f0 [ 240.697124][ T1562] __x64_sys_mount+0x63/0x70 [ 240.701720][ T1562] do_syscall_64+0x44/0xa0 [ 240.706140][ T1562] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 240.712041][ T1562] RIP: 0033:0x7faf9ad5001a [ 240.716456][ T1562] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.736139][ T1562] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 240.744552][ T1562] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 240.752521][ T1562] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 240.760569][ T1562] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 240.768541][ T1562] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 240.776513][ T1562] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:29 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000006) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0810000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002b) 03:26:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 63) 03:26:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x4) 03:26:29 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000a01) [ 241.284693][ T1676] loop2: detected capacity change from 0 to 262160 [ 241.292387][ T1673] loop4: detected capacity change from 0 to 262160 [ 241.300009][ T1676] FAULT_INJECTION: forcing a failure. [ 241.300009][ T1676] name failslab, interval 1, probability 0, space 0, times 0 [ 241.312673][ T1676] CPU: 0 PID: 1676 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 241.320996][ T1676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.331066][ T1676] Call Trace: [ 241.334338][ T1676] dump_stack_lvl+0xd6/0x122 [ 241.338936][ T1676] dump_stack+0x11/0x1b [ 241.343153][ T1676] should_fail+0x23c/0x250 [ 241.347646][ T1676] ? alloc_super+0x3a/0x520 [ 241.352149][ T1676] __should_failslab+0x81/0x90 [ 241.356933][ T1676] should_failslab+0x5/0x20 [ 241.361506][ T1676] kmem_cache_alloc_trace+0x52/0x350 [ 241.366843][ T1676] ? preempt_count_add+0x4e/0x90 [ 241.371817][ T1676] ? disk_unblock_events+0x35/0x40 [ 241.376988][ T1676] ? mount_bdev+0x290/0x290 03:26:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) (fail_nth: 1) [ 241.381528][ T1676] alloc_super+0x3a/0x520 [ 241.385856][ T1676] ? mount_bdev+0x290/0x290 [ 241.390352][ T1676] sget+0x189/0x370 [ 241.394160][ T1676] ? test_bdev_super+0x30/0x30 [ 241.398995][ T1676] mount_bdev+0xd3/0x290 [ 241.403278][ T1676] ? vfat_mount+0x40/0x40 [ 241.407615][ T1676] ? tsan.module_ctor+0x10/0x10 [ 241.412526][ T1676] vfat_mount+0x2d/0x40 [ 241.416759][ T1676] legacy_get_tree+0x70/0xc0 [ 241.421352][ T1676] vfs_get_tree+0x4a/0x1a0 [ 241.425856][ T1676] path_mount+0x11cf/0x1c40 [ 241.430364][ T1676] __se_sys_mount+0x24b/0x2f0 [ 241.435092][ T1676] __x64_sys_mount+0x63/0x70 [ 241.439677][ T1676] do_syscall_64+0x44/0xa0 [ 241.444106][ T1676] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.450001][ T1676] RIP: 0033:0x7faf9ad5001a [ 241.454417][ T1676] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.474023][ T1676] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 241.482440][ T1676] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 241.490411][ T1676] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 241.498439][ T1676] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 241.506459][ T1676] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 241.514493][ T1676] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0818000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 64) 03:26:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0826000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 241.637495][ T1895] loop2: detected capacity change from 0 to 262160 [ 241.678469][ T1895] FAULT_INJECTION: forcing a failure. [ 241.678469][ T1895] name failslab, interval 1, probability 0, space 0, times 0 [ 241.691197][ T1895] CPU: 0 PID: 1895 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 241.699629][ T1895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.709894][ T1895] Call Trace: [ 241.713179][ T1895] dump_stack_lvl+0xd6/0x122 [ 241.717843][ T1895] dump_stack+0x11/0x1b [ 241.722035][ T1895] should_fail+0x23c/0x250 [ 241.726458][ T1895] ? kzalloc+0x1d/0x30 [ 241.730622][ T1895] __should_failslab+0x81/0x90 [ 241.735417][ T1895] should_failslab+0x5/0x20 [ 241.739977][ T1895] __kmalloc+0x6f/0x370 [ 241.744205][ T1895] kzalloc+0x1d/0x30 [ 241.748100][ T1895] security_sb_alloc+0x3c/0x180 [ 241.752949][ T1895] alloc_super+0x10b/0x520 [ 241.757501][ T1895] ? mount_bdev+0x290/0x290 [ 241.762132][ T1895] sget+0x189/0x370 [ 241.765938][ T1895] ? test_bdev_super+0x30/0x30 [ 241.770849][ T1895] mount_bdev+0xd3/0x290 [ 241.775171][ T1895] ? vfat_mount+0x40/0x40 [ 241.779561][ T1895] ? tsan.module_ctor+0x10/0x10 [ 241.784459][ T1895] vfat_mount+0x2d/0x40 [ 241.788617][ T1895] legacy_get_tree+0x70/0xc0 [ 241.793203][ T1895] vfs_get_tree+0x4a/0x1a0 [ 241.797695][ T1895] path_mount+0x11cf/0x1c40 [ 241.802194][ T1895] __se_sys_mount+0x24b/0x2f0 [ 241.806871][ T1895] __x64_sys_mount+0x63/0x70 [ 241.811455][ T1895] do_syscall_64+0x44/0xa0 [ 241.815949][ T1895] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 241.821848][ T1895] RIP: 0033:0x7faf9ad5001a [ 241.826318][ T1895] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.846102][ T1895] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 241.854542][ T1895] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 241.862512][ T1895] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 241.870478][ T1895] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 241.878444][ T1895] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 241.886426][ T1895] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:30 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000007) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002c) 03:26:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0870000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x4, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 65) 03:26:30 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000b01) [ 242.301334][ T1907] loop2: detected capacity change from 0 to 262160 [ 242.308209][ T1903] loop4: detected capacity change from 0 to 262160 [ 242.337414][ T1907] FAULT_INJECTION: forcing a failure. [ 242.337414][ T1907] name failslab, interval 1, probability 0, space 0, times 0 [ 242.350086][ T1907] CPU: 0 PID: 1907 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 242.358410][ T1907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.368489][ T1907] Call Trace: [ 242.371760][ T1907] dump_stack_lvl+0xd6/0x122 [ 242.376366][ T1907] dump_stack+0x11/0x1b [ 242.380528][ T1907] should_fail+0x23c/0x250 [ 242.384952][ T1907] ? __list_lru_init+0x70/0x680 [ 242.389826][ T1907] __should_failslab+0x81/0x90 [ 242.394613][ T1907] should_failslab+0x5/0x20 [ 242.399121][ T1907] __kmalloc+0x6f/0x370 [ 242.403279][ T1907] ? prealloc_memcg_shrinker+0x444/0x460 [ 242.408910][ T1907] __list_lru_init+0x70/0x680 [ 242.413592][ T1907] alloc_super+0x490/0x520 [ 242.418156][ T1907] ? mount_bdev+0x290/0x290 [ 242.422723][ T1907] sget+0x189/0x370 [ 242.426529][ T1907] ? test_bdev_super+0x30/0x30 [ 242.431296][ T1907] mount_bdev+0xd3/0x290 [ 242.435544][ T1907] ? vfat_mount+0x40/0x40 [ 242.439881][ T1907] ? tsan.module_ctor+0x10/0x10 [ 242.444731][ T1907] vfat_mount+0x2d/0x40 [ 242.448955][ T1907] legacy_get_tree+0x70/0xc0 [ 242.453539][ T1907] vfs_get_tree+0x4a/0x1a0 [ 242.457955][ T1907] path_mount+0x11cf/0x1c40 [ 242.462452][ T1907] __se_sys_mount+0x24b/0x2f0 [ 242.467172][ T1907] __x64_sys_mount+0x63/0x70 [ 242.471755][ T1907] do_syscall_64+0x44/0xa0 [ 242.476175][ T1907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 242.482237][ T1907] RIP: 0033:0x7faf9ad5001a [ 242.486674][ T1907] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.506277][ T1907] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 242.514708][ T1907] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 242.522699][ T1907] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 242.530669][ T1907] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 242.538633][ T1907] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x5, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb087e000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 242.546599][ T1907] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fe000000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 66) 03:26:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0804020000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 242.646782][ T1928] loop2: detected capacity change from 0 to 262160 [ 242.662993][ T1928] FAULT_INJECTION: forcing a failure. [ 242.662993][ T1928] name failslab, interval 1, probability 0, space 0, times 0 [ 242.675617][ T1928] CPU: 0 PID: 1928 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 242.684012][ T1928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.694087][ T1928] Call Trace: [ 242.697415][ T1928] dump_stack_lvl+0xd6/0x122 [ 242.702031][ T1928] dump_stack+0x11/0x1b [ 242.706278][ T1928] should_fail+0x23c/0x250 [ 242.710695][ T1928] ? __list_lru_init+0x70/0x680 [ 242.715602][ T1928] __should_failslab+0x81/0x90 [ 242.720368][ T1928] should_failslab+0x5/0x20 [ 242.724913][ T1928] __kmalloc+0x6f/0x370 [ 242.729074][ T1928] ? prealloc_memcg_shrinker+0x444/0x460 [ 242.734776][ T1928] __list_lru_init+0x70/0x680 [ 242.739503][ T1928] alloc_super+0x490/0x520 [ 242.743932][ T1928] ? mount_bdev+0x290/0x290 [ 242.748434][ T1928] sget+0x189/0x370 [ 242.752260][ T1928] ? test_bdev_super+0x30/0x30 [ 242.757016][ T1928] mount_bdev+0xd3/0x290 [ 242.761323][ T1928] ? vfat_mount+0x40/0x40 [ 242.765656][ T1928] ? tsan.module_ctor+0x10/0x10 [ 242.770655][ T1928] vfat_mount+0x2d/0x40 [ 242.774807][ T1928] legacy_get_tree+0x70/0xc0 [ 242.779392][ T1928] vfs_get_tree+0x4a/0x1a0 [ 242.783806][ T1928] path_mount+0x11cf/0x1c40 [ 242.788304][ T1928] __se_sys_mount+0x24b/0x2f0 03:26:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002d) [ 242.792974][ T1928] ? __this_cpu_preempt_check+0x18/0x20 [ 242.798585][ T1928] __x64_sys_mount+0x63/0x70 [ 242.803236][ T1928] do_syscall_64+0x44/0xa0 [ 242.807649][ T1928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 242.813557][ T1928] RIP: 0033:0x7faf9ad5001a [ 242.817964][ T1928] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.837633][ T1928] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 242.846044][ T1928] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 242.854548][ T1928] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 242.862520][ T1928] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 242.870515][ T1928] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 242.878498][ T1928] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 242.918559][ T1933] loop4: detected capacity change from 0 to 262160 03:26:31 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000c00) 03:26:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800030000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x8, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 67) 03:26:31 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000008) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002e) [ 243.187744][ T1937] loop4: detected capacity change from 0 to 262160 [ 243.198156][ T1942] loop2: detected capacity change from 0 to 262160 [ 243.219208][ T1942] FAULT_INJECTION: forcing a failure. [ 243.219208][ T1942] name failslab, interval 1, probability 0, space 0, times 0 [ 243.231938][ T1942] CPU: 1 PID: 1942 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 243.240268][ T1942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.250335][ T1942] Call Trace: [ 243.253602][ T1942] dump_stack_lvl+0xd6/0x122 [ 243.258224][ T1942] dump_stack+0x11/0x1b [ 243.262368][ T1942] should_fail+0x23c/0x250 [ 243.266771][ T1942] ? __list_lru_init+0x332/0x680 [ 243.271700][ T1942] __should_failslab+0x81/0x90 [ 243.276459][ T1942] should_failslab+0x5/0x20 [ 243.280951][ T1942] kmem_cache_alloc_trace+0x52/0x350 [ 243.286233][ T1942] ? __kmalloc_node+0x30/0x40 [ 243.290898][ T1942] __list_lru_init+0x332/0x680 [ 243.295667][ T1942] alloc_super+0x490/0x520 [ 243.300151][ T1942] ? mount_bdev+0x290/0x290 [ 243.304641][ T1942] sget+0x189/0x370 [ 243.308502][ T1942] ? test_bdev_super+0x30/0x30 [ 243.313348][ T1942] mount_bdev+0xd3/0x290 [ 243.317612][ T1942] ? vfat_mount+0x40/0x40 [ 243.321933][ T1942] ? tsan.module_ctor+0x10/0x10 [ 243.326909][ T1942] vfat_mount+0x2d/0x40 [ 243.331060][ T1942] legacy_get_tree+0x70/0xc0 [ 243.335699][ T1942] vfs_get_tree+0x4a/0x1a0 [ 243.340149][ T1942] path_mount+0x11cf/0x1c40 [ 243.344651][ T1942] __se_sys_mount+0x24b/0x2f0 [ 243.349310][ T1942] ? __this_cpu_preempt_check+0x18/0x20 [ 243.354844][ T1942] __x64_sys_mount+0x63/0x70 [ 243.359415][ T1942] do_syscall_64+0x44/0xa0 [ 243.363817][ T1942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 243.369698][ T1942] RIP: 0033:0x7faf9ad5001a [ 243.374096][ T1942] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 243.393748][ T1942] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.402141][ T1942] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 243.410121][ T1942] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 243.418124][ T1942] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 243.426076][ T1942] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0802040000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 243.434045][ T1942] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0806040000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 68) 03:26:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000002f) 03:26:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x18, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 243.521499][ T1959] loop2: detected capacity change from 0 to 262160 [ 243.548687][ T1959] FAULT_INJECTION: forcing a failure. [ 243.548687][ T1959] name failslab, interval 1, probability 0, space 0, times 0 [ 243.561318][ T1959] CPU: 0 PID: 1959 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 243.569644][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.579690][ T1959] Call Trace: [ 243.582964][ T1959] dump_stack_lvl+0xd6/0x122 [ 243.587640][ T1959] dump_stack+0x11/0x1b [ 243.591799][ T1959] should_fail+0x23c/0x250 [ 243.596251][ T1959] ? __list_lru_init+0x332/0x680 [ 243.601234][ T1959] __should_failslab+0x81/0x90 [ 243.606059][ T1959] should_failslab+0x5/0x20 [ 243.610571][ T1959] kmem_cache_alloc_trace+0x52/0x350 [ 243.615921][ T1959] ? __list_lru_init+0x332/0x680 [ 243.620860][ T1959] __list_lru_init+0x332/0x680 [ 243.625696][ T1959] alloc_super+0x490/0x520 [ 243.630118][ T1959] ? mount_bdev+0x290/0x290 [ 243.634617][ T1959] sget+0x189/0x370 [ 243.638422][ T1959] ? test_bdev_super+0x30/0x30 [ 243.643213][ T1959] mount_bdev+0xd3/0x290 [ 243.647464][ T1959] ? vfat_mount+0x40/0x40 [ 243.651791][ T1959] ? tsan.module_ctor+0x10/0x10 [ 243.657393][ T1959] vfat_mount+0x2d/0x40 [ 243.661610][ T1959] legacy_get_tree+0x70/0xc0 [ 243.666192][ T1959] vfs_get_tree+0x4a/0x1a0 [ 243.670610][ T1959] path_mount+0x11cf/0x1c40 [ 243.675173][ T1959] __se_sys_mount+0x24b/0x2f0 [ 243.679866][ T1959] __x64_sys_mount+0x63/0x70 [ 243.684533][ T1959] do_syscall_64+0x44/0xa0 [ 243.688983][ T1959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 243.694887][ T1959] RIP: 0033:0x7faf9ad5001a [ 243.699295][ T1959] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800050000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000c01) [ 243.718952][ T1959] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 243.727363][ T1959] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 243.735331][ T1959] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 243.743341][ T1959] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 243.751309][ T1959] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 243.759316][ T1959] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0804060000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x26, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 243.823703][ T1964] loop4: detected capacity change from 0 to 262160 03:26:32 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000009) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 69) 03:26:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800180000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x70, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000030) 03:26:32 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000d01) 03:26:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800200000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 244.246440][ T1989] loop4: detected capacity change from 0 to 262160 [ 244.247535][ T1990] loop2: detected capacity change from 0 to 262160 [ 244.276869][ T1990] FAULT_INJECTION: forcing a failure. [ 244.276869][ T1990] name failslab, interval 1, probability 0, space 0, times 0 [ 244.289590][ T1990] CPU: 0 PID: 1990 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 244.297989][ T1990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.308100][ T1990] Call Trace: [ 244.311369][ T1990] dump_stack_lvl+0xd6/0x122 [ 244.315965][ T1990] dump_stack+0x11/0x1b [ 244.320157][ T1990] should_fail+0x23c/0x250 [ 244.324598][ T1990] ? __list_lru_init+0x332/0x680 [ 244.329555][ T1990] __should_failslab+0x81/0x90 [ 244.334384][ T1990] should_failslab+0x5/0x20 [ 244.338920][ T1990] kmem_cache_alloc_trace+0x52/0x350 [ 244.344259][ T1990] ? __list_lru_init+0x332/0x680 [ 244.349190][ T1990] __list_lru_init+0x332/0x680 [ 244.353938][ T1990] alloc_super+0x490/0x520 [ 244.358337][ T1990] ? mount_bdev+0x290/0x290 [ 244.362888][ T1990] sget+0x189/0x370 [ 244.366787][ T1990] ? test_bdev_super+0x30/0x30 [ 244.371534][ T1990] mount_bdev+0xd3/0x290 [ 244.375772][ T1990] ? vfat_mount+0x40/0x40 [ 244.380093][ T1990] ? tsan.module_ctor+0x10/0x10 [ 244.385006][ T1990] vfat_mount+0x2d/0x40 [ 244.389147][ T1990] legacy_get_tree+0x70/0xc0 [ 244.393721][ T1990] vfs_get_tree+0x4a/0x1a0 [ 244.398120][ T1990] path_mount+0x11cf/0x1c40 [ 244.402669][ T1990] __se_sys_mount+0x24b/0x2f0 [ 244.407329][ T1990] ? __this_cpu_preempt_check+0x18/0x20 [ 244.412876][ T1990] __x64_sys_mount+0x63/0x70 [ 244.417507][ T1990] do_syscall_64+0x44/0xa0 [ 244.421909][ T1990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 244.427788][ T1990] RIP: 0033:0x7faf9ad5001a [ 244.432182][ T1990] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.451775][ T1990] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 244.460236][ T1990] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 244.468189][ T1990] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 244.476140][ T1990] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 244.484091][ T1990] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfe, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 244.492047][ T1990] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800260000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 70) [ 244.570249][ T2002] loop2: detected capacity change from 0 to 262160 [ 244.577650][ T2002] FAULT_INJECTION: forcing a failure. [ 244.577650][ T2002] name failslab, interval 1, probability 0, space 0, times 0 [ 244.590291][ T2002] CPU: 0 PID: 2002 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 244.598638][ T2002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.608683][ T2002] Call Trace: [ 244.611944][ T2002] dump_stack_lvl+0xd6/0x122 [ 244.616527][ T2002] dump_stack+0x11/0x1b [ 244.620667][ T2002] should_fail+0x23c/0x250 [ 244.625077][ T2002] ? __list_lru_init+0x332/0x680 [ 244.630000][ T2002] __should_failslab+0x81/0x90 [ 244.634801][ T2002] should_failslab+0x5/0x20 [ 244.639345][ T2002] kmem_cache_alloc_trace+0x52/0x350 [ 244.644615][ T2002] ? __list_lru_init+0x332/0x680 [ 244.649534][ T2002] __list_lru_init+0x332/0x680 [ 244.654298][ T2002] alloc_super+0x490/0x520 [ 244.658776][ T2002] ? mount_bdev+0x290/0x290 [ 244.663265][ T2002] sget+0x189/0x370 [ 244.667131][ T2002] ? test_bdev_super+0x30/0x30 [ 244.671903][ T2002] mount_bdev+0xd3/0x290 [ 244.676132][ T2002] ? vfat_mount+0x40/0x40 [ 244.680479][ T2002] ? tsan.module_ctor+0x10/0x10 [ 244.685395][ T2002] vfat_mount+0x2d/0x40 [ 244.689586][ T2002] legacy_get_tree+0x70/0xc0 [ 244.694177][ T2002] vfs_get_tree+0x4a/0x1a0 [ 244.698645][ T2002] path_mount+0x11cf/0x1c40 [ 244.703132][ T2002] __se_sys_mount+0x24b/0x2f0 [ 244.707864][ T2002] __x64_sys_mount+0x63/0x70 [ 244.712560][ T2002] do_syscall_64+0x44/0xa0 [ 244.716965][ T2002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 244.722889][ T2002] RIP: 0033:0x7faf9ad5001a [ 244.727290][ T2002] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.746907][ T2002] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 244.755386][ T2002] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 244.763411][ T2002] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 03:26:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08003f0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x204, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 244.771365][ T2002] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 244.779358][ T2002] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 244.787318][ T2002] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000031) 03:26:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800400000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x402, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 71) 03:26:33 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000a) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:33 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000e01) [ 245.220189][ T2016] loop2: detected capacity change from 0 to 262160 [ 245.238647][ T2018] loop4: detected capacity change from 0 to 262160 [ 245.249865][ T2016] FAULT_INJECTION: forcing a failure. [ 245.249865][ T2016] name failslab, interval 1, probability 0, space 0, times 0 [ 245.262474][ T2016] CPU: 0 PID: 2016 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 245.270803][ T2016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.280892][ T2016] Call Trace: [ 245.284160][ T2016] dump_stack_lvl+0xd6/0x122 [ 245.288750][ T2016] dump_stack+0x11/0x1b [ 245.292951][ T2016] should_fail+0x23c/0x250 [ 245.297358][ T2016] ? __list_lru_init+0x332/0x680 [ 245.302283][ T2016] __should_failslab+0x81/0x90 [ 245.307111][ T2016] should_failslab+0x5/0x20 [ 245.311676][ T2016] kmem_cache_alloc_trace+0x52/0x350 [ 245.316992][ T2016] ? __list_lru_init+0x332/0x680 [ 245.321924][ T2016] __list_lru_init+0x332/0x680 [ 245.326674][ T2016] alloc_super+0x490/0x520 [ 245.331075][ T2016] ? mount_bdev+0x290/0x290 [ 245.335621][ T2016] sget+0x189/0x370 [ 245.339411][ T2016] ? test_bdev_super+0x30/0x30 [ 245.344160][ T2016] mount_bdev+0xd3/0x290 [ 245.348402][ T2016] ? vfat_mount+0x40/0x40 [ 245.352718][ T2016] ? tsan.module_ctor+0x10/0x10 [ 245.357591][ T2016] vfat_mount+0x2d/0x40 [ 245.361732][ T2016] legacy_get_tree+0x70/0xc0 [ 245.366304][ T2016] vfs_get_tree+0x4a/0x1a0 [ 245.370754][ T2016] path_mount+0x11cf/0x1c40 [ 245.375239][ T2016] __se_sys_mount+0x24b/0x2f0 [ 245.379951][ T2016] ? __this_cpu_preempt_check+0x18/0x20 [ 245.385554][ T2016] __x64_sys_mount+0x63/0x70 [ 245.390126][ T2016] do_syscall_64+0x44/0xa0 [ 245.394539][ T2016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 245.400492][ T2016] RIP: 0033:0x7faf9ad5001a [ 245.404891][ T2016] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.424481][ T2016] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 245.432911][ T2016] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 245.440866][ T2016] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 245.448890][ T2016] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 245.456866][ T2016] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x406, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800700000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08007e0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 245.464833][ T2016] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x500, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 72) 03:26:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000032) 03:26:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0808800000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 245.566342][ T2035] loop2: detected capacity change from 0 to 262160 [ 245.582170][ T2035] FAULT_INJECTION: forcing a failure. [ 245.582170][ T2035] name failslab, interval 1, probability 0, space 0, times 0 [ 245.594827][ T2035] CPU: 0 PID: 2035 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 245.603214][ T2035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.613331][ T2035] Call Trace: [ 245.616607][ T2035] dump_stack_lvl+0xd6/0x122 [ 245.621212][ T2035] dump_stack+0x11/0x1b [ 245.625368][ T2035] should_fail+0x23c/0x250 [ 245.629789][ T2035] ? __list_lru_init+0x332/0x680 [ 245.634825][ T2035] __should_failslab+0x81/0x90 [ 245.639687][ T2035] should_failslab+0x5/0x20 [ 245.644200][ T2035] kmem_cache_alloc_trace+0x52/0x350 [ 245.649530][ T2035] ? __list_lru_init+0x332/0x680 [ 245.654474][ T2035] __list_lru_init+0x332/0x680 [ 245.659235][ T2035] alloc_super+0x490/0x520 [ 245.663710][ T2035] ? mount_bdev+0x290/0x290 [ 245.668303][ T2035] sget+0x189/0x370 [ 245.672199][ T2035] ? test_bdev_super+0x30/0x30 [ 245.676963][ T2035] mount_bdev+0xd3/0x290 [ 245.681209][ T2035] ? vfat_mount+0x40/0x40 [ 245.685604][ T2035] ? tsan.module_ctor+0x10/0x10 [ 245.690455][ T2035] vfat_mount+0x2d/0x40 [ 245.694617][ T2035] legacy_get_tree+0x70/0xc0 [ 245.699249][ T2035] vfs_get_tree+0x4a/0x1a0 [ 245.703668][ T2035] path_mount+0x11cf/0x1c40 [ 245.708165][ T2035] __se_sys_mount+0x24b/0x2f0 [ 245.712895][ T2035] ? __this_cpu_preempt_check+0x18/0x20 [ 245.718443][ T2035] __x64_sys_mount+0x63/0x70 [ 245.723029][ T2035] do_syscall_64+0x44/0xa0 [ 245.727457][ T2035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 245.733387][ T2035] RIP: 0033:0x7faf9ad5001a [ 245.737792][ T2035] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.757390][ T2035] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 245.765838][ T2035] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 245.773802][ T2035] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 245.781760][ T2035] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 245.789914][ T2035] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 245.797874][ T2035] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x604, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fdef0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 245.815772][ T2040] loop4: detected capacity change from 0 to 262160 03:26:34 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000f00) 03:26:34 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000b) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf00, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 73) 03:26:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08effd0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000033) 03:26:34 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000f01) 03:26:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fffe0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 246.516289][ T2059] loop2: detected capacity change from 0 to 262160 [ 246.525104][ T2061] loop4: detected capacity change from 0 to 262160 [ 246.534691][ T2059] FAULT_INJECTION: forcing a failure. [ 246.534691][ T2059] name failslab, interval 1, probability 0, space 0, times 0 [ 246.547302][ T2059] CPU: 0 PID: 2059 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 246.555622][ T2059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.565726][ T2059] Call Trace: [ 246.568993][ T2059] dump_stack_lvl+0xd6/0x122 [ 246.573571][ T2059] dump_stack+0x11/0x1b [ 246.577713][ T2059] should_fail+0x23c/0x250 [ 246.582190][ T2059] ? __list_lru_init+0x332/0x680 [ 246.587137][ T2059] __should_failslab+0x81/0x90 [ 246.591898][ T2059] should_failslab+0x5/0x20 [ 246.596456][ T2059] kmem_cache_alloc_trace+0x52/0x350 [ 246.601737][ T2059] ? __list_lru_init+0x332/0x680 [ 246.606661][ T2059] __list_lru_init+0x332/0x680 [ 246.611409][ T2059] alloc_super+0x490/0x520 [ 246.615862][ T2059] ? mount_bdev+0x290/0x290 [ 246.620351][ T2059] sget+0x189/0x370 [ 246.624154][ T2059] ? test_bdev_super+0x30/0x30 [ 246.628963][ T2059] mount_bdev+0xd3/0x290 [ 246.633187][ T2059] ? vfat_mount+0x40/0x40 [ 246.637569][ T2059] ? tsan.module_ctor+0x10/0x10 [ 246.642471][ T2059] vfat_mount+0x2d/0x40 [ 246.646637][ T2059] legacy_get_tree+0x70/0xc0 [ 246.651207][ T2059] vfs_get_tree+0x4a/0x1a0 [ 246.655613][ T2059] path_mount+0x11cf/0x1c40 [ 246.660100][ T2059] __se_sys_mount+0x24b/0x2f0 [ 246.664830][ T2059] __x64_sys_mount+0x63/0x70 [ 246.669404][ T2059] do_syscall_64+0x44/0xa0 [ 246.673806][ T2059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 246.679685][ T2059] RIP: 0033:0x7faf9ad5001a [ 246.684103][ T2059] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.703696][ T2059] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x1800, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08feff0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 246.712134][ T2059] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 246.720128][ T2059] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 246.728085][ T2059] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 246.736172][ T2059] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 246.744126][ T2059] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 74) 03:26:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000800732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 246.850567][ T2074] loop2: detected capacity change from 0 to 262160 [ 246.866953][ T2074] FAULT_INJECTION: forcing a failure. [ 246.866953][ T2074] name failslab, interval 1, probability 0, space 0, times 0 [ 246.879590][ T2074] CPU: 1 PID: 2074 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 246.887979][ T2074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.898038][ T2074] Call Trace: [ 246.901310][ T2074] dump_stack_lvl+0xd6/0x122 [ 246.905930][ T2074] dump_stack+0x11/0x1b [ 246.910104][ T2074] should_fail+0x23c/0x250 [ 246.914513][ T2074] ? __list_lru_init+0x332/0x680 [ 246.919480][ T2074] __should_failslab+0x81/0x90 [ 246.924245][ T2074] should_failslab+0x5/0x20 [ 246.928746][ T2074] kmem_cache_alloc_trace+0x52/0x350 [ 246.934047][ T2074] ? __list_lru_init+0x332/0x680 [ 246.938976][ T2074] __list_lru_init+0x332/0x680 [ 246.943741][ T2074] alloc_super+0x490/0x520 [ 246.948150][ T2074] ? mount_bdev+0x290/0x290 [ 246.952645][ T2074] sget+0x189/0x370 [ 246.956496][ T2074] ? test_bdev_super+0x30/0x30 [ 246.961342][ T2074] mount_bdev+0xd3/0x290 [ 246.965679][ T2074] ? vfat_mount+0x40/0x40 [ 246.970105][ T2074] ? tsan.module_ctor+0x10/0x10 [ 246.974969][ T2074] vfat_mount+0x2d/0x40 [ 246.979252][ T2074] legacy_get_tree+0x70/0xc0 [ 246.983865][ T2074] vfs_get_tree+0x4a/0x1a0 [ 246.988281][ T2074] path_mount+0x11cf/0x1c40 [ 246.992783][ T2074] __se_sys_mount+0x24b/0x2f0 [ 246.997466][ T2074] ? __this_cpu_preempt_check+0x18/0x20 [ 247.003051][ T2074] __x64_sys_mount+0x63/0x70 [ 247.007631][ T2074] do_syscall_64+0x44/0xa0 [ 247.012043][ T2074] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.017938][ T2074] RIP: 0033:0x7faf9ad5001a [ 247.022369][ T2074] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.041973][ T2074] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 247.050377][ T2074] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 247.058367][ T2074] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 247.066402][ T2074] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 247.074473][ T2074] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 247.082536][ T2074] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:35 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000c) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0840000800732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000034) 03:26:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 75) 03:26:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2600, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:35 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001001) 03:26:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x3f00, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 247.532405][ T2093] loop2: detected capacity change from 0 to 262160 [ 247.539472][ T2088] loop4: detected capacity change from 0 to 262160 [ 247.570404][ T2093] FAULT_INJECTION: forcing a failure. [ 247.570404][ T2093] name failslab, interval 1, probability 0, space 0, times 0 [ 247.583118][ T2093] CPU: 0 PID: 2093 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 247.591513][ T2093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.601557][ T2093] Call Trace: [ 247.604830][ T2093] dump_stack_lvl+0xd6/0x122 [ 247.609445][ T2093] dump_stack+0x11/0x1b [ 247.613625][ T2093] should_fail+0x23c/0x250 [ 247.618041][ T2093] ? __list_lru_init+0x332/0x680 [ 247.622979][ T2093] __should_failslab+0x81/0x90 [ 247.627816][ T2093] should_failslab+0x5/0x20 [ 247.632319][ T2093] kmem_cache_alloc_trace+0x52/0x350 [ 247.637681][ T2093] ? __list_lru_init+0x332/0x680 [ 247.642714][ T2093] __list_lru_init+0x332/0x680 [ 247.647482][ T2093] alloc_super+0x490/0x520 [ 247.651892][ T2093] ? mount_bdev+0x290/0x290 [ 247.656393][ T2093] sget+0x189/0x370 [ 247.660305][ T2093] ? test_bdev_super+0x30/0x30 [ 247.665093][ T2093] mount_bdev+0xd3/0x290 [ 247.669417][ T2093] ? vfat_mount+0x40/0x40 [ 247.673821][ T2093] ? tsan.module_ctor+0x10/0x10 [ 247.678675][ T2093] vfat_mount+0x2d/0x40 [ 247.682904][ T2093] legacy_get_tree+0x70/0xc0 [ 247.687492][ T2093] vfs_get_tree+0x4a/0x1a0 [ 247.691905][ T2093] path_mount+0x11cf/0x1c40 [ 247.696500][ T2093] __se_sys_mount+0x24b/0x2f0 [ 247.701175][ T2093] __x64_sys_mount+0x63/0x70 [ 247.705764][ T2093] do_syscall_64+0x44/0xa0 [ 247.710293][ T2093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 247.716187][ T2093] RIP: 0033:0x7faf9ad5001a [ 247.720662][ T2093] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.740415][ T2093] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 247.748829][ T2093] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 247.756796][ T2093] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 247.764762][ T2093] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 247.772730][ T2093] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800001000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x4000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 247.780699][ T2093] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800002000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000035) 03:26:36 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001100) [ 247.906037][ T2213] loop4: detected capacity change from 0 to 262160 03:26:36 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000d) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 76) 03:26:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0808002000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x7000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000036) [ 248.079312][ T2225] loop2: detected capacity change from 0 to 262160 [ 248.094407][ T2224] loop4: detected capacity change from 0 to 262160 [ 248.114358][ T2225] FAULT_INJECTION: forcing a failure. [ 248.114358][ T2225] name failslab, interval 1, probability 0, space 0, times 0 [ 248.126992][ T2225] CPU: 0 PID: 2225 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 248.135336][ T2225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.145387][ T2225] Call Trace: [ 248.148660][ T2225] dump_stack_lvl+0xd6/0x122 [ 248.153359][ T2225] dump_stack+0x11/0x1b [ 248.157511][ T2225] should_fail+0x23c/0x250 [ 248.161926][ T2225] ? __list_lru_init+0x332/0x680 [ 248.166864][ T2225] __should_failslab+0x81/0x90 [ 248.171684][ T2225] should_failslab+0x5/0x20 [ 248.176236][ T2225] kmem_cache_alloc_trace+0x52/0x350 [ 248.181522][ T2225] ? __list_lru_init+0x332/0x680 [ 248.186460][ T2225] __list_lru_init+0x332/0x680 [ 248.191317][ T2225] alloc_super+0x490/0x520 [ 248.195753][ T2225] ? mount_bdev+0x290/0x290 [ 248.200263][ T2225] sget+0x189/0x370 [ 248.204146][ T2225] ? test_bdev_super+0x30/0x30 [ 248.208914][ T2225] mount_bdev+0xd3/0x290 [ 248.213159][ T2225] ? vfat_mount+0x40/0x40 [ 248.217506][ T2225] ? tsan.module_ctor+0x10/0x10 [ 248.222419][ T2225] vfat_mount+0x2d/0x40 [ 248.226580][ T2225] legacy_get_tree+0x70/0xc0 [ 248.231190][ T2225] vfs_get_tree+0x4a/0x1a0 [ 248.235602][ T2225] path_mount+0x11cf/0x1c40 [ 248.240178][ T2225] __se_sys_mount+0x24b/0x2f0 [ 248.244855][ T2225] __x64_sys_mount+0x63/0x70 [ 248.249606][ T2225] do_syscall_64+0x44/0xa0 [ 248.254032][ T2225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 248.259952][ T2225] RIP: 0033:0x7faf9ad5001a 03:26:36 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001200) 03:26:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb087ffff000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 248.264365][ T2225] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.283982][ T2225] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 248.292386][ T2225] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 248.300376][ T2225] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 248.308342][ T2225] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 248.316310][ T2225] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfeff, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000001732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 248.324330][ T2225] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 77) 03:26:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfffe, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000002732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 248.429429][ T2240] loop2: detected capacity change from 0 to 262160 [ 248.468126][ T2240] FAULT_INJECTION: forcing a failure. [ 248.468126][ T2240] name failslab, interval 1, probability 0, space 0, times 0 [ 248.480760][ T2240] CPU: 1 PID: 2240 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 248.489153][ T2240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.499202][ T2240] Call Trace: [ 248.502477][ T2240] dump_stack_lvl+0xd6/0x122 [ 248.507228][ T2240] dump_stack+0x11/0x1b [ 248.511381][ T2240] should_fail+0x23c/0x250 [ 248.515796][ T2240] ? __list_lru_init+0x70/0x680 [ 248.520643][ T2240] __should_failslab+0x81/0x90 [ 248.525405][ T2240] should_failslab+0x5/0x20 [ 248.529949][ T2240] __kmalloc+0x6f/0x370 [ 248.534100][ T2240] ? __list_lru_init+0x332/0x680 [ 248.539050][ T2240] __list_lru_init+0x70/0x680 [ 248.543777][ T2240] alloc_super+0x4bf/0x520 [ 248.548191][ T2240] ? mount_bdev+0x290/0x290 [ 248.552738][ T2240] sget+0x189/0x370 [ 248.556543][ T2240] ? test_bdev_super+0x30/0x30 [ 248.561378][ T2240] mount_bdev+0xd3/0x290 [ 248.565704][ T2240] ? vfat_mount+0x40/0x40 [ 248.570175][ T2240] ? tsan.module_ctor+0x10/0x10 [ 248.575091][ T2240] vfat_mount+0x2d/0x40 [ 248.579261][ T2240] legacy_get_tree+0x70/0xc0 [ 248.583845][ T2240] vfs_get_tree+0x4a/0x1a0 [ 248.588257][ T2240] path_mount+0x11cf/0x1c40 [ 248.592751][ T2240] __se_sys_mount+0x24b/0x2f0 [ 248.597426][ T2240] ? __this_cpu_preempt_check+0x18/0x20 [ 248.602970][ T2240] __x64_sys_mount+0x63/0x70 [ 248.607551][ T2240] do_syscall_64+0x44/0xa0 [ 248.611960][ T2240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 248.617852][ T2240] RIP: 0033:0x7faf9ad5001a [ 248.622312][ T2240] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.642004][ T2240] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 248.650470][ T2240] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 248.658438][ T2240] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 248.666400][ T2240] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 248.674368][ T2240] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 248.682376][ T2240] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:37 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000000f) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x80000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000402732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 78) 03:26:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000037) 03:26:37 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001300) 03:26:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000003732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 249.264310][ T2256] loop2: detected capacity change from 0 to 262160 [ 249.271621][ T2256] FAULT_INJECTION: forcing a failure. [ 249.271621][ T2256] name failslab, interval 1, probability 0, space 0, times 0 [ 249.284264][ T2256] CPU: 0 PID: 2256 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 249.292590][ T2256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.302639][ T2256] Call Trace: [ 249.305918][ T2256] dump_stack_lvl+0xd6/0x122 [ 249.310516][ T2256] dump_stack+0x11/0x1b [ 249.314750][ T2256] should_fail+0x23c/0x250 [ 249.319169][ T2256] __should_failslab+0x81/0x90 [ 249.323946][ T2256] should_failslab+0x5/0x20 [ 249.328498][ T2256] kmem_cache_alloc_node_trace+0x61/0x310 [ 249.334258][ T2256] ? should_fail+0xd6/0x250 [ 249.338846][ T2256] ? __kmalloc_node+0x30/0x40 [ 249.343520][ T2256] __kmalloc_node+0x30/0x40 [ 249.348104][ T2256] kvmalloc_node+0x81/0x110 [ 249.352657][ T2256] __list_lru_init+0x2d7/0x680 [ 249.357423][ T2256] alloc_super+0x4bf/0x520 [ 249.361855][ T2256] ? mount_bdev+0x290/0x290 [ 249.366358][ T2256] sget+0x189/0x370 [ 249.370169][ T2256] ? test_bdev_super+0x30/0x30 [ 249.374953][ T2256] mount_bdev+0xd3/0x290 [ 249.379201][ T2256] ? vfat_mount+0x40/0x40 [ 249.383543][ T2256] ? tsan.module_ctor+0x10/0x10 [ 249.388460][ T2256] vfat_mount+0x2d/0x40 [ 249.392614][ T2256] legacy_get_tree+0x70/0xc0 [ 249.397200][ T2256] vfs_get_tree+0x4a/0x1a0 [ 249.401620][ T2256] path_mount+0x11cf/0x1c40 [ 249.406186][ T2256] __se_sys_mount+0x24b/0x2f0 [ 249.410910][ T2256] __x64_sys_mount+0x63/0x70 [ 249.415589][ T2256] do_syscall_64+0x44/0xa0 [ 249.420001][ T2256] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.425962][ T2256] RIP: 0033:0x7faf9ad5001a [ 249.430376][ T2256] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.449984][ T2256] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x80040, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 249.458486][ T2256] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 249.466474][ T2256] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 249.474477][ T2256] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 249.482444][ T2256] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 249.490436][ T2256] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 249.503870][ T2264] loop4: detected capacity change from 0 to 262160 03:26:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000004732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x200000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 79) 03:26:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000005732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 249.627531][ T2274] loop2: detected capacity change from 0 to 262160 [ 249.644052][ T2274] FAULT_INJECTION: forcing a failure. [ 249.644052][ T2274] name failslab, interval 1, probability 0, space 0, times 0 [ 249.656807][ T2274] CPU: 1 PID: 2274 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 249.665132][ T2274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.675203][ T2274] Call Trace: [ 249.678479][ T2274] dump_stack_lvl+0xd6/0x122 [ 249.683171][ T2274] dump_stack+0x11/0x1b [ 249.687329][ T2274] should_fail+0x23c/0x250 [ 249.691849][ T2274] ? __list_lru_init+0x332/0x680 [ 249.696779][ T2274] __should_failslab+0x81/0x90 [ 249.701538][ T2274] should_failslab+0x5/0x20 [ 249.706086][ T2274] kmem_cache_alloc_trace+0x52/0x350 [ 249.711396][ T2274] ? __kmalloc_node+0x30/0x40 [ 249.716074][ T2274] __list_lru_init+0x332/0x680 [ 249.720831][ T2274] alloc_super+0x4bf/0x520 [ 249.725243][ T2274] ? mount_bdev+0x290/0x290 [ 249.729766][ T2274] sget+0x189/0x370 [ 249.733573][ T2274] ? test_bdev_super+0x30/0x30 [ 249.738334][ T2274] mount_bdev+0xd3/0x290 [ 249.742572][ T2274] ? vfat_mount+0x40/0x40 [ 249.746896][ T2274] ? tsan.module_ctor+0x10/0x10 [ 249.751739][ T2274] vfat_mount+0x2d/0x40 [ 249.755896][ T2274] legacy_get_tree+0x70/0xc0 [ 249.760480][ T2274] vfs_get_tree+0x4a/0x1a0 [ 249.764891][ T2274] path_mount+0x11cf/0x1c40 [ 249.769398][ T2274] __se_sys_mount+0x24b/0x2f0 [ 249.774140][ T2274] ? __this_cpu_preempt_check+0x18/0x20 [ 249.779751][ T2274] __x64_sys_mount+0x63/0x70 [ 249.784333][ T2274] do_syscall_64+0x44/0xa0 [ 249.788744][ T2274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 249.794630][ T2274] RIP: 0033:0x7faf9ad5001a [ 249.799099][ T2274] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.818729][ T2274] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 249.827185][ T2274] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 249.835153][ T2274] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 249.843234][ T2274] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 249.851238][ T2274] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 249.859202][ T2274] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:38 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000010) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000038) 03:26:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000406732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x1000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 80) [ 250.024531][ T2280] loop2: detected capacity change from 0 to 262160 [ 250.031896][ T2280] FAULT_INJECTION: forcing a failure. [ 250.031896][ T2280] name failslab, interval 1, probability 0, space 0, times 0 [ 250.044513][ T2280] CPU: 0 PID: 2280 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 250.052843][ T2280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.062887][ T2280] Call Trace: [ 250.066245][ T2280] dump_stack_lvl+0xd6/0x122 [ 250.070845][ T2280] dump_stack+0x11/0x1b [ 250.075006][ T2280] should_fail+0x23c/0x250 [ 250.079489][ T2280] ? __list_lru_init+0x332/0x680 [ 250.084482][ T2280] __should_failslab+0x81/0x90 [ 250.089246][ T2280] should_failslab+0x5/0x20 [ 250.093792][ T2280] kmem_cache_alloc_trace+0x52/0x350 [ 250.099097][ T2280] ? __list_lru_init+0x332/0x680 [ 250.104034][ T2280] __list_lru_init+0x332/0x680 [ 250.108795][ T2280] alloc_super+0x4bf/0x520 [ 250.113202][ T2280] ? mount_bdev+0x290/0x290 [ 250.117709][ T2280] sget+0x189/0x370 [ 250.121510][ T2280] ? test_bdev_super+0x30/0x30 [ 250.126271][ T2280] mount_bdev+0xd3/0x290 [ 250.130516][ T2280] ? vfat_mount+0x40/0x40 [ 250.134865][ T2280] ? tsan.module_ctor+0x10/0x10 [ 250.139714][ T2280] vfat_mount+0x2d/0x40 [ 250.143926][ T2280] legacy_get_tree+0x70/0xc0 [ 250.148527][ T2280] vfs_get_tree+0x4a/0x1a0 [ 250.152945][ T2280] path_mount+0x11cf/0x1c40 [ 250.157498][ T2280] __se_sys_mount+0x24b/0x2f0 [ 250.162168][ T2280] __x64_sys_mount+0x63/0x70 [ 250.166800][ T2280] do_syscall_64+0x44/0xa0 [ 250.171288][ T2280] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 250.177180][ T2280] RIP: 0033:0x7faf9ad5001a [ 250.181586][ T2280] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.201187][ T2280] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 250.209596][ T2280] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 250.217597][ T2280] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 250.225562][ T2280] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 250.233526][ T2280] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 250.241497][ T2280] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 250.257312][ T2282] loop4: detected capacity change from 0 to 262160 03:26:38 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001400) 03:26:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000008732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 250.269806][ T2282] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 03:26:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800200008732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 81) 03:26:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800008008732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 250.375500][ T2300] loop2: detected capacity change from 0 to 262160 [ 250.395185][ T2300] FAULT_INJECTION: forcing a failure. [ 250.395185][ T2300] name failslab, interval 1, probability 0, space 0, times 0 [ 250.407843][ T2300] CPU: 0 PID: 2300 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 03:26:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000018732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 250.416252][ T2300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.426298][ T2300] Call Trace: [ 250.429568][ T2300] dump_stack_lvl+0xd6/0x122 [ 250.433178][ T2282] loop4: detected capacity change from 0 to 262160 [ 250.434157][ T2300] dump_stack+0x11/0x1b [ 250.444559][ T2282] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 250.444810][ T2300] should_fail+0x23c/0x250 [ 250.458040][ T2300] ? __list_lru_init+0x332/0x680 [ 250.462973][ T2300] __should_failslab+0x81/0x90 [ 250.467822][ T2300] should_failslab+0x5/0x20 [ 250.472360][ T2300] kmem_cache_alloc_trace+0x52/0x350 [ 250.477651][ T2300] ? __list_lru_init+0x332/0x680 [ 250.482588][ T2300] __list_lru_init+0x332/0x680 [ 250.487353][ T2300] alloc_super+0x4bf/0x520 [ 250.491771][ T2300] ? mount_bdev+0x290/0x290 [ 250.496354][ T2300] sget+0x189/0x370 [ 250.500186][ T2300] ? test_bdev_super+0x30/0x30 [ 250.504956][ T2300] mount_bdev+0xd3/0x290 [ 250.509224][ T2300] ? vfat_mount+0x40/0x40 [ 250.513574][ T2300] ? tsan.module_ctor+0x10/0x10 [ 250.518430][ T2300] vfat_mount+0x2d/0x40 [ 250.522588][ T2300] legacy_get_tree+0x70/0xc0 [ 250.527190][ T2300] vfs_get_tree+0x4a/0x1a0 [ 250.531608][ T2300] path_mount+0x11cf/0x1c40 [ 250.536131][ T2300] __se_sys_mount+0x24b/0x2f0 [ 250.540806][ T2300] ? __this_cpu_preempt_check+0x18/0x20 [ 250.546357][ T2300] __x64_sys_mount+0x63/0x70 [ 250.550943][ T2300] do_syscall_64+0x44/0xa0 [ 250.555365][ T2300] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 250.561304][ T2300] RIP: 0033:0x7faf9ad5001a [ 250.565718][ T2300] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.595478][ T2300] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 250.603886][ T2300] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 250.611943][ T2300] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 250.619939][ T2300] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 250.627992][ T2300] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 250.636077][ T2300] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:39 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000011) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000026732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2040000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 82) 03:26:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000039) 03:26:39 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001500) 03:26:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x4000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 250.995067][ T2317] loop2: detected capacity change from 0 to 262160 [ 251.002427][ T2318] loop4: detected capacity change from 0 to 262160 [ 251.027426][ T2317] FAULT_INJECTION: forcing a failure. [ 251.027426][ T2317] name failslab, interval 1, probability 0, space 0, times 0 [ 251.040089][ T2317] CPU: 0 PID: 2317 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 251.048416][ T2317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.058475][ T2317] Call Trace: [ 251.061772][ T2317] dump_stack_lvl+0xd6/0x122 [ 251.066374][ T2317] dump_stack+0x11/0x1b [ 251.070560][ T2317] should_fail+0x23c/0x250 [ 251.074991][ T2317] ? __list_lru_init+0x332/0x680 [ 251.080025][ T2317] __should_failslab+0x81/0x90 [ 251.084796][ T2317] should_failslab+0x5/0x20 [ 251.089323][ T2317] kmem_cache_alloc_trace+0x52/0x350 [ 251.094614][ T2317] ? __list_lru_init+0x332/0x680 [ 251.099609][ T2317] __list_lru_init+0x332/0x680 [ 251.104463][ T2317] alloc_super+0x4bf/0x520 [ 251.108899][ T2317] ? mount_bdev+0x290/0x290 [ 251.113427][ T2317] sget+0x189/0x370 [ 251.117348][ T2317] ? test_bdev_super+0x30/0x30 [ 251.122113][ T2317] mount_bdev+0xd3/0x290 [ 251.126456][ T2317] ? vfat_mount+0x40/0x40 [ 251.130793][ T2317] ? tsan.module_ctor+0x10/0x10 [ 251.135644][ T2317] vfat_mount+0x2d/0x40 [ 251.139801][ T2317] legacy_get_tree+0x70/0xc0 [ 251.144488][ T2317] vfs_get_tree+0x4a/0x1a0 [ 251.148950][ T2317] path_mount+0x11cf/0x1c40 [ 251.153450][ T2317] __se_sys_mount+0x24b/0x2f0 [ 251.158129][ T2317] __x64_sys_mount+0x63/0x70 [ 251.162782][ T2317] do_syscall_64+0x44/0xa0 [ 251.167237][ T2317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.173164][ T2317] RIP: 0033:0x7faf9ad5001a 03:26:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x5000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000003f732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x6040000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 251.177574][ T2317] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.197255][ T2317] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 251.205663][ T2317] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 251.213726][ T2317] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 251.221717][ T2317] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 251.230035][ T2317] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 251.238011][ T2317] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000040732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800080040732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000201) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000070732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 83) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000007e732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003a) [ 251.373883][ T2343] loop2: detected capacity change from 0 to 262160 [ 251.403242][ T2343] FAULT_INJECTION: forcing a failure. [ 251.403242][ T2343] name failslab, interval 1, probability 0, space 0, times 0 [ 251.415902][ T2343] CPU: 0 PID: 2343 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 251.424223][ T2343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.434268][ T2343] Call Trace: [ 251.437582][ T2343] dump_stack_lvl+0xd6/0x122 [ 251.442242][ T2343] dump_stack+0x11/0x1b [ 251.446430][ T2343] should_fail+0x23c/0x250 [ 251.450845][ T2343] ? __list_lru_init+0x332/0x680 [ 251.455776][ T2343] __should_failslab+0x81/0x90 [ 251.460556][ T2343] should_failslab+0x5/0x20 [ 251.465127][ T2343] kmem_cache_alloc_trace+0x52/0x350 [ 251.470430][ T2343] ? __list_lru_init+0x332/0x680 [ 251.475388][ T2343] __list_lru_init+0x332/0x680 [ 251.480179][ T2343] alloc_super+0x4bf/0x520 [ 251.484642][ T2343] ? mount_bdev+0x290/0x290 [ 251.489156][ T2343] sget+0x189/0x370 [ 251.493128][ T2343] ? test_bdev_super+0x30/0x30 [ 251.497991][ T2343] mount_bdev+0xd3/0x290 [ 251.502275][ T2343] ? vfat_mount+0x40/0x40 [ 251.506603][ T2343] ? tsan.module_ctor+0x10/0x10 [ 251.511461][ T2343] vfat_mount+0x2d/0x40 [ 251.515824][ T2343] legacy_get_tree+0x70/0xc0 [ 251.520451][ T2343] vfs_get_tree+0x4a/0x1a0 [ 251.524871][ T2343] path_mount+0x11cf/0x1c40 [ 251.529427][ T2343] __se_sys_mount+0x24b/0x2f0 [ 251.534097][ T2343] __x64_sys_mount+0x63/0x70 [ 251.538702][ T2343] do_syscall_64+0x44/0xa0 [ 251.543158][ T2343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.549105][ T2343] RIP: 0033:0x7faf9ad5001a [ 251.553517][ T2343] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.573126][ T2343] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 251.581541][ T2343] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 251.589511][ T2343] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 251.597519][ T2343] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 251.605484][ T2343] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 251.613446][ T2343] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x8000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 251.646587][ T2350] loop4: detected capacity change from 0 to 262160 03:26:39 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001600) 03:26:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800f0ff7f732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 84) 03:26:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003b) [ 251.736268][ T2362] loop2: detected capacity change from 0 to 262160 [ 251.757152][ T2362] FAULT_INJECTION: forcing a failure. [ 251.757152][ T2362] name failslab, interval 1, probability 0, space 0, times 0 [ 251.769791][ T2362] CPU: 1 PID: 2362 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 251.778110][ T2362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.788236][ T2362] Call Trace: [ 251.791511][ T2362] dump_stack_lvl+0xd6/0x122 [ 251.796112][ T2362] dump_stack+0x11/0x1b [ 251.800315][ T2362] should_fail+0x23c/0x250 [ 251.804730][ T2362] ? __list_lru_init+0x332/0x680 [ 251.809758][ T2362] __should_failslab+0x81/0x90 [ 251.814588][ T2362] should_failslab+0x5/0x20 [ 251.819090][ T2362] kmem_cache_alloc_trace+0x52/0x350 [ 251.824381][ T2362] ? __list_lru_init+0x332/0x680 [ 251.829359][ T2362] __list_lru_init+0x332/0x680 [ 251.834163][ T2362] alloc_super+0x4bf/0x520 [ 251.838572][ T2362] ? mount_bdev+0x290/0x290 [ 251.843149][ T2362] sget+0x189/0x370 [ 251.846963][ T2362] ? test_bdev_super+0x30/0x30 [ 251.851794][ T2362] mount_bdev+0xd3/0x290 [ 251.856033][ T2362] ? vfat_mount+0x40/0x40 [ 251.860355][ T2362] ? tsan.module_ctor+0x10/0x10 [ 251.865353][ T2362] vfat_mount+0x2d/0x40 [ 251.869569][ T2362] legacy_get_tree+0x70/0xc0 [ 251.874153][ T2362] vfs_get_tree+0x4a/0x1a0 [ 251.878564][ T2362] path_mount+0x11cf/0x1c40 [ 251.883103][ T2362] __se_sys_mount+0x24b/0x2f0 [ 251.887785][ T2362] __x64_sys_mount+0x63/0x70 [ 251.892416][ T2362] do_syscall_64+0x44/0xa0 [ 251.896871][ T2362] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 251.902764][ T2362] RIP: 0033:0x7faf9ad5001a [ 251.907193][ T2362] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.926796][ T2362] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fffffdef732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 251.935248][ T2362] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 251.943214][ T2362] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 251.951204][ T2362] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 251.959237][ T2362] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 251.965441][ T2365] loop4: detected capacity change from 0 to 262160 [ 251.967297][ T2362] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 251.996290][ T2365] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value [ 252.144413][ T2365] loop4: detected capacity change from 0 to 262160 [ 252.153158][ T2365] FAT-fs (loop4): Unrecognized mount option "/proc/self/exe" or missing value 03:26:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x18000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fffffff6732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 85) 03:26:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003c) 03:26:40 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000281) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:40 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001700) [ 252.386775][ T2380] loop2: detected capacity change from 0 to 262160 [ 252.395496][ T2382] loop4: detected capacity change from 0 to 262160 [ 252.412910][ T2380] FAULT_INJECTION: forcing a failure. [ 252.412910][ T2380] name failslab, interval 1, probability 0, space 0, times 0 [ 252.425534][ T2380] CPU: 0 PID: 2380 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08fffffffe732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x26000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 252.433913][ T2380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.444007][ T2380] Call Trace: [ 252.447281][ T2380] dump_stack_lvl+0xd6/0x122 [ 252.451957][ T2380] dump_stack+0x11/0x1b [ 252.456117][ T2380] should_fail+0x23c/0x250 [ 252.460549][ T2380] ? __list_lru_init+0x332/0x680 [ 252.465530][ T2380] __should_failslab+0x81/0x90 [ 252.470300][ T2380] should_failslab+0x5/0x20 [ 252.474868][ T2380] kmem_cache_alloc_trace+0x52/0x350 [ 252.480173][ T2380] ? __list_lru_init+0x332/0x680 [ 252.485108][ T2380] __list_lru_init+0x332/0x680 [ 252.489889][ T2380] alloc_super+0x4bf/0x520 [ 252.494334][ T2380] ? mount_bdev+0x290/0x290 [ 252.498845][ T2380] sget+0x189/0x370 [ 252.502709][ T2380] ? test_bdev_super+0x30/0x30 [ 252.507538][ T2380] mount_bdev+0xd3/0x290 [ 252.511777][ T2380] ? vfat_mount+0x40/0x40 [ 252.516183][ T2380] ? tsan.module_ctor+0x10/0x10 [ 252.521063][ T2380] vfat_mount+0x2d/0x40 [ 252.525222][ T2380] legacy_get_tree+0x70/0xc0 [ 252.529814][ T2380] vfs_get_tree+0x4a/0x1a0 [ 252.534305][ T2380] path_mount+0x11cf/0x1c40 [ 252.538817][ T2380] __se_sys_mount+0x24b/0x2f0 [ 252.543561][ T2380] __x64_sys_mount+0x63/0x70 [ 252.548195][ T2380] do_syscall_64+0x44/0xa0 [ 252.552610][ T2380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.558523][ T2380] RIP: 0033:0x7faf9ad5001a [ 252.562975][ T2380] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.582577][ T2380] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 252.590976][ T2380] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 252.598946][ T2380] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 252.606904][ T2380] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 252.614887][ T2380] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 252.622859][ T2380] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08effdffff732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 86) 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08f6ffffff732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08feffffff732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 252.736914][ T2500] loop2: detected capacity change from 0 to 262160 [ 252.752068][ T2500] FAULT_INJECTION: forcing a failure. [ 252.752068][ T2500] name failslab, interval 1, probability 0, space 0, times 0 [ 252.764716][ T2500] CPU: 0 PID: 2500 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 252.773093][ T2500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.783158][ T2500] Call Trace: [ 252.786435][ T2500] dump_stack_lvl+0xd6/0x122 [ 252.791135][ T2500] dump_stack+0x11/0x1b [ 252.795292][ T2500] should_fail+0x23c/0x250 [ 252.799738][ T2500] ? __list_lru_init+0x332/0x680 [ 252.804684][ T2500] __should_failslab+0x81/0x90 [ 252.809515][ T2500] should_failslab+0x5/0x20 [ 252.814124][ T2500] kmem_cache_alloc_trace+0x52/0x350 [ 252.819407][ T2500] ? __list_lru_init+0x332/0x680 [ 252.824374][ T2500] __list_lru_init+0x332/0x680 [ 252.829137][ T2500] alloc_super+0x4bf/0x520 [ 252.833631][ T2500] ? mount_bdev+0x290/0x290 [ 252.838151][ T2500] sget+0x189/0x370 [ 252.842057][ T2500] ? test_bdev_super+0x30/0x30 [ 252.846819][ T2500] mount_bdev+0xd3/0x290 [ 252.851073][ T2500] ? vfat_mount+0x40/0x40 [ 252.855397][ T2500] ? tsan.module_ctor+0x10/0x10 [ 252.860834][ T2500] vfat_mount+0x2d/0x40 [ 252.865009][ T2500] legacy_get_tree+0x70/0xc0 [ 252.869582][ T2500] vfs_get_tree+0x4a/0x1a0 [ 252.873994][ T2500] path_mount+0x11cf/0x1c40 [ 252.878482][ T2500] __se_sys_mount+0x24b/0x2f0 [ 252.883142][ T2500] __x64_sys_mount+0x63/0x70 [ 252.887724][ T2500] do_syscall_64+0x44/0xa0 [ 252.892142][ T2500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 252.898023][ T2500] RIP: 0033:0x7faf9ad5001a [ 252.902439][ T2500] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.922148][ T2500] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x3f000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003d) 03:26:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800020000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 252.930560][ T2500] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 252.938515][ T2500] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 252.946486][ T2500] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 252.954438][ T2500] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 252.962450][ T2500] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 87) [ 253.057942][ T2510] loop4: detected capacity change from 0 to 262160 [ 253.066050][ T2512] loop2: detected capacity change from 0 to 262160 [ 253.079762][ T2512] FAULT_INJECTION: forcing a failure. [ 253.079762][ T2512] name failslab, interval 1, probability 0, space 0, times 0 [ 253.092507][ T2512] CPU: 0 PID: 2512 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 253.100832][ T2512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.110884][ T2512] Call Trace: [ 253.114153][ T2512] dump_stack_lvl+0xd6/0x122 [ 253.118749][ T2512] dump_stack+0x11/0x1b [ 253.122971][ T2512] should_fail+0x23c/0x250 [ 253.127383][ T2512] ? __list_lru_init+0x332/0x680 [ 253.132396][ T2512] __should_failslab+0x81/0x90 [ 253.137159][ T2512] should_failslab+0x5/0x20 [ 253.141758][ T2512] kmem_cache_alloc_trace+0x52/0x350 [ 253.147045][ T2512] ? __list_lru_init+0x332/0x680 [ 253.152033][ T2512] __list_lru_init+0x332/0x680 [ 253.156794][ T2512] alloc_super+0x4bf/0x520 [ 253.161239][ T2512] ? mount_bdev+0x290/0x290 [ 253.165797][ T2512] sget+0x189/0x370 [ 253.169602][ T2512] ? test_bdev_super+0x30/0x30 [ 253.174381][ T2512] mount_bdev+0xd3/0x290 [ 253.178622][ T2512] ? vfat_mount+0x40/0x40 [ 253.183004][ T2512] ? tsan.module_ctor+0x10/0x10 [ 253.187879][ T2512] vfat_mount+0x2d/0x40 [ 253.192162][ T2512] legacy_get_tree+0x70/0xc0 [ 253.196744][ T2512] vfs_get_tree+0x4a/0x1a0 [ 253.201169][ T2512] path_mount+0x11cf/0x1c40 [ 253.205667][ T2512] __se_sys_mount+0x24b/0x2f0 [ 253.210486][ T2512] ? __this_cpu_preempt_check+0x18/0x20 [ 253.216063][ T2512] __x64_sys_mount+0x63/0x70 [ 253.220653][ T2512] do_syscall_64+0x44/0xa0 [ 253.225075][ T2512] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.230966][ T2512] RIP: 0033:0x7faf9ad5001a [ 253.235377][ T2512] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.254977][ T2512] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 253.263388][ T2512] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 253.271355][ T2512] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 253.279334][ T2512] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 253.287293][ T2512] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 253.295328][ T2512] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:41 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000300) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x40000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800030000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000003e) 03:26:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 88) 03:26:41 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001a00) [ 253.459237][ T2529] loop2: detected capacity change from 0 to 262160 [ 253.473194][ T2529] FAULT_INJECTION: forcing a failure. [ 253.473194][ T2529] name failslab, interval 1, probability 0, space 0, times 0 [ 253.485906][ T2529] CPU: 1 PID: 2529 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 253.494230][ T2529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.504279][ T2529] Call Trace: [ 253.507549][ T2529] dump_stack_lvl+0xd6/0x122 [ 253.512146][ T2529] dump_stack+0x11/0x1b [ 253.516298][ T2529] should_fail+0x23c/0x250 [ 253.520707][ T2529] ? __list_lru_init+0x332/0x680 [ 253.525640][ T2529] __should_failslab+0x81/0x90 [ 253.530470][ T2529] should_failslab+0x5/0x20 [ 253.535098][ T2529] kmem_cache_alloc_trace+0x52/0x350 [ 253.540381][ T2529] ? __list_lru_init+0x332/0x680 [ 253.545319][ T2529] __list_lru_init+0x332/0x680 [ 253.550156][ T2529] alloc_super+0x4bf/0x520 [ 253.554589][ T2529] ? mount_bdev+0x290/0x290 [ 253.559116][ T2529] sget+0x189/0x370 [ 253.562943][ T2529] ? test_bdev_super+0x30/0x30 [ 253.567707][ T2529] mount_bdev+0xd3/0x290 [ 253.572003][ T2529] ? vfat_mount+0x40/0x40 [ 253.576330][ T2529] ? tsan.module_ctor+0x10/0x10 [ 253.581230][ T2529] vfat_mount+0x2d/0x40 [ 253.585428][ T2529] legacy_get_tree+0x70/0xc0 [ 253.590034][ T2529] vfs_get_tree+0x4a/0x1a0 [ 253.594445][ T2529] path_mount+0x11cf/0x1c40 [ 253.598976][ T2529] __se_sys_mount+0x24b/0x2f0 [ 253.603645][ T2529] ? __this_cpu_preempt_check+0x18/0x20 [ 253.609247][ T2529] __x64_sys_mount+0x63/0x70 [ 253.613866][ T2529] do_syscall_64+0x44/0xa0 [ 253.618281][ T2529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.624175][ T2529] RIP: 0033:0x7faf9ad5001a [ 253.628581][ T2529] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.648254][ T2529] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:26:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800040000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 253.656730][ T2529] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 253.664689][ T2529] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 253.672650][ T2529] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 253.680617][ T2529] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 253.688588][ T2529] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 [ 253.700554][ T2533] loop4: detected capacity change from 0 to 262160 03:26:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 89) 03:26:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800050000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x40000800, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 253.773903][ T2538] loop2: detected capacity change from 0 to 262160 [ 253.795244][ T2538] FAULT_INJECTION: forcing a failure. [ 253.795244][ T2538] name failslab, interval 1, probability 0, space 0, times 0 [ 253.807878][ T2538] CPU: 0 PID: 2538 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 253.816228][ T2538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.826282][ T2538] Call Trace: [ 253.829618][ T2538] dump_stack_lvl+0xd6/0x122 [ 253.834246][ T2538] dump_stack+0x11/0x1b [ 253.838418][ T2538] should_fail+0x23c/0x250 [ 253.842832][ T2538] ? fat_fill_super+0x88/0x2af0 [ 253.847710][ T2538] __should_failslab+0x81/0x90 [ 253.852557][ T2538] should_failslab+0x5/0x20 [ 253.857062][ T2538] kmem_cache_alloc_trace+0x52/0x350 [ 253.862348][ T2538] ? string+0x1f9/0x210 [ 253.866514][ T2538] ? vfat_fill_super+0x40/0x40 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800080000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 253.871282][ T2538] fat_fill_super+0x88/0x2af0 [ 253.875961][ T2538] ? pointer+0x5aa/0x830 [ 253.880284][ T2538] ? format_decode+0x60b/0x8a0 [ 253.885076][ T2538] ? vsnprintf+0xe8f/0xed0 [ 253.889553][ T2538] ? snprintf+0x83/0xb0 [ 253.893708][ T2538] ? set_blocksize+0x197/0x270 [ 253.898548][ T2538] vfat_fill_super+0x2c/0x40 [ 253.903209][ T2538] mount_bdev+0x1e8/0x290 [ 253.907614][ T2538] ? vfat_mount+0x40/0x40 [ 253.911941][ T2538] ? tsan.module_ctor+0x10/0x10 [ 253.916815][ T2538] vfat_mount+0x2d/0x40 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800100000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 253.921033][ T2538] legacy_get_tree+0x70/0xc0 [ 253.926758][ T2538] vfs_get_tree+0x4a/0x1a0 [ 253.931180][ T2538] path_mount+0x11cf/0x1c40 [ 253.935794][ T2538] __se_sys_mount+0x24b/0x2f0 [ 253.940522][ T2538] ? __this_cpu_preempt_check+0x18/0x20 [ 253.946131][ T2538] __x64_sys_mount+0x63/0x70 [ 253.950722][ T2538] do_syscall_64+0x44/0xa0 [ 253.955172][ T2538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.961068][ T2538] RIP: 0033:0x7faf9ad5001a [ 253.965481][ T2538] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.985085][ T2538] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 253.993493][ T2538] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 254.001474][ T2538] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 254.009440][ T2538] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 254.017406][ T2538] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 254.025375][ T2538] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:42 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000301) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800180000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000041) 03:26:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x70000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800260000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 254.145769][ T2655] loop4: detected capacity change from 0 to 262160 03:26:42 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001b00) 03:26:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 90) 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800700000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf6ffffff, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000042) [ 254.279250][ T2669] loop2: detected capacity change from 0 to 262160 [ 254.294813][ T2669] FAULT_INJECTION: forcing a failure. [ 254.294813][ T2669] name failslab, interval 1, probability 0, space 0, times 0 [ 254.307527][ T2669] CPU: 0 PID: 2669 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 254.315850][ T2669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.325894][ T2669] Call Trace: [ 254.329163][ T2669] dump_stack_lvl+0xd6/0x122 [ 254.333756][ T2669] dump_stack+0x11/0x1b [ 254.337940][ T2669] should_fail+0x23c/0x250 [ 254.342390][ T2669] ? fat_fill_super+0x88/0x2af0 [ 254.346939][ T2673] loop4: detected capacity change from 0 to 262160 [ 254.347236][ T2669] __should_failslab+0x81/0x90 [ 254.358473][ T2669] should_failslab+0x5/0x20 [ 254.363060][ T2669] kmem_cache_alloc_trace+0x52/0x350 [ 254.368352][ T2669] ? string+0x1f9/0x210 [ 254.372505][ T2669] ? vfat_fill_super+0x40/0x40 [ 254.377284][ T2669] fat_fill_super+0x88/0x2af0 [ 254.381977][ T2669] ? pointer+0x5aa/0x830 [ 254.386221][ T2669] ? format_decode+0x60b/0x8a0 [ 254.391029][ T2669] ? vsnprintf+0xe8f/0xed0 [ 254.395449][ T2669] ? snprintf+0x83/0xb0 [ 254.399602][ T2669] ? set_blocksize+0x197/0x270 [ 254.404423][ T2669] vfat_fill_super+0x2c/0x40 [ 254.409017][ T2669] mount_bdev+0x1e8/0x290 [ 254.413349][ T2669] ? vfat_mount+0x40/0x40 [ 254.417731][ T2669] ? tsan.module_ctor+0x10/0x10 [ 254.422646][ T2669] vfat_mount+0x2d/0x40 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08007e0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 254.426803][ T2669] legacy_get_tree+0x70/0xc0 [ 254.431389][ T2669] vfs_get_tree+0x4a/0x1a0 [ 254.435803][ T2669] path_mount+0x11cf/0x1c40 [ 254.440306][ T2669] __se_sys_mount+0x24b/0x2f0 [ 254.444974][ T2669] ? __this_cpu_preempt_check+0x18/0x20 [ 254.450541][ T2669] __x64_sys_mount+0x63/0x70 [ 254.455131][ T2669] do_syscall_64+0x44/0xa0 [ 254.459547][ T2669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 254.465534][ T2669] RIP: 0033:0x7faf9ad5001a [ 254.469938][ T2669] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 254.489543][ T2669] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 254.498057][ T2669] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 254.506023][ T2669] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 254.513991][ T2669] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 254.521970][ T2669] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 03:26:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800fe0000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 254.529960][ T2669] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:43 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000501) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000043) 03:26:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfeffffff, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 91) 03:26:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800040200732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:43 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001d00) 03:26:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000300732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xffffff7f, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 255.007041][ T2690] loop2: detected capacity change from 0 to 262160 [ 255.025033][ T2688] loop4: detected capacity change from 0 to 262160 [ 255.045260][ T2690] FAULT_INJECTION: forcing a failure. [ 255.045260][ T2690] name failslab, interval 1, probability 0, space 0, times 0 [ 255.057880][ T2690] CPU: 0 PID: 2690 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 255.066306][ T2690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.076356][ T2690] Call Trace: [ 255.079632][ T2690] dump_stack_lvl+0xd6/0x122 [ 255.084232][ T2690] dump_stack+0x11/0x1b [ 255.088388][ T2690] should_fail+0x23c/0x250 [ 255.092799][ T2690] __should_failslab+0x81/0x90 [ 255.097586][ T2690] should_failslab+0x5/0x20 [ 255.102195][ T2690] kmem_cache_alloc_node+0x61/0x2d0 [ 255.107583][ T2690] ? create_task_io_context+0x36/0x1e0 [ 255.113089][ T2690] create_task_io_context+0x36/0x1e0 [ 255.118374][ T2690] submit_bio_checks+0x828/0x8e0 [ 255.123347][ T2690] ? blk_try_enter_queue+0xee/0x1f0 [ 255.128579][ T2690] __submit_bio+0x2de/0x480 [ 255.133080][ T2690] ? mempool_alloc_slab+0x16/0x20 [ 255.138143][ T2690] ? mempool_free+0x130/0x130 [ 255.142830][ T2690] submit_bio_noacct+0x418/0x4e0 [ 255.147753][ T2690] submit_bio+0x10c/0x180 [ 255.152065][ T2690] submit_bh_wbc+0x2db/0x320 [ 255.156645][ T2690] __bread_gfp+0x110/0x220 [ 255.161045][ T2690] fat_fill_super+0xece/0x2af0 [ 255.165797][ T2690] vfat_fill_super+0x2c/0x40 [ 255.170465][ T2690] mount_bdev+0x1e8/0x290 [ 255.174787][ T2690] ? vfat_mount+0x40/0x40 [ 255.179101][ T2690] ? tsan.module_ctor+0x10/0x10 [ 255.184012][ T2690] vfat_mount+0x2d/0x40 [ 255.188159][ T2690] legacy_get_tree+0x70/0xc0 [ 255.192732][ T2690] vfs_get_tree+0x4a/0x1a0 [ 255.197141][ T2690] path_mount+0x11cf/0x1c40 [ 255.201631][ T2690] __se_sys_mount+0x24b/0x2f0 [ 255.206312][ T2690] ? __this_cpu_preempt_check+0x18/0x20 [ 255.211845][ T2690] __x64_sys_mount+0x63/0x70 [ 255.216434][ T2690] do_syscall_64+0x44/0xa0 [ 255.220833][ T2690] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 255.226746][ T2690] RIP: 0033:0x7faf9ad5001a [ 255.231145][ T2690] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800020400732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 255.250815][ T2690] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 255.259273][ T2690] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad5001a [ 255.267229][ T2690] RDX: 0000000020000040 RSI: 0000000020000100 RDI: 00007faf98ac5000 [ 255.275185][ T2690] RBP: 00007faf98ac5040 R08: 00007faf98ac5040 R09: 0000000020000040 [ 255.283140][ T2690] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000020000040 [ 255.291170][ T2690] R13: 0000000020000100 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800060400732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000044) 03:26:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfffffff6, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 255.424391][ T2710] loop4: detected capacity change from 0 to 262160 03:26:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000601) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 92) 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000500732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfffffffe, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000045) 03:26:44 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001e00) 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x80000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800040600732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 255.964251][ T2717] loop4: detected capacity change from 0 to 262160 [ 255.991921][ T2722] loop2: detected capacity change from 0 to 262160 [ 256.033110][ T2722] FAULT_INJECTION: forcing a failure. [ 256.033110][ T2722] name failslab, interval 1, probability 0, space 0, times 0 [ 256.045751][ T2722] CPU: 1 PID: 2722 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 256.054110][ T2722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.064160][ T2722] Call Trace: [ 256.067431][ T2722] dump_stack_lvl+0xd6/0x122 [ 256.072025][ T2722] dump_stack+0x11/0x1b [ 256.076187][ T2722] should_fail+0x23c/0x250 [ 256.080652][ T2722] ? kobject_uevent_env+0x1a7/0xc40 [ 256.085842][ T2722] __should_failslab+0x81/0x90 [ 256.090608][ T2722] should_failslab+0x5/0x20 [ 256.095116][ T2722] kmem_cache_alloc_trace+0x52/0x350 [ 256.100401][ T2722] ? kernfs_put+0x239/0x300 [ 256.104900][ T2722] ? ___cache_free+0x46/0x300 [ 256.109577][ T2722] ? dev_uevent_filter+0x70/0x70 [ 256.114569][ T2722] kobject_uevent_env+0x1a7/0xc40 [ 256.119596][ T2722] ? kernfs_put+0x2f1/0x300 [ 256.124100][ T2722] kobject_uevent+0x18/0x20 [ 256.128603][ T2722] __loop_clr_fd+0x4a3/0x6c0 [ 256.133232][ T2722] lo_ioctl+0x985/0x1270 [ 256.137467][ T2722] ? __rcu_read_unlock+0x5c/0x290 [ 256.142495][ T2722] ? avc_has_extended_perms+0x686/0x8a0 [ 256.148100][ T2722] ? blkdev_common_ioctl+0x438/0x1120 [ 256.153475][ T2722] ? do_vfs_ioctl+0x819/0x14a0 [ 256.158238][ T2722] ? lo_release+0x120/0x120 [ 256.162734][ T2722] blkdev_ioctl+0x20e/0x440 [ 256.167242][ T2722] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 256.172746][ T2722] __se_sys_ioctl+0xcb/0x140 [ 256.177381][ T2722] __x64_sys_ioctl+0x3f/0x50 [ 256.181974][ T2722] do_syscall_64+0x44/0xa0 [ 256.186440][ T2722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 256.192372][ T2722] RIP: 0033:0x7faf9ad4e8a7 [ 256.196783][ T2722] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.216511][ T2722] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.225011][ T2722] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 03:26:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000046) [ 256.233063][ T2722] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 256.241029][ T2722] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 256.248996][ T2722] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 256.256960][ T2722] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800001800732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 93) 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x1000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 256.350977][ T2837] loop4: detected capacity change from 0 to 262160 [ 256.364757][ T2843] loop2: detected capacity change from 0 to 262160 [ 256.412667][ T2843] FAULT_INJECTION: forcing a failure. [ 256.412667][ T2843] name failslab, interval 1, probability 0, space 0, times 0 [ 256.425352][ T2843] CPU: 0 PID: 2843 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 256.433775][ T2843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.443902][ T2843] Call Trace: [ 256.447174][ T2843] dump_stack_lvl+0xd6/0x122 [ 256.451768][ T2843] dump_stack+0x11/0x1b [ 256.455961][ T2843] should_fail+0x23c/0x250 [ 256.460374][ T2843] ? kzalloc+0x1d/0x30 [ 256.464442][ T2843] __should_failslab+0x81/0x90 [ 256.469250][ T2843] should_failslab+0x5/0x20 [ 256.473846][ T2843] __kmalloc+0x6f/0x370 [ 256.478006][ T2843] kzalloc+0x1d/0x30 [ 256.481896][ T2843] kobject_get_path+0x7c/0x110 [ 256.486689][ T2843] kobject_uevent_env+0x1be/0xc40 [ 256.491792][ T2843] ? kernfs_put+0x2f1/0x300 [ 256.496297][ T2843] kobject_uevent+0x18/0x20 [ 256.500822][ T2843] __loop_clr_fd+0x4a3/0x6c0 [ 256.505432][ T2843] lo_ioctl+0x985/0x1270 [ 256.509733][ T2843] ? mod_objcg_mlstate+0x153/0x1a0 [ 256.514839][ T2843] ? __rcu_read_unlock+0x5c/0x290 [ 256.519860][ T2843] ? avc_has_extended_perms+0x686/0x8a0 [ 256.525453][ T2843] ? blkdev_common_ioctl+0x438/0x1120 [ 256.530822][ T2843] ? do_vfs_ioctl+0x819/0x14a0 [ 256.535585][ T2843] ? lo_release+0x120/0x120 [ 256.540084][ T2843] blkdev_ioctl+0x20e/0x440 [ 256.544588][ T2843] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 256.550152][ T2843] __se_sys_ioctl+0xcb/0x140 [ 256.554825][ T2843] __x64_sys_ioctl+0x3f/0x50 [ 256.559433][ T2843] do_syscall_64+0x44/0xa0 [ 256.563905][ T2843] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 256.569801][ T2843] RIP: 0033:0x7faf9ad4e8a7 [ 256.574211][ T2843] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.593871][ T2843] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.602282][ T2843] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 256.610251][ T2843] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 256.618218][ T2843] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 256.626263][ T2843] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 256.634228][ T2843] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:44 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000700) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x20000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800002000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001f00) 03:26:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 94) 03:26:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000047) 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x100000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800002600732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 256.752267][ T2853] loop4: detected capacity change from 0 to 262160 [ 256.759309][ T2854] loop2: detected capacity change from 0 to 262160 03:26:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x200000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800003f00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 256.843010][ T2854] FAULT_INJECTION: forcing a failure. [ 256.843010][ T2854] name failslab, interval 1, probability 0, space 0, times 0 [ 256.855673][ T2854] CPU: 1 PID: 2854 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 256.863989][ T2854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.874027][ T2854] Call Trace: [ 256.877380][ T2854] dump_stack_lvl+0xd6/0x122 [ 256.881969][ T2854] dump_stack+0x11/0x1b [ 256.886175][ T2854] should_fail+0x23c/0x250 [ 256.890636][ T2854] __should_failslab+0x81/0x90 [ 256.895412][ T2854] should_failslab+0x5/0x20 [ 256.899909][ T2854] kmem_cache_alloc_node+0x61/0x2d0 [ 256.905175][ T2854] ? __alloc_skb+0xed/0x440 [ 256.909713][ T2854] __alloc_skb+0xed/0x440 [ 256.914041][ T2854] alloc_uevent_skb+0x5b/0x120 [ 256.918803][ T2854] kobject_uevent_env+0x863/0xc40 [ 256.923813][ T2854] ? kernfs_put+0x2f1/0x300 [ 256.928371][ T2854] kobject_uevent+0x18/0x20 [ 256.932870][ T2854] __loop_clr_fd+0x4a3/0x6c0 [ 256.937446][ T2854] lo_ioctl+0x985/0x1270 [ 256.941673][ T2854] ? mod_objcg_mlstate+0x153/0x1a0 [ 256.946768][ T2854] ? __rcu_read_unlock+0x5c/0x290 [ 256.951811][ T2854] ? avc_has_extended_perms+0x686/0x8a0 [ 256.957778][ T2854] ? blkdev_common_ioctl+0x438/0x1120 [ 256.963140][ T2854] ? do_vfs_ioctl+0x819/0x14a0 [ 256.967919][ T2854] ? lo_release+0x120/0x120 [ 256.972411][ T2854] blkdev_ioctl+0x20e/0x440 [ 256.977012][ T2854] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 256.982458][ T2854] __se_sys_ioctl+0xcb/0x140 [ 256.987038][ T2854] __x64_sys_ioctl+0x3f/0x50 [ 256.991618][ T2854] do_syscall_64+0x44/0xa0 [ 256.996021][ T2854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.001912][ T2854] RIP: 0033:0x7faf9ad4e8a7 [ 257.006331][ T2854] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.025978][ T2854] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.034732][ T2854] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 03:26:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000048) 03:26:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800004000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 257.042710][ T2854] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 257.050666][ T2854] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 257.058627][ T2854] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 257.066587][ T2854] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 [ 257.123873][ T2959] loop4: detected capacity change from 0 to 262160 03:26:45 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000701) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 95) 03:26:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x204000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800007000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000049) 03:26:45 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002000) 03:26:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800007e00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800fdef00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x400000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 257.713418][ T2980] loop4: detected capacity change from 0 to 262160 [ 257.720561][ T2982] loop2: detected capacity change from 0 to 262160 [ 257.772856][ T2982] FAULT_INJECTION: forcing a failure. [ 257.772856][ T2982] name failslab, interval 1, probability 0, space 0, times 0 [ 257.785474][ T2982] CPU: 0 PID: 2982 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 257.793855][ T2982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.803916][ T2982] Call Trace: [ 257.807187][ T2982] dump_stack_lvl+0xd6/0x122 [ 257.811787][ T2982] dump_stack+0x11/0x1b [ 257.816018][ T2982] should_fail+0x23c/0x250 03:26:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800effd00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 257.820490][ T2982] __should_failslab+0x81/0x90 [ 257.825315][ T2982] should_failslab+0x5/0x20 [ 257.829823][ T2982] kmem_cache_alloc_node_trace+0x61/0x310 [ 257.835553][ T2982] ? __kmalloc_node_track_caller+0x30/0x40 [ 257.841365][ T2982] __kmalloc_node_track_caller+0x30/0x40 [ 257.847001][ T2982] ? alloc_uevent_skb+0x5b/0x120 [ 257.851997][ T2982] __alloc_skb+0x1a1/0x440 [ 257.856438][ T2982] alloc_uevent_skb+0x5b/0x120 [ 257.861208][ T2982] kobject_uevent_env+0x863/0xc40 [ 257.866452][ T2982] ? kernfs_put+0x2f1/0x300 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800fffe00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 257.870957][ T2982] kobject_uevent+0x18/0x20 [ 257.875463][ T2982] __loop_clr_fd+0x4a3/0x6c0 [ 257.880147][ T2982] lo_ioctl+0x985/0x1270 [ 257.884388][ T2982] ? __rcu_read_unlock+0x5c/0x290 [ 257.889413][ T2982] ? avc_has_extended_perms+0x686/0x8a0 [ 257.895035][ T2982] ? blkdev_common_ioctl+0x438/0x1120 [ 257.900411][ T2982] ? do_vfs_ioctl+0x819/0x14a0 [ 257.905222][ T2982] ? lo_release+0x120/0x120 [ 257.909722][ T2982] blkdev_ioctl+0x20e/0x440 [ 257.914229][ T2982] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 257.919696][ T2982] __se_sys_ioctl+0xcb/0x140 [ 257.924326][ T2982] __x64_sys_ioctl+0x3f/0x50 [ 257.928918][ T2982] do_syscall_64+0x44/0xa0 [ 257.933387][ T2982] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 257.939284][ T2982] RIP: 0033:0x7faf9ad4e8a7 [ 257.943693][ T2982] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.963342][ T2982] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800feff00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 257.971757][ T2982] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 257.979797][ T2982] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 257.987767][ T2982] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 257.995809][ T2982] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 258.003773][ T2982] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 96) 03:26:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004a) 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000200732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:46 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002001) 03:26:46 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000801) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x500000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000300732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 258.483977][ T3113] loop2: detected capacity change from 0 to 262160 [ 258.533412][ T3117] loop4: detected capacity change from 0 to 262160 [ 258.544035][ T3113] FAULT_INJECTION: forcing a failure. [ 258.544035][ T3113] name failslab, interval 1, probability 0, space 0, times 0 [ 258.556729][ T3113] CPU: 0 PID: 3113 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 258.565069][ T3113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.575115][ T3113] Call Trace: [ 258.578382][ T3113] dump_stack_lvl+0xd6/0x122 [ 258.582978][ T3113] dump_stack+0x11/0x1b [ 258.587165][ T3113] should_fail+0x23c/0x250 [ 258.591615][ T3113] ? skb_clone+0x12c/0x1f0 [ 258.596119][ T3113] __should_failslab+0x81/0x90 [ 258.600939][ T3113] should_failslab+0x5/0x20 [ 258.605491][ T3113] kmem_cache_alloc+0x4f/0x320 [ 258.610253][ T3113] skb_clone+0x12c/0x1f0 [ 258.614551][ T3113] netlink_broadcast_filtered+0x4fd/0xb60 [ 258.620713][ T3113] ? skb_put+0xb9/0xf0 [ 258.624777][ T3113] netlink_broadcast+0x35/0x50 [ 258.629596][ T3113] kobject_uevent_env+0x8c9/0xc40 [ 258.634616][ T3113] ? kernfs_put+0x2f1/0x300 [ 258.639178][ T3113] kobject_uevent+0x18/0x20 [ 258.643709][ T3113] __loop_clr_fd+0x4a3/0x6c0 [ 258.648295][ T3113] lo_ioctl+0x985/0x1270 [ 258.652525][ T3113] ? __rcu_read_unlock+0x5c/0x290 [ 258.657651][ T3113] ? avc_has_extended_perms+0x686/0x8a0 [ 258.663200][ T3113] ? blkdev_common_ioctl+0x438/0x1120 [ 258.668634][ T3113] ? do_vfs_ioctl+0x819/0x14a0 [ 258.673425][ T3113] ? lo_release+0x120/0x120 [ 258.677926][ T3113] blkdev_ioctl+0x20e/0x440 [ 258.682574][ T3113] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 258.688034][ T3113] __se_sys_ioctl+0xcb/0x140 [ 258.692616][ T3113] __x64_sys_ioctl+0x3f/0x50 [ 258.697275][ T3113] do_syscall_64+0x44/0xa0 [ 258.701753][ T3113] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 258.707649][ T3113] RIP: 0033:0x7faf9ad4e8a7 [ 258.712063][ T3113] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000400732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x604000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 258.731670][ T3113] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.740072][ T3113] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 258.748027][ T3113] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 258.755984][ T3113] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 258.763950][ T3113] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 258.771958][ T3113] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000500732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 97) 03:26:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004b) 03:26:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000800732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x800000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 258.852663][ T3138] loop2: detected capacity change from 0 to 262160 03:26:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800001000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 258.892823][ T3138] FAULT_INJECTION: forcing a failure. [ 258.892823][ T3138] name failslab, interval 1, probability 0, space 0, times 0 [ 258.905450][ T3138] CPU: 1 PID: 3138 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 258.913829][ T3138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.923901][ T3138] Call Trace: [ 258.927174][ T3138] dump_stack_lvl+0xd6/0x122 [ 258.931769][ T3138] dump_stack+0x11/0x1b [ 258.936001][ T3138] should_fail+0x23c/0x250 [ 258.940483][ T3138] ? kobject_uevent_env+0x1a7/0xc40 [ 258.945676][ T3138] __should_failslab+0x81/0x90 [ 258.950444][ T3138] should_failslab+0x5/0x20 [ 258.951803][ T3147] loop4: detected capacity change from 0 to 262160 [ 258.955022][ T3138] kmem_cache_alloc_trace+0x52/0x350 [ 258.966779][ T3138] ? ___cache_free+0x46/0x300 [ 258.971501][ T3138] ? __kfree_skb+0xfe/0x150 [ 258.976074][ T3138] ? kmem_cache_free+0x5e/0x100 [ 258.981009][ T3138] ? dev_uevent_filter+0x70/0x70 [ 258.985979][ T3138] kobject_uevent_env+0x1a7/0xc40 [ 258.991006][ T3138] ? kfree+0xf8/0x1f0 [ 258.995030][ T3138] ? preempt_count_add+0x4e/0x90 [ 259.000025][ T3138] ? __wake_up+0x8d/0xc0 [ 259.004293][ T3138] disk_force_media_change+0xe3/0x170 [ 259.009655][ T3138] __loop_clr_fd+0x527/0x6c0 [ 259.014237][ T3138] lo_ioctl+0x985/0x1270 [ 259.018468][ T3138] ? mod_objcg_mlstate+0x153/0x1a0 [ 259.023620][ T3138] ? __rcu_read_unlock+0x5c/0x290 [ 259.028685][ T3138] ? avc_has_extended_perms+0x686/0x8a0 [ 259.034236][ T3138] ? blkdev_common_ioctl+0x438/0x1120 [ 259.039620][ T3138] ? do_vfs_ioctl+0x819/0x14a0 [ 259.044385][ T3138] ? lo_release+0x120/0x120 [ 259.048881][ T3138] blkdev_ioctl+0x20e/0x440 [ 259.053429][ T3138] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 259.058880][ T3138] __se_sys_ioctl+0xcb/0x140 [ 259.063469][ T3138] __x64_sys_ioctl+0x3f/0x50 [ 259.068080][ T3138] do_syscall_64+0x44/0xa0 [ 259.072492][ T3138] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 259.078381][ T3138] RIP: 0033:0x7faf9ad4e8a7 [ 259.082786][ T3138] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 259.102467][ T3138] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.110878][ T3138] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 259.118848][ T3138] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 259.126817][ T3138] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 259.134785][ T3138] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 259.142766][ T3138] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:47 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002f01) 03:26:47 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000901) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800001800732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf00000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 98) 03:26:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004c) 03:26:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800002600732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 259.362069][ T3159] loop4: detected capacity change from 0 to 262160 [ 259.369566][ T3160] loop2: detected capacity change from 0 to 262160 [ 259.412811][ T3160] FAULT_INJECTION: forcing a failure. [ 259.412811][ T3160] name failslab, interval 1, probability 0, space 0, times 0 [ 259.425441][ T3160] CPU: 0 PID: 3160 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 259.433842][ T3160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.443890][ T3160] Call Trace: [ 259.447222][ T3160] dump_stack_lvl+0xd6/0x122 [ 259.451844][ T3160] dump_stack+0x11/0x1b [ 259.455996][ T3160] should_fail+0x23c/0x250 [ 259.460483][ T3160] ? kobject_uevent_env+0x1a7/0xc40 [ 259.465679][ T3160] __should_failslab+0x81/0x90 [ 259.470450][ T3160] should_failslab+0x5/0x20 [ 259.474959][ T3160] kmem_cache_alloc_trace+0x52/0x350 [ 259.480240][ T3160] ? ___cache_free+0x46/0x300 [ 259.484926][ T3160] ? __kfree_skb+0xfe/0x150 [ 259.489437][ T3160] ? kmem_cache_free+0xe5/0x100 [ 259.494290][ T3160] ? dev_uevent_filter+0x70/0x70 [ 259.499279][ T3160] kobject_uevent_env+0x1a7/0xc40 [ 259.504398][ T3160] ? kfree+0xf8/0x1f0 [ 259.508423][ T3160] ? preempt_count_add+0x4e/0x90 [ 259.513363][ T3160] ? __wake_up+0x8d/0xc0 [ 259.517672][ T3160] disk_force_media_change+0xe3/0x170 [ 259.523039][ T3160] __loop_clr_fd+0x527/0x6c0 [ 259.527626][ T3160] lo_ioctl+0x985/0x1270 [ 259.531896][ T3160] ? __rcu_read_unlock+0x5c/0x290 [ 259.536936][ T3160] ? avc_has_extended_perms+0x686/0x8a0 [ 259.542551][ T3160] ? blkdev_common_ioctl+0x438/0x1120 [ 259.547982][ T3160] ? do_vfs_ioctl+0x819/0x14a0 [ 259.552733][ T3160] ? lo_release+0x120/0x120 [ 259.557236][ T3160] blkdev_ioctl+0x20e/0x440 [ 259.561746][ T3160] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 259.567191][ T3160] __se_sys_ioctl+0xcb/0x140 [ 259.571836][ T3160] __x64_sys_ioctl+0x3f/0x50 [ 259.576415][ T3160] do_syscall_64+0x44/0xa0 [ 259.580822][ T3160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 259.586700][ T3160] RIP: 0033:0x7faf9ad4e8a7 [ 259.591097][ T3160] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x1800000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 259.610747][ T3160] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.619139][ T3160] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 259.627094][ T3160] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 259.635046][ T3160] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 259.643050][ T3160] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 259.651003][ T3160] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 99) 03:26:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x2600000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800007000732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004d) [ 259.735358][ T3173] loop2: detected capacity change from 0 to 262160 [ 259.773841][ T3173] FAULT_INJECTION: forcing a failure. [ 259.773841][ T3173] name failslab, interval 1, probability 0, space 0, times 0 [ 259.786519][ T3173] CPU: 0 PID: 3173 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 259.794846][ T3173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.804895][ T3173] Call Trace: [ 259.808205][ T3173] dump_stack_lvl+0xd6/0x122 [ 259.812838][ T3173] dump_stack+0x11/0x1b [ 259.817094][ T3173] should_fail+0x23c/0x250 [ 259.821508][ T3173] ? kzalloc+0x1d/0x30 [ 259.825636][ T3173] __should_failslab+0x81/0x90 [ 259.830403][ T3173] should_failslab+0x5/0x20 [ 259.834953][ T3173] __kmalloc+0x6f/0x370 [ 259.839109][ T3173] kzalloc+0x1d/0x30 [ 259.843003][ T3173] kobject_get_path+0x7c/0x110 [ 259.847759][ T3173] kobject_uevent_env+0x1be/0xc40 [ 259.852830][ T3173] ? kfree+0xf8/0x1f0 [ 259.856811][ T3173] ? preempt_count_add+0x4e/0x90 [ 259.861777][ T3173] ? __wake_up+0x8d/0xc0 [ 259.866041][ T3173] disk_force_media_change+0xe3/0x170 [ 259.871417][ T3173] __loop_clr_fd+0x527/0x6c0 [ 259.876005][ T3173] lo_ioctl+0x985/0x1270 [ 259.880260][ T3173] ? mod_objcg_mlstate+0x153/0x1a0 [ 259.885397][ T3173] ? __rcu_read_unlock+0x5c/0x290 [ 259.890424][ T3173] ? avc_has_extended_perms+0x686/0x8a0 [ 259.895980][ T3173] ? blkdev_common_ioctl+0x438/0x1120 [ 259.901357][ T3173] ? do_vfs_ioctl+0x819/0x14a0 [ 259.906145][ T3173] ? lo_release+0x120/0x120 [ 259.910651][ T3173] blkdev_ioctl+0x20e/0x440 [ 259.915208][ T3173] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 259.920660][ T3173] __se_sys_ioctl+0xcb/0x140 [ 259.925251][ T3173] __x64_sys_ioctl+0x3f/0x50 [ 259.929849][ T3173] do_syscall_64+0x44/0xa0 [ 259.934311][ T3173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 259.940215][ T3173] RIP: 0033:0x7faf9ad4e8a7 [ 259.944622][ T3173] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 259.964252][ T3173] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.972707][ T3173] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 03:26:48 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80003001) [ 259.980714][ T3173] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 259.988684][ T3173] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 259.996650][ T3173] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 260.004712][ T3173] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 [ 260.019710][ T3181] loop4: detected capacity change from 0 to 262160 03:26:48 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000a01) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800007e00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x3f00000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) (fail_nth: 100) 03:26:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004e) 03:26:48 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80003200) 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000fe00732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x4000000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 260.382324][ T3199] loop4: detected capacity change from 0 to 262160 [ 260.391517][ T3202] loop2: detected capacity change from 0 to 262160 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000402732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 260.453418][ T3202] FAULT_INJECTION: forcing a failure. [ 260.453418][ T3202] name failslab, interval 1, probability 0, space 0, times 0 [ 260.466077][ T3202] CPU: 0 PID: 3202 Comm: syz-executor.2 Not tainted 5.15.0-syzkaller #0 [ 260.474405][ T3202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.484460][ T3202] Call Trace: [ 260.487733][ T3202] dump_stack_lvl+0xd6/0x122 [ 260.492330][ T3202] dump_stack+0x11/0x1b [ 260.496533][ T3202] should_fail+0x23c/0x250 [ 260.501001][ T3202] __should_failslab+0x81/0x90 [ 260.505823][ T3202] should_failslab+0x5/0x20 [ 260.510331][ T3202] kmem_cache_alloc_node_trace+0x61/0x310 [ 260.516158][ T3202] ? __kmalloc_node_track_caller+0x30/0x40 [ 260.522038][ T3202] __kmalloc_node_track_caller+0x30/0x40 [ 260.527720][ T3202] ? alloc_uevent_skb+0x5b/0x120 [ 260.532654][ T3202] __alloc_skb+0x1a1/0x440 [ 260.537075][ T3202] alloc_uevent_skb+0x5b/0x120 [ 260.541866][ T3202] kobject_uevent_env+0x863/0xc40 [ 260.546893][ T3202] ? __wake_up+0x8d/0xc0 [ 260.551139][ T3202] disk_force_media_change+0xe3/0x170 [ 260.556540][ T3202] __loop_clr_fd+0x527/0x6c0 [ 260.561126][ T3202] lo_ioctl+0x985/0x1270 [ 260.565412][ T3202] ? mod_objcg_mlstate+0x153/0x1a0 [ 260.570589][ T3202] ? __rcu_read_unlock+0x5c/0x290 [ 260.575615][ T3202] ? avc_has_extended_perms+0x686/0x8a0 [ 260.581236][ T3202] ? blkdev_common_ioctl+0x438/0x1120 [ 260.586622][ T3202] ? do_vfs_ioctl+0x819/0x14a0 [ 260.591405][ T3202] ? lo_release+0x120/0x120 [ 260.595946][ T3202] blkdev_ioctl+0x20e/0x440 [ 260.600457][ T3202] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 260.605919][ T3202] __se_sys_ioctl+0xcb/0x140 [ 260.610562][ T3202] __x64_sys_ioctl+0x3f/0x50 [ 260.615190][ T3202] do_syscall_64+0x44/0xa0 [ 260.619610][ T3202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 260.625545][ T3202] RIP: 0033:0x7faf9ad4e8a7 [ 260.629963][ T3202] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:26:48 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80003800) [ 260.649633][ T3202] RSP: 002b:00007faf98ac4fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.658048][ T3202] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 00007faf9ad4e8a7 [ 260.666031][ T3202] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 260.674072][ T3202] RBP: 00007faf98ac56bc R08: 00007faf98ac5040 R09: 0000000020000040 [ 260.682038][ T3202] R10: 0000000000008000 R11: 0000000000000246 R12: ffffffffffffffff [ 260.690009][ T3202] R13: 0000000000000016 R14: 00007faf98ac5000 R15: 0000000020000000 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000003732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000004f) 03:26:48 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000b01) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x4000080000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000204732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000604732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 260.797953][ T3329] loop2: detected capacity change from 0 to 262160 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000005732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x7000000000000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 260.843565][ T3334] loop4: detected capacity change from 0 to 262160 03:26:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000050) [ 260.938821][ T3346] loop2: detected capacity change from 0 to 262160 [ 260.973707][ T3346] loop2: detected capacity change from 0 to 262160 [ 260.976183][ T3348] loop4: detected capacity change from 0 to 262160 03:26:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000406732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 261.220274][ T3359] loop2: detected capacity change from 0 to 262160 [ 261.278538][ T3359] loop2: detected capacity change from 0 to 262160 03:26:49 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000c01) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:49 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80003e00) 03:26:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000051) 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000018732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfeffffff00000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000020732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000026732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfeffffffffffffff, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 261.515438][ T3369] loop2: detected capacity change from 0 to 262160 [ 261.554788][ T3364] loop4: detected capacity change from 0 to 262160 03:26:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000003f732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xffffff7f00000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 261.584409][ T3369] loop2: detected capacity change from 0 to 262160 03:26:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000052) [ 261.694276][ T3389] loop4: detected capacity change from 0 to 262160 03:26:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000040732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xffffffff00000000, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000053) 03:26:50 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000d01) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:50 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80003f00) 03:26:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000070732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 262.276780][ T3402] loop2: detected capacity change from 0 to 262160 [ 262.286857][ T3400] loop4: detected capacity change from 0 to 262160 [ 262.315082][ T3402] loop2: detected capacity change from 0 to 262160 03:26:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000007e732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000054) 03:26:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000fdef732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x2, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 262.419050][ T3420] loop2: detected capacity change from 0 to 262160 [ 262.453151][ T3425] loop4: detected capacity change from 0 to 262160 03:26:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000effd732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 262.473959][ T3420] loop2: detected capacity change from 0 to 262160 03:26:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 262.585358][ T3434] loop2: detected capacity change from 0 to 262160 [ 262.643602][ T3434] loop2: detected capacity change from 0 to 262160 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000fffe732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x4, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000055) 03:26:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80001001) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:51 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80004001) 03:26:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x5, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000feff732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 263.081027][ T3445] loop2: detected capacity change from 0 to 262160 [ 263.102874][ T3442] loop4: detected capacity change from 0 to 262160 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000002732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x8, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 263.134608][ T3445] loop2: detected capacity change from 0 to 262160 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000003732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000056) 03:26:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000004732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0xf, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 263.256202][ T3466] loop2: detected capacity change from 0 to 262160 [ 263.284708][ T3468] loop4: detected capacity change from 0 to 262160 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000005732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 263.324009][ T3466] loop2: detected capacity change from 0 to 262160 03:26:51 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80004000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x18, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000008732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000057) 03:26:51 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80005068) 03:26:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x26, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 263.873111][ T3486] loop2: detected capacity change from 0 to 262160 [ 263.883740][ T3489] loop4: detected capacity change from 0 to 262160 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000018732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000026732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000058) [ 263.923771][ T3486] loop2: detected capacity change from 0 to 262160 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000070732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 264.003460][ T3503] loop4: detected capacity change from 0 to 262160 [ 264.014971][ T3505] loop2: detected capacity change from 0 to 262160 [ 264.074151][ T3505] loop2: detected capacity change from 0 to 262160 03:26:52 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80009000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x70, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb080000007e732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000059) 03:26:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80009000) [ 264.714593][ T3520] loop2: detected capacity change from 0 to 262160 [ 264.722031][ T3518] loop4: detected capacity change from 0 to 262160 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb08000000fe732e66617400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0xfe, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 264.763721][ T3520] loop2: detected capacity change from 0 to 262160 03:26:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66077400020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005a) 03:26:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617402020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 264.867444][ T3536] loop2: detected capacity change from 0 to 262160 [ 264.895783][ T3538] loop4: detected capacity change from 0 to 262160 [ 264.903566][ T3536] loop2: detected capacity change from 0 to 262160 03:26:53 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000a000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x204, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617403020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005b) 03:26:53 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000a000) 03:26:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617404020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x402, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) [ 265.485281][ T3551] loop2: detected capacity change from 0 to 262160 [ 265.493370][ T3553] loop4: detected capacity change from 0 to 262160 03:26:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617405020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x406, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005c) [ 265.553944][ T3551] loop2: detected capacity change from 0 to 262160 03:26:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617408020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 265.663847][ T3569] loop4: detected capacity change from 0 to 262160 03:26:54 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000b000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x500, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617418020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005d) 03:26:54 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000b400) 03:26:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x604, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617426020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 266.261664][ T3580] loop4: detected capacity change from 0 to 262160 [ 266.270630][ T3578] loop2: detected capacity change from 0 to 262160 03:26:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617470020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 266.343629][ T3578] loop2: detected capacity change from 0 to 262160 03:26:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e6661747e020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005e) 03:26:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 266.433902][ T3597] loop2: detected capacity change from 0 to 262160 [ 266.484437][ T3601] loop4: detected capacity change from 0 to 262160 [ 266.491927][ T3597] loop2: detected capacity change from 0 to 262160 03:26:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c000) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0xf00, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174fe020101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000d000) 03:26:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000005f) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400030101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.018272][ T3616] loop2: detected capacity change from 0 to 262160 [ 267.035224][ T3615] loop4: detected capacity change from 0 to 262160 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400060101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.083545][ T3616] loop2: detected capacity change from 0 to 262160 03:26:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000060) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400070101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x12, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400030101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.180209][ T3631] loop2: detected capacity change from 0 to 262160 [ 267.204826][ T3633] loop4: detected capacity change from 0 to 262160 [ 267.243703][ T3631] loop2: detected capacity change from 0 to 262160 03:26:55 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c100) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x1800, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400060101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000061) 03:26:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x22, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:55 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000d100) 03:26:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400070101000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.790585][ T3649] loop2: detected capacity change from 0 to 262160 [ 267.803472][ T3645] loop4: detected capacity change from 0 to 262160 03:26:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000062) 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020201000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.870035][ T3649] loop2: detected capacity change from 0 to 262160 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020301000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x2000, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 267.931677][ T3664] loop4: detected capacity change from 0 to 262160 [ 267.984261][ T3669] loop2: detected capacity change from 0 to 262160 [ 268.037296][ T3669] loop2: detected capacity change from 0 to 262160 03:26:56 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020401000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000063) 03:26:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000d200) 03:26:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x2600, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020501000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 268.651748][ T3680] loop2: detected capacity change from 0 to 262160 [ 268.664081][ T3687] loop4: detected capacity change from 0 to 262160 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020601000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000064) [ 268.724455][ T3680] loop2: detected capacity change from 0 to 262160 03:26:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x3f00, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020e01000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 268.812916][ T3703] loop4: detected capacity change from 0 to 262160 [ 268.818892][ T3705] loop2: detected capacity change from 0 to 262160 [ 268.863522][ T3705] loop2: detected capacity change from 0 to 262160 03:26:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020f01000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000065) 03:26:57 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000d600) 03:26:57 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c300) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x4000, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e6661740002fe01000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 269.468251][ T3718] loop4: detected capacity change from 0 to 262160 [ 269.481910][ T3724] loop2: detected capacity change from 0 to 262160 03:26:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000066) 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020102000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 269.536719][ T3724] loop2: detected capacity change from 0 to 262160 03:26:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020103000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000067) [ 269.645915][ T3739] loop4: detected capacity change from 0 to 262160 [ 269.666364][ T3741] loop2: detected capacity change from 0 to 262160 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020104000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020105000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 269.759479][ T3741] loop2: detected capacity change from 0 to 262160 [ 269.772107][ T3748] loop4: detected capacity change from 0 to 262160 03:26:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:57 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000d800) [ 269.863626][ T3756] loop2: detected capacity change from 0 to 262160 [ 269.913667][ T3756] loop2: detected capacity change from 0 to 262160 03:26:58 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c400) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020106000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x7000, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000068) 03:26:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x82, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:58 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000de00) 03:26:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e6661740002010e000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 270.464007][ T3768] loop2: detected capacity change from 0 to 262160 [ 270.470886][ T3766] loop4: detected capacity change from 0 to 262160 03:26:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000069) 03:26:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e6661740002010f000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 270.534092][ T3768] loop2: detected capacity change from 0 to 262160 03:26:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x89, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 270.617617][ T3781] loop4: detected capacity change from 0 to 262160 03:26:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201fe000240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 270.660085][ T3784] loop2: detected capacity change from 0 to 262160 03:26:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006a) [ 270.779357][ T3784] loop2: detected capacity change from 0 to 262160 [ 270.782118][ T3789] loop4: detected capacity change from 0 to 262160 03:26:59 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c500) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020100030240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xd8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006b) 03:26:59 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000e000) 03:26:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0xfeff, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201feff0240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 271.313173][ T3796] loop2: detected capacity change from 0 to 262160 [ 271.321502][ T3799] loop4: detected capacity change from 0 to 262160 03:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101020240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006c) [ 271.373307][ T3796] loop2: detected capacity change from 0 to 262160 03:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101030240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xdc, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:26:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101040240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 271.459533][ T3816] loop2: detected capacity change from 0 to 262160 [ 271.486725][ T3820] loop4: detected capacity change from 0 to 262160 [ 271.533690][ T3816] loop2: detected capacity change from 0 to 262160 03:27:00 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c700) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:27:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006d) 03:27:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xde, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101050240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:27:00 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000e100) 03:27:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0xfffe, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101080240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 272.219669][ T3837] loop2: detected capacity change from 0 to 262160 [ 272.227722][ T3832] loop4: detected capacity change from 0 to 262160 03:27:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006e) 03:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101180240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 272.293644][ T3837] loop2: detected capacity change from 0 to 262160 03:27:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xdf, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101260240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 272.367011][ T3849] loop4: detected capacity change from 0 to 262160 [ 272.383545][ T3852] loop2: detected capacity change from 0 to 262160 03:27:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101700240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 272.444144][ T3852] loop2: detected capacity change from 0 to 262160 03:27:01 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000c900) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000001) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[@ANYRES16], 0xfffffff0) 03:27:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:27:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000006f) 03:27:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e666174000201017e0240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) 03:27:01 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000001) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000e200) 03:27:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./bus\x00', 0x0, 0x80000, &(0x7f0000000240), 0x180ec40, &(0x7f0000000000)=ANY=[]) 03:27:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101fe0240008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 273.083017][ T3862] loop4: detected capacity change from 0 to 262160 [ 273.088925][ T3871] loop2: detected capacity change from 0 to 262160 03:27:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x80000070) 03:27:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="eb0800000000732e66617400020101000340008080f8015e", 0x18}, {0x0, 0x0, 0x10000001000}], 0x8000, &(0x7f0000000000)=ANY=[]) [ 273.154164][ T3871] loop2: detected capacity change from 0 to 262160 [ 273.208141][ T3872] ==================================================================