_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.481740] [ 1161.481752] dump_stack_lvl+0x8b/0xb3 [ 1161.484187] should_fail.cold+0x5/0xa [ 1161.484976] prepare_alloc_pages+0x17b/0x500 [ 1161.485871] __alloc_pages+0x131/0x4e0 [ 1161.486660] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1161.487883] ? __lock_acquire+0xbac/0x5b70 [ 1161.488767] ? mark_lock+0xfc/0x2e10 [ 1161.489504] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1161.490607] alloc_pages_vma+0xde/0x500 [ 1161.491430] __handle_mm_fault+0xfb3/0x3570 [ 1161.492346] ? lock_is_held_type+0xd7/0x130 [ 1161.493214] ? __pmd_alloc+0x680/0x680 [ 1161.494045] handle_mm_fault+0x2e6/0xa20 [ 1161.494882] do_user_addr_fault+0x54a/0x12a0 [ 1161.495800] exc_page_fault+0xa2/0x1a0 [ 1161.496593] asm_exc_page_fault+0x1e/0x30 [ 1161.497425] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1161.498526] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1161.502204] RSP: 0018:ffff888040aff9f0 EFLAGS: 00050246 [ 1161.503267] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1161.504715] RDX: 0000000000000000 RSI: ffff88801f2ef000 RDI: 0000000020008000 [ 1161.506129] RBP: 0000000020008000 R08: 0000000000000000 R09: ffff88801f2effff [ 1161.507544] R10: ffffed1003e5dfff R11: 0000000000000001 R12: ffff88801f2ef000 [ 1161.509002] R13: 0000000020009000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1161.510469] copyout.part.0+0xdf/0x110 [ 1161.511279] copy_page_to_iter+0x248/0xdd0 [ 1161.512199] filemap_read+0x4ff/0xbb0 [ 1161.513003] ? filemap_get_pages+0x1c90/0x1c90 [ 1161.513953] ? lock_acquire+0x1b2/0x4d0 [ 1161.514771] generic_file_read_iter+0x3cf/0x540 [ 1161.515735] ext4_file_read_iter+0x184/0x490 [ 1161.516672] new_sync_read+0x427/0x6f0 [ 1161.517461] ? __ia32_sys_llseek+0x380/0x380 [ 1161.518379] ? security_file_permission+0xb1/0xd0 [ 1161.519375] vfs_read+0x356/0x5f0 [ 1161.520123] ksys_read+0x12d/0x250 [ 1161.520858] ? __ia32_sys_pwrite64+0x230/0x230 [ 1161.521784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.522861] do_syscall_64+0x3b/0x90 [ 1161.523848] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1161.525183] RIP: 0033:0x7f0ad231ab19 [ 1161.526130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.530033] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1161.531542] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1161.532983] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1161.534389] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.535821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1161.537261] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1161.538710] [ 1161.539168] CPU: 1 PID: 8513 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1161.540068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.541337] Call Trace: [ 1161.541607] [ 1161.541856] dump_stack_lvl+0x8b/0xb3 [ 1161.542286] should_fail.cold+0x5/0xa [ 1161.542723] copy_page_to_iter+0x217/0xdd0 [ 1161.543217] filemap_read+0x4ff/0xbb0 [ 1161.543647] ? filemap_get_pages+0x1c90/0x1c90 [ 1161.544181] ? lock_acquire+0x1b2/0x4d0 [ 1161.544624] generic_file_read_iter+0x3cf/0x540 [ 1161.545158] ext4_file_read_iter+0x184/0x490 [ 1161.545655] new_sync_read+0x427/0x6f0 [ 1161.546092] ? __ia32_sys_llseek+0x380/0x380 [ 1161.546623] ? security_file_permission+0xb1/0xd0 [ 1161.547177] vfs_read+0x356/0x5f0 [ 1161.547565] ksys_read+0x12d/0x250 [ 1161.547961] ? __ia32_sys_pwrite64+0x230/0x230 [ 1161.548073] loop2: detected capacity change from 0 to 256 [ 1161.548478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.550155] do_syscall_64+0x3b/0x90 [ 1161.550583] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1161.551156] RIP: 0033:0x7f37f54efb19 [ 1161.551568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.553606] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1161.554484] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1161.555350] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1161.556181] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.556976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1161.557764] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1161.558565] [ 1161.592979] loop0: detected capacity change from 0 to 256 03:08:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 18) 03:08:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 2) read(0xffffffffffffffff, 0x0, 0x0) [ 1161.633740] FAULT_INJECTION: forcing a failure. [ 1161.633740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.635056] CPU: 1 PID: 8518 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1161.635907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.637100] Call Trace: [ 1161.637371] [ 1161.637603] dump_stack_lvl+0x8b/0xb3 [ 1161.638018] should_fail.cold+0x5/0xa [ 1161.638430] copy_page_to_iter+0x217/0xdd0 [ 1161.638887] filemap_read+0x4ff/0xbb0 [ 1161.639300] ? filemap_get_pages+0x1c90/0x1c90 [ 1161.639785] ? lock_acquire+0x1b2/0x4d0 [ 1161.640217] generic_file_read_iter+0x3cf/0x540 [ 1161.640706] ext4_file_read_iter+0x184/0x490 [ 1161.641172] new_sync_read+0x427/0x6f0 [ 1161.641590] ? __ia32_sys_llseek+0x380/0x380 [ 1161.642057] ? security_file_permission+0xb1/0xd0 [ 1161.642570] vfs_read+0x356/0x5f0 [ 1161.642939] ksys_read+0x12d/0x250 [ 1161.643313] ? __ia32_sys_pwrite64+0x230/0x230 [ 1161.643823] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.644437] do_syscall_64+0x3b/0x90 [ 1161.644864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1161.645445] RIP: 0033:0x7f63a2e8eb19 [ 1161.645865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.647960] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1161.648830] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1161.649641] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1161.650444] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.651246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1161.652045] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1161.652877] [ 1161.665460] FAULT_INJECTION: forcing a failure. [ 1161.665460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.667887] CPU: 0 PID: 8519 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1161.669540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.671782] Call Trace: [ 1161.672316] [ 1161.672770] dump_stack_lvl+0x8b/0xb3 [ 1161.673563] should_fail.cold+0x5/0xa [ 1161.674355] copy_page_to_iter+0x217/0xdd0 [ 1161.675246] filemap_read+0x4ff/0xbb0 [ 1161.676038] ? filemap_get_pages+0x1c90/0x1c90 [ 1161.676981] ? lock_acquire+0x1b2/0x4d0 [ 1161.677788] generic_file_read_iter+0x3cf/0x540 [ 1161.678716] ext4_file_read_iter+0x184/0x490 [ 1161.679597] new_sync_read+0x427/0x6f0 [ 1161.680388] ? __ia32_sys_llseek+0x380/0x380 [ 1161.681282] ? security_file_permission+0xb1/0xd0 [ 1161.682249] vfs_read+0x356/0x5f0 [ 1161.682949] ksys_read+0x12d/0x250 [ 1161.683656] ? __ia32_sys_pwrite64+0x230/0x230 [ 1161.684576] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.685605] do_syscall_64+0x3b/0x90 [ 1161.686348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1161.687361] RIP: 0033:0x7f37f54efb19 [ 1161.688106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.691700] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1161.693197] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1161.694565] FAULT_INJECTION: forcing a failure. [ 1161.694565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.694593] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1161.697391] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.698786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1161.700204] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1161.701627] [ 1161.702086] CPU: 1 PID: 8525 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1161.703036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.704348] Call Trace: [ 1161.704640] [ 1161.704891] dump_stack_lvl+0x8b/0xb3 [ 1161.705332] should_fail.cold+0x5/0xa [ 1161.705767] copy_page_to_iter+0x217/0xdd0 [ 1161.706271] filemap_read+0x4ff/0xbb0 [ 1161.706717] ? filemap_get_pages+0x1c90/0x1c90 [ 1161.707258] ? lock_acquire+0x1b2/0x4d0 [ 1161.707720] generic_file_read_iter+0x3cf/0x540 [ 1161.708266] ext4_file_read_iter+0x184/0x490 [ 1161.708767] new_sync_read+0x427/0x6f0 [ 1161.709220] ? __ia32_sys_llseek+0x380/0x380 [ 1161.709727] ? security_file_permission+0xb1/0xd0 [ 1161.710293] vfs_read+0x356/0x5f0 [ 1161.710700] ksys_read+0x12d/0x250 03:08:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x18, 0x0, 0x4) 03:08:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 18) [ 1161.711108] ? __ia32_sys_pwrite64+0x230/0x230 [ 1161.711860] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.712461] do_syscall_64+0x3b/0x90 [ 1161.712879] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1161.713462] RIP: 0033:0x7f0ad231ab19 [ 1161.713877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.715950] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1161.716816] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1161.717629] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1161.718428] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.719233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1161.720036] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1161.720853] 03:08:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1a, 0x0, 0x4) 03:08:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 3) read(0xffffffffffffffff, 0x0, 0x0) 03:08:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x18, 0x0, 0x4) 03:08:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1b, 0x0, 0x4) 03:08:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x19, 0x0, 0x4) 03:08:22 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000440)="db562ac1d10659dbb982beea318cf9d3865564eb236d144973ddaf36fcea7cfa456adf520450ca18751af171a2d046ba27ef329ab1c57f02c23120670f37cc3e7882af76159736bcb54be03825a889804b22f5fc2e3aec5538ef9a730ce11f107dd6070da2ed27a3b0ce015656f7a6509c9ca27beb829770e220b888b47da2f8ee0dccd866adbeb3dd2fb3a19d8c9a0565cf9a0470f14778bb58f943919ddd81c2447d94541385d8fbbfc12bd6808e49", 0xb0, 0x7}, {&(0x7f0000000500), 0x0, 0xff}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:22 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 19) 03:08:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 19) [ 1173.646064] FAULT_INJECTION: forcing a failure. [ 1173.646064] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1173.647429] CPU: 1 PID: 8549 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1173.648325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.649557] Call Trace: [ 1173.649832] [ 1173.650077] dump_stack_lvl+0x8b/0xb3 [ 1173.650167] FAULT_INJECTION: forcing a failure. [ 1173.650167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1173.650517] should_fail.cold+0x5/0xa [ 1173.653348] prepare_alloc_pages+0x17b/0x500 [ 1173.653810] __alloc_pages+0x131/0x4e0 [ 1173.654218] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1173.654839] ? __lock_acquire+0xbac/0x5b70 [ 1173.655287] ? mark_lock+0xfc/0x2e10 [ 1173.655673] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1173.656255] alloc_pages_vma+0xde/0x500 [ 1173.656683] __handle_mm_fault+0xfb3/0x3570 [ 1173.657144] ? lock_is_held_type+0xd7/0x130 [ 1173.657604] ? __pmd_alloc+0x680/0x680 [ 1173.658041] handle_mm_fault+0x2e6/0xa20 [ 1173.658470] do_user_addr_fault+0x54a/0x12a0 [ 1173.658946] exc_page_fault+0xa2/0x1a0 [ 1173.659347] asm_exc_page_fault+0x1e/0x30 [ 1173.659775] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1173.660352] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1173.662236] RSP: 0018:ffff88803997f9f0 EFLAGS: 00050246 [ 1173.662825] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1173.663608] RDX: 0000000000000000 RSI: ffff88801f2f0000 RDI: 0000000020009000 [ 1173.664377] RBP: 0000000020009000 R08: 0000000000000000 R09: ffff88801f2f0fff [ 1173.665133] R10: ffffed1003e5e1ff R11: 0000000000000001 R12: ffff88801f2f0000 [ 1173.665900] R13: 000000002000a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1173.666689] copyout.part.0+0xdf/0x110 [ 1173.667117] copy_page_to_iter+0x248/0xdd0 [ 1173.667589] filemap_read+0x4ff/0xbb0 [ 1173.668016] ? filemap_get_pages+0x1c90/0x1c90 [ 1173.668567] ? lock_acquire+0x1b2/0x4d0 [ 1173.669012] generic_file_read_iter+0x3cf/0x540 [ 1173.669503] ext4_file_read_iter+0x184/0x490 [ 1173.669979] new_sync_read+0x427/0x6f0 [ 1173.670386] ? __ia32_sys_llseek+0x380/0x380 [ 1173.670881] ? security_file_permission+0xb1/0xd0 [ 1173.671398] vfs_read+0x356/0x5f0 [ 1173.671778] ksys_read+0x12d/0x250 [ 1173.672155] ? __ia32_sys_pwrite64+0x230/0x230 [ 1173.672667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1173.673217] do_syscall_64+0x3b/0x90 [ 1173.673628] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1173.674159] RIP: 0033:0x7f0ad231ab19 [ 1173.674554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.676463] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1173.677277] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1173.678036] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1173.678800] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.679564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1173.680333] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1173.681106] [ 1173.681353] CPU: 0 PID: 8550 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1173.683073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.685440] Call Trace: [ 1173.685975] [ 1173.686441] dump_stack_lvl+0x8b/0xb3 [ 1173.687256] should_fail.cold+0x5/0xa [ 1173.688070] prepare_alloc_pages+0x17b/0x500 [ 1173.689008] __alloc_pages+0x131/0x4e0 [ 1173.689828] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1173.691087] ? __lock_acquire+0xbac/0x5b70 [ 1173.691987] ? mark_lock+0xfc/0x2e10 [ 1173.692785] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1173.693944] alloc_pages_vma+0xde/0x500 03:08:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1a, 0x0, 0x4) [ 1173.694792] __handle_mm_fault+0xfb3/0x3570 [ 1173.695837] ? lock_is_held_type+0xd7/0x130 [ 1173.696743] ? __pmd_alloc+0x680/0x680 [ 1173.697605] handle_mm_fault+0x2e6/0xa20 [ 1173.698469] do_user_addr_fault+0x54a/0x12a0 [ 1173.699408] exc_page_fault+0xa2/0x1a0 [ 1173.700221] asm_exc_page_fault+0x1e/0x30 [ 1173.701091] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1173.702224] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1173.706030] RSP: 0018:ffff88803fbf79f0 EFLAGS: 00050246 [ 1173.707128] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1173.708605] RDX: 0000000000000000 RSI: ffff88801f2f0000 RDI: 0000000020009000 [ 1173.710245] RBP: 0000000020009000 R08: 0000000000000000 R09: ffff88801f2f0fff [ 1173.710668] FAULT_INJECTION: forcing a failure. [ 1173.710668] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1173.711716] R10: ffffed1003e5e1ff R11: 0000000000000001 R12: ffff88801f2f0000 [ 1173.711733] R13: 000000002000a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1173.711778] copyout.part.0+0xdf/0x110 [ 1173.716709] copy_page_to_iter+0x248/0xdd0 [ 1173.717626] filemap_read+0x4ff/0xbb0 [ 1173.718446] ? filemap_get_pages+0x1c90/0x1c90 [ 1173.719427] ? lock_acquire+0x1b2/0x4d0 [ 1173.720283] generic_file_read_iter+0x3cf/0x540 [ 1173.721270] ext4_file_read_iter+0x184/0x490 [ 1173.722198] new_sync_read+0x427/0x6f0 [ 1173.723012] ? __ia32_sys_llseek+0x380/0x380 [ 1173.723957] ? security_file_permission+0xb1/0xd0 [ 1173.724982] vfs_read+0x356/0x5f0 [ 1173.725718] ksys_read+0x12d/0x250 [ 1173.726464] ? __ia32_sys_pwrite64+0x230/0x230 [ 1173.727426] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1173.728513] do_syscall_64+0x3b/0x90 [ 1173.729299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1173.730366] RIP: 0033:0x7f63a2e8eb19 [ 1173.731134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.734948] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1173.736524] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1173.737995] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1173.739463] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.740946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1173.742417] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1173.743921] [ 1173.744407] CPU: 1 PID: 8548 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1173.745363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.746592] Call Trace: [ 1173.746872] [ 1173.747117] dump_stack_lvl+0x8b/0xb3 [ 1173.747541] should_fail.cold+0x5/0xa [ 1173.747982] prepare_alloc_pages+0x17b/0x500 [ 1173.748488] __alloc_pages+0x131/0x4e0 [ 1173.748923] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1173.749586] ? __lock_acquire+0xbac/0x5b70 [ 1173.750067] ? mark_lock+0xfc/0x2e10 [ 1173.750479] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1173.751099] alloc_pages_vma+0xde/0x500 [ 1173.751548] __handle_mm_fault+0xfb3/0x3570 [ 1173.752034] ? lock_is_held_type+0xd7/0x130 [ 1173.752515] ? __pmd_alloc+0x680/0x680 [ 1173.752979] handle_mm_fault+0x2e6/0xa20 [ 1173.753444] do_user_addr_fault+0x54a/0x12a0 [ 1173.753935] exc_page_fault+0xa2/0x1a0 [ 1173.754367] asm_exc_page_fault+0x1e/0x30 [ 1173.754827] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1173.755432] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1173.757462] RSP: 0018:ffff8880442079f0 EFLAGS: 00050246 [ 1173.758052] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1173.758837] RDX: 0000000000000000 RSI: ffff88801f2f1000 RDI: 0000000020001000 [ 1173.759645] RBP: 0000000020001000 R08: 0000000000000000 R09: ffff88801f2f1fff [ 1173.760438] R10: ffffed1003e5e3ff R11: 0000000000000001 R12: ffff88801f2f1000 [ 1173.761238] R13: 0000000020002000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1173.762045] copyout.part.0+0xdf/0x110 [ 1173.762478] copy_page_to_iter+0x248/0xdd0 [ 1173.762961] filemap_read+0x4ff/0xbb0 [ 1173.763386] ? filemap_get_pages+0x1c90/0x1c90 [ 1173.763907] ? lock_acquire+0x1b2/0x4d0 [ 1173.764358] generic_file_read_iter+0x3cf/0x540 [ 1173.764892] ext4_file_read_iter+0x184/0x490 [ 1173.765396] new_sync_read+0x427/0x6f0 [ 1173.765832] ? __ia32_sys_llseek+0x380/0x380 [ 1173.766342] ? security_file_permission+0xb1/0xd0 [ 1173.766881] vfs_read+0x356/0x5f0 [ 1173.767284] ksys_read+0x12d/0x250 [ 1173.767680] ? __ia32_sys_pwrite64+0x230/0x230 [ 1173.768192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1173.768798] do_syscall_64+0x3b/0x90 [ 1173.769229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1173.769807] RIP: 0033:0x7f37f54efb19 [ 1173.770220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.772299] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1173.773152] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1173.773953] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1173.774763] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.775568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1173.776390] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1173.777205] [ 1173.778629] loop2: detected capacity change from 0 to 256 03:08:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1c, 0x0, 0x4) 03:08:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1b, 0x0, 0x4) [ 1173.840339] Process accounting resumed 03:08:22 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000440)="db562ac1d10659dbb982beea318cf9d3865564eb236d144973ddaf36fcea7cfa456adf520450ca18751af171a2d046ba27ef329ab1c57f02c23120670f37cc3e7882af76159736bcb54be03825a889804b22f5fc2e3aec5538ef9a730ce11f107dd6070da2ed27a3b0ce015656f7a6509c9ca27beb829770e220b888b47da2f8ee0dccd866adbeb3dd2fb3a19d8c9a0565cf9a0470f14778bb58f943919ddd81c2447d94541385d8fbbfc12bd6808e49", 0xb0, 0x7}, {&(0x7f0000000500), 0x0, 0xff}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 20) 03:08:22 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x18, 0x0, 0x4) [ 1173.867089] FAULT_INJECTION: forcing a failure. [ 1173.867089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1173.868440] CPU: 1 PID: 8558 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1173.869319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.870538] Call Trace: [ 1173.870817] [ 1173.871057] dump_stack_lvl+0x8b/0xb3 [ 1173.871484] should_fail.cold+0x5/0xa [ 1173.871910] copy_page_to_iter+0x217/0xdd0 [ 1173.872401] filemap_read+0x4ff/0xbb0 [ 1173.872831] ? filemap_get_pages+0x1c90/0x1c90 [ 1173.873348] ? lock_acquire+0x1b2/0x4d0 [ 1173.873784] generic_file_read_iter+0x3cf/0x540 [ 1173.874296] ext4_file_read_iter+0x184/0x490 [ 1173.874775] new_sync_read+0x427/0x6f0 [ 1173.875205] ? __ia32_sys_llseek+0x380/0x380 [ 1173.875699] ? security_file_permission+0xb1/0xd0 [ 1173.876214] vfs_read+0x356/0x5f0 [ 1173.876608] ksys_read+0x12d/0x250 [ 1173.876987] ? __ia32_sys_pwrite64+0x230/0x230 [ 1173.877482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1173.878048] do_syscall_64+0x3b/0x90 [ 1173.878460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1173.879023] RIP: 0033:0x7f0ad231ab19 [ 1173.879424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.881411] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1173.882240] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1173.883015] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1173.883783] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.884556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1173.885324] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1173.886122] 03:08:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1c, 0x0, 0x4) [ 1173.975613] loop2: detected capacity change from 0 to 256 [ 1186.274667] FAULT_INJECTION: forcing a failure. [ 1186.274667] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1186.275983] CPU: 1 PID: 8583 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.276855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.278037] Call Trace: [ 1186.278304] [ 1186.278532] dump_stack_lvl+0x8b/0xb3 [ 1186.278944] should_fail.cold+0x5/0xa [ 1186.279365] copy_page_to_iter+0x217/0xdd0 [ 1186.279838] filemap_read+0x4ff/0xbb0 [ 1186.280255] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.280773] ? lock_acquire+0x1b2/0x4d0 [ 1186.281197] generic_file_read_iter+0x3cf/0x540 [ 1186.281683] ext4_file_read_iter+0x184/0x490 [ 1186.282164] new_sync_read+0x427/0x6f0 [ 1186.282587] ? __ia32_sys_llseek+0x380/0x380 [ 1186.283072] ? security_file_permission+0xb1/0xd0 [ 1186.283237] FAULT_INJECTION: forcing a failure. [ 1186.283237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1186.283584] vfs_read+0x356/0x5f0 [ 1186.286329] ksys_read+0x12d/0x250 [ 1186.286698] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.287202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.287738] do_syscall_64+0x3b/0x90 [ 1186.288137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.288679] RIP: 0033:0x7f63a2e8eb19 [ 1186.289069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.290956] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.291727] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1186.292458] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.293190] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.293926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1186.294678] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1186.295421] [ 1186.295660] CPU: 0 PID: 8584 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.297316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.299561] Call Trace: 03:08:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 20) 03:08:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1d, 0x0, 0x4) 03:08:35 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1d, 0x0, 0x4) 03:08:35 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 1) 03:08:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 21) 03:08:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 4) read(0xffffffffffffffff, 0x0, 0x0) [ 1186.300071] [ 1186.300689] dump_stack_lvl+0x8b/0xb3 [ 1186.301474] should_fail.cold+0x5/0xa [ 1186.302244] prepare_alloc_pages+0x17b/0x500 03:08:35 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000440)="db562ac1d10659dbb982beea318cf9d3865564eb236d144973ddaf36fcea7cfa456adf520450ca18751af171a2d046ba27ef329ab1c57f02c23120670f37cc3e7882af76159736bcb54be03825a889804b22f5fc2e3aec5538ef9a730ce11f107dd6070da2ed27a3b0ce015656f7a6509c9ca27beb829770e220b888b47da2f8ee0dccd866adbeb3dd2fb3a19d8c9a0565cf9a0470f14778bb58f943919ddd81c2447d94541385d8fbbfc12bd6808e49", 0xb0, 0x7}, {&(0x7f0000000500), 0x0, 0xff}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1186.303124] __alloc_pages+0x131/0x4e0 [ 1186.303956] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1186.305160] ? __lock_acquire+0xbac/0x5b70 [ 1186.306016] ? mark_lock+0xfc/0x2e10 [ 1186.306754] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1186.307863] alloc_pages_vma+0xde/0x500 [ 1186.308697] __handle_mm_fault+0xfb3/0x3570 [ 1186.309577] ? lock_is_held_type+0xd7/0x130 [ 1186.310436] ? __pmd_alloc+0x680/0x680 [ 1186.311259] handle_mm_fault+0x2e6/0xa20 [ 1186.312085] do_user_addr_fault+0x54a/0x12a0 [ 1186.312985] exc_page_fault+0xa2/0x1a0 [ 1186.313768] asm_exc_page_fault+0x1e/0x30 [ 1186.314586] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1186.315680] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1186.319321] RSP: 0018:ffff88803dd479f0 EFLAGS: 00050246 [ 1186.320371] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1186.321784] RDX: 0000000000000000 RSI: ffff88801f2e2000 RDI: 000000002000a000 [ 1186.323186] RBP: 000000002000a000 R08: 0000000000000000 R09: ffff88801f2e2fff [ 1186.324605] R10: ffffed1003e5c5ff R11: 0000000000000001 R12: ffff88801f2e2000 [ 1186.326011] R13: 000000002000b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1186.327461] copyout.part.0+0xdf/0x110 [ 1186.328274] copy_page_to_iter+0x248/0xdd0 [ 1186.329163] filemap_read+0x4ff/0xbb0 [ 1186.329962] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.330904] ? lock_acquire+0x1b2/0x4d0 [ 1186.331715] generic_file_read_iter+0x3cf/0x540 [ 1186.332694] ext4_file_read_iter+0x184/0x490 [ 1186.333590] new_sync_read+0x427/0x6f0 [ 1186.334387] ? __ia32_sys_llseek+0x380/0x380 [ 1186.335292] ? security_file_permission+0xb1/0xd0 [ 1186.336286] vfs_read+0x356/0x5f0 [ 1186.337003] ksys_read+0x12d/0x250 [ 1186.337725] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.338650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.339686] do_syscall_64+0x3b/0x90 [ 1186.340061] FAULT_INJECTION: forcing a failure. [ 1186.340061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1186.340445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.342694] RIP: 0033:0x7f0ad231ab19 [ 1186.343431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.347092] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.348614] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1186.350026] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.351439] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.352851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1186.354267] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1186.355699] [ 1186.356168] CPU: 1 PID: 8590 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.357090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.358258] Call Trace: [ 1186.358529] [ 1186.358760] dump_stack_lvl+0x8b/0xb3 [ 1186.359179] should_fail.cold+0x5/0xa 03:08:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 21) [ 1186.359580] prepare_alloc_pages+0x17b/0x500 [ 1186.360293] __alloc_pages+0x131/0x4e0 [ 1186.360708] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1186.361380] ? __lock_acquire+0xbac/0x5b70 [ 1186.361827] ? mark_lock+0xfc/0x2e10 [ 1186.362221] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1186.362795] alloc_pages_vma+0xde/0x500 [ 1186.363222] __handle_mm_fault+0xfb3/0x3570 [ 1186.363680] ? lock_is_held_type+0xd7/0x130 [ 1186.364150] ? __pmd_alloc+0x680/0x680 [ 1186.364591] handle_mm_fault+0x2e6/0xa20 [ 1186.365037] do_user_addr_fault+0x54a/0x12a0 [ 1186.365502] exc_page_fault+0xa2/0x1a0 [ 1186.365917] asm_exc_page_fault+0x1e/0x30 [ 1186.366348] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1186.366933] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1186.368828] RSP: 0018:ffff8880415a79f0 EFLAGS: 00050246 [ 1186.369403] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1186.370147] RDX: 0000000000000000 RSI: ffff88801f2e2000 RDI: 000000002000a000 [ 1186.370876] RBP: 000000002000a000 R08: 0000000000000000 R09: ffff88801f2e2fff [ 1186.371603] R10: ffffed1003e5c5ff R11: 0000000000000001 R12: ffff88801f2e2000 [ 1186.372332] R13: 000000002000b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1186.373085] copyout.part.0+0xdf/0x110 [ 1186.373496] copy_page_to_iter+0x248/0xdd0 [ 1186.373958] filemap_read+0x4ff/0xbb0 [ 1186.374367] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.374854] ? lock_acquire+0x1b2/0x4d0 [ 1186.375271] generic_file_read_iter+0x3cf/0x540 [ 1186.375771] ext4_file_read_iter+0x184/0x490 [ 1186.376248] new_sync_read+0x427/0x6f0 [ 1186.376671] ? __ia32_sys_llseek+0x380/0x380 [ 1186.377165] ? security_file_permission+0xb1/0xd0 [ 1186.377673] vfs_read+0x356/0x5f0 [ 1186.378051] ksys_read+0x12d/0x250 [ 1186.378428] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.378909] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.379456] do_syscall_64+0x3b/0x90 [ 1186.379854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.380387] RIP: 0033:0x7f63a2e8eb19 [ 1186.380793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.381755] FAULT_INJECTION: forcing a failure. [ 1186.381755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1186.382678] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.382693] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1186.382703] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.382711] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.382720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1186.388915] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1186.389700] [ 1186.389950] CPU: 0 PID: 8595 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.391578] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.393822] Call Trace: [ 1186.394329] [ 1186.394775] dump_stack_lvl+0x8b/0xb3 [ 1186.395547] should_fail.cold+0x5/0xa [ 1186.396317] copy_page_to_iter+0x217/0xdd0 [ 1186.397195] filemap_read+0x4ff/0xbb0 [ 1186.397976] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.398904] ? lock_acquire+0x1b2/0x4d0 [ 1186.399709] generic_file_read_iter+0x3cf/0x540 [ 1186.400664] ext4_file_read_iter+0x184/0x490 [ 1186.401551] new_sync_read+0x427/0x6f0 [ 1186.402328] ? __ia32_sys_llseek+0x380/0x380 [ 1186.403228] ? security_file_permission+0xb1/0xd0 [ 1186.404198] vfs_read+0x356/0x5f0 [ 1186.404917] ksys_read+0x12d/0x250 [ 1186.405634] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.406565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.407593] do_syscall_64+0x3b/0x90 [ 1186.408343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.409376] RIP: 0033:0x7f37f54efb19 03:08:35 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1186.410107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.413884] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.415379] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1186.416813] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.418223] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.419638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1186.421061] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1186.422498] [ 1186.424958] FAULT_INJECTION: forcing a failure. [ 1186.424958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1186.426304] CPU: 1 PID: 8585 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.427151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.428325] Call Trace: [ 1186.428605] [ 1186.428843] dump_stack_lvl+0x8b/0xb3 [ 1186.429260] should_fail.cold+0x5/0xa [ 1186.429672] copy_page_to_iter+0x217/0xdd0 [ 1186.430139] filemap_read+0x4ff/0xbb0 [ 1186.430547] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.431037] ? lock_acquire+0x1b2/0x4d0 [ 1186.431459] generic_file_read_iter+0x3cf/0x540 [ 1186.431958] ext4_file_read_iter+0x184/0x490 [ 1186.432433] new_sync_read+0x427/0x6f0 [ 1186.432865] ? __ia32_sys_llseek+0x380/0x380 [ 1186.433346] ? security_file_permission+0xb1/0xd0 [ 1186.433868] vfs_read+0x356/0x5f0 [ 1186.434241] ksys_read+0x12d/0x250 [ 1186.434618] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.435097] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.435644] do_syscall_64+0x3b/0x90 [ 1186.436035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.436586] RIP: 0033:0x7fa9c71a5b19 [ 1186.436977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.438877] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.439666] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1186.440403] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.441179] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.441930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1186.442676] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1186.443423] [ 1186.454143] loop2: detected capacity change from 0 to 256 03:08:35 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:08:35 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 2) 03:08:35 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000440)="db562ac1d10659dbb982beea318cf9d3865564eb236d144973ddaf36fcea7cfa456adf520450ca18751af171a2d046ba27ef329ab1c57f02c23120670f37cc3e7882af76159736bcb54be03825a889804b22f5fc2e3aec5538ef9a730ce11f107dd6070da2ed27a3b0ce015656f7a6509c9ca27beb829770e220b888b47da2f8ee0dccd866adbeb3dd2fb3a19d8c9a0565cf9a0470f14778bb58f943919ddd81c2447d94541385d8fbbfc12bd6808e49", 0xb0, 0x7}, {&(0x7f0000000500)}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1e, 0x0, 0x4) 03:08:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x1e, 0x0, 0x4) [ 1186.545855] FAULT_INJECTION: forcing a failure. [ 1186.545855] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1186.547125] CPU: 1 PID: 8604 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1186.548035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1186.549250] Call Trace: [ 1186.549536] [ 1186.549791] dump_stack_lvl+0x8b/0xb3 [ 1186.550236] should_fail.cold+0x5/0xa [ 1186.550670] copy_page_to_iter+0x217/0xdd0 [ 1186.551160] filemap_read+0x4ff/0xbb0 [ 1186.551603] ? filemap_get_pages+0x1c90/0x1c90 [ 1186.552138] ? lock_acquire+0x1b2/0x4d0 [ 1186.552617] generic_file_read_iter+0x3cf/0x540 [ 1186.553141] ext4_file_read_iter+0x184/0x490 [ 1186.553639] new_sync_read+0x427/0x6f0 [ 1186.554073] ? __ia32_sys_llseek+0x380/0x380 [ 1186.554553] ? security_file_permission+0xb1/0xd0 [ 1186.555102] vfs_read+0x356/0x5f0 [ 1186.555497] ksys_read+0x12d/0x250 [ 1186.555902] ? __ia32_sys_pwrite64+0x230/0x230 [ 1186.556421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1186.557017] do_syscall_64+0x3b/0x90 [ 1186.557439] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.558016] RIP: 0033:0x7fa9c71a5b19 [ 1186.558435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1186.560513] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1186.561342] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1186.562129] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1186.562912] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1186.563705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1186.564515] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1186.565330] 03:08:35 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1186.593584] loop2: detected capacity change from 0 to 256 03:08:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 5) read(0xffffffffffffffff, 0x0, 0x0) 03:08:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 22) 03:08:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x0) 03:08:48 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 3) 03:08:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x21, 0x0, 0x4) 03:08:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x21, 0x0, 0x4) 03:08:48 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000500)}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:08:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 22) [ 1199.346786] FAULT_INJECTION: forcing a failure. [ 1199.346786] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1199.347392] loop2: detected capacity change from 0 to 256 [ 1199.349408] CPU: 1 PID: 8621 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1199.351601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1199.354012] Call Trace: [ 1199.354570] [ 1199.355059] dump_stack_lvl+0x8b/0xb3 [ 1199.355915] should_fail.cold+0x5/0xa [ 1199.356781] copy_page_to_iter+0x217/0xdd0 [ 1199.357745] filemap_read+0x4ff/0xbb0 [ 1199.358607] ? filemap_get_pages+0x1c90/0x1c90 [ 1199.359644] ? lock_acquire+0x1b2/0x4d0 [ 1199.360535] generic_file_read_iter+0x3cf/0x540 [ 1199.361598] ext4_file_read_iter+0x184/0x490 [ 1199.362578] new_sync_read+0x427/0x6f0 [ 1199.363433] ? __ia32_sys_llseek+0x380/0x380 [ 1199.364427] ? security_file_permission+0xb1/0xd0 [ 1199.364580] FAULT_INJECTION: forcing a failure. [ 1199.364580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1199.365506] vfs_read+0x356/0x5f0 [ 1199.367556] ksys_read+0x12d/0x250 [ 1199.368339] ? __ia32_sys_pwrite64+0x230/0x230 [ 1199.369377] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1199.370532] do_syscall_64+0x3b/0x90 [ 1199.371348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1199.372433] RIP: 0033:0x7f0ad231ab19 [ 1199.373250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.377121] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1199.378786] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1199.380369] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1199.381957] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1199.383528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1199.385108] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1199.386755] [ 1199.387267] CPU: 0 PID: 8624 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1199.388192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1199.389438] Call Trace: [ 1199.389717] [ 1199.389964] dump_stack_lvl+0x8b/0xb3 [ 1199.390399] should_fail.cold+0x5/0xa [ 1199.390823] prepare_alloc_pages+0x17b/0x500 [ 1199.391321] __alloc_pages+0x131/0x4e0 [ 1199.391749] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1199.392423] ? __lock_acquire+0xbac/0x5b70 [ 1199.392901] ? mark_lock+0xfc/0x2e10 [ 1199.393318] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1199.393921] alloc_pages_vma+0xde/0x500 [ 1199.394362] __handle_mm_fault+0xfb3/0x3570 [ 1199.394838] ? lock_is_held_type+0xd7/0x130 [ 1199.395314] ? __pmd_alloc+0x680/0x680 [ 1199.395760] handle_mm_fault+0x2e6/0xa20 [ 1199.396217] do_user_addr_fault+0x54a/0x12a0 [ 1199.396728] exc_page_fault+0xa2/0x1a0 [ 1199.397168] asm_exc_page_fault+0x1e/0x30 [ 1199.397631] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1199.398250] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1199.400322] RSP: 0018:ffff8880171df9f0 EFLAGS: 00050246 [ 1199.400927] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1199.401728] RDX: 0000000000000000 RSI: ffff88801f2ed000 RDI: 0000000020002000 [ 1199.402532] RBP: 0000000020002000 R08: 0000000000000000 R09: ffff88801f2edfff [ 1199.403341] R10: ffffed1003e5dbff R11: 0000000000000001 R12: ffff88801f2ed000 [ 1199.404139] R13: 0000000020003000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1199.404959] copyout.part.0+0xdf/0x110 [ 1199.405408] copy_page_to_iter+0x248/0xdd0 [ 1199.405901] filemap_read+0x4ff/0xbb0 [ 1199.406346] ? filemap_get_pages+0x1c90/0x1c90 [ 1199.406862] ? lock_acquire+0x1b2/0x4d0 [ 1199.407150] FAULT_INJECTION: forcing a failure. [ 1199.407150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1199.407297] generic_file_read_iter+0x3cf/0x540 [ 1199.407320] ext4_file_read_iter+0x184/0x490 [ 1199.410919] new_sync_read+0x427/0x6f0 [ 1199.411348] ? __ia32_sys_llseek+0x380/0x380 [ 1199.411842] ? security_file_permission+0xb1/0xd0 [ 1199.412382] vfs_read+0x356/0x5f0 [ 1199.412776] ksys_read+0x12d/0x250 [ 1199.413160] ? __ia32_sys_pwrite64+0x230/0x230 [ 1199.413663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1199.414231] do_syscall_64+0x3b/0x90 [ 1199.414645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1199.415201] RIP: 0033:0x7f37f54efb19 [ 1199.415602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.417587] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1199.418404] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1199.419175] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1199.419951] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1199.420731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1199.421504] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1199.422287] [ 1199.422539] CPU: 1 PID: 8632 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1199.424354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1199.425656] FAULT_INJECTION: forcing a failure. [ 1199.425656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1199.426830] Call Trace: [ 1199.426841] [ 1199.426853] dump_stack_lvl+0x8b/0xb3 [ 1199.430027] should_fail.cold+0x5/0xa [ 1199.430875] prepare_alloc_pages+0x17b/0x500 [ 1199.431927] __alloc_pages+0x131/0x4e0 [ 1199.432844] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1199.434236] ? __lock_acquire+0xbac/0x5b70 [ 1199.435231] ? mark_lock+0xfc/0x2e10 [ 1199.436092] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1199.437385] alloc_pages_vma+0xde/0x500 [ 1199.438328] __handle_mm_fault+0xfb3/0x3570 [ 1199.439342] ? lock_is_held_type+0xd7/0x130 [ 1199.440335] ? __pmd_alloc+0x680/0x680 [ 1199.441302] handle_mm_fault+0x2e6/0xa20 [ 1199.442258] do_user_addr_fault+0x54a/0x12a0 [ 1199.443303] exc_page_fault+0xa2/0x1a0 [ 1199.444203] asm_exc_page_fault+0x1e/0x30 [ 1199.445180] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1199.446433] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1199.450633] RSP: 0018:ffff88804106f9f0 EFLAGS: 00050246 [ 1199.451853] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1199.453496] RDX: 0000000000000000 RSI: ffff88801f2f1000 RDI: 0000000020001000 [ 1199.455126] RBP: 0000000020001000 R08: 0000000000000000 R09: ffff88801f2f1fff [ 1199.456775] R10: ffffed1003e5e3ff R11: 0000000000000001 R12: ffff88801f2f1000 [ 1199.458399] R13: 0000000020002000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1199.460054] copyout.part.0+0xdf/0x110 [ 1199.460989] copy_page_to_iter+0x248/0xdd0 [ 1199.462006] filemap_read+0x4ff/0xbb0 [ 1199.462913] ? filemap_get_pages+0x1c90/0x1c90 [ 1199.464002] ? lock_acquire+0x1b2/0x4d0 [ 1199.465034] generic_file_read_iter+0x3cf/0x540 [ 1199.466255] ext4_file_read_iter+0x184/0x490 [ 1199.467394] new_sync_read+0x427/0x6f0 [ 1199.468391] ? __ia32_sys_llseek+0x380/0x380 [ 1199.469508] ? security_file_permission+0xb1/0xd0 [ 1199.470571] vfs_read+0x356/0x5f0 [ 1199.471346] ksys_read+0x12d/0x250 [ 1199.472127] ? __ia32_sys_pwrite64+0x230/0x230 [ 1199.473144] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1199.474275] do_syscall_64+0x3b/0x90 [ 1199.475104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1199.476217] RIP: 0033:0x7fa9c71a5b19 [ 1199.477027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.480982] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1199.482613] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1199.484144] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1199.485682] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1199.487210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1199.488744] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1199.490354] [ 1199.490861] CPU: 0 PID: 8633 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1199.491733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1199.492896] Call Trace: [ 1199.493158] [ 1199.493391] dump_stack_lvl+0x8b/0xb3 [ 1199.493794] should_fail.cold+0x5/0xa [ 1199.494201] copy_page_to_iter+0x217/0xdd0 [ 1199.494654] filemap_read+0x4ff/0xbb0 [ 1199.495059] ? filemap_get_pages+0x1c90/0x1c90 [ 1199.495551] ? lock_acquire+0x1b2/0x4d0 [ 1199.495968] generic_file_read_iter+0x3cf/0x540 [ 1199.496461] ext4_file_read_iter+0x184/0x490 [ 1199.496949] new_sync_read+0x427/0x6f0 [ 1199.497357] ? __ia32_sys_llseek+0x380/0x380 [ 1199.497848] ? security_file_permission+0xb1/0xd0 [ 1199.498378] vfs_read+0x356/0x5f0 [ 1199.498756] ksys_read+0x12d/0x250 [ 1199.499139] ? __ia32_sys_pwrite64+0x230/0x230 [ 1199.499635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1199.500200] do_syscall_64+0x3b/0x90 [ 1199.500608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1199.501162] RIP: 0033:0x7f63a2e8eb19 [ 1199.501567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.503540] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1199.504358] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1199.505134] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1199.505907] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1199.506678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1199.507447] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1199.508238] 03:09:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 6) read(0xffffffffffffffff, 0x0, 0x0) 03:09:02 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 4) 03:09:02 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000500)}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 23) 03:09:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x22, 0x0, 0x4) 03:09:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x22, 0x0, 0x4) 03:09:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 23) [ 1213.054514] FAULT_INJECTION: forcing a failure. [ 1213.054514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1213.057067] FAULT_INJECTION: forcing a failure. [ 1213.057067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1213.057107] CPU: 0 PID: 8652 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.057132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.057147] Call Trace: [ 1213.057155] [ 1213.064356] dump_stack_lvl+0x8b/0xb3 [ 1213.065144] should_fail.cold+0x5/0xa [ 1213.065924] prepare_alloc_pages+0x17b/0x500 [ 1213.066822] __alloc_pages+0x131/0x4e0 [ 1213.067597] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1213.068797] ? __lock_acquire+0xbac/0x5b70 [ 1213.069679] ? mark_lock+0xfc/0x2e10 [ 1213.070417] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1213.071526] alloc_pages_vma+0xde/0x500 [ 1213.072336] __handle_mm_fault+0xfb3/0x3570 [ 1213.073254] ? lock_is_held_type+0xd7/0x130 [ 1213.074105] ? __pmd_alloc+0x680/0x680 [ 1213.074934] handle_mm_fault+0x2e6/0xa20 [ 1213.075756] do_user_addr_fault+0x54a/0x12a0 [ 1213.076658] exc_page_fault+0xa2/0x1a0 [ 1213.077438] asm_exc_page_fault+0x1e/0x30 [ 1213.078271] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1213.079360] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1213.082982] RSP: 0018:ffff8880448ef9f0 EFLAGS: 00050246 [ 1213.084023] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1213.085429] RDX: 0000000000000000 RSI: ffff88801f301000 RDI: 000000002000b000 [ 1213.086827] RBP: 000000002000b000 R08: 0000000000000000 R09: ffff88801f301fff [ 1213.088231] R10: ffffed1003e603ff R11: 0000000000000001 R12: ffff88801f301000 [ 1213.089647] R13: 000000002000c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1213.091063] copyout.part.0+0xdf/0x110 [ 1213.091857] copy_page_to_iter+0x248/0xdd0 [ 1213.092727] filemap_read+0x4ff/0xbb0 [ 1213.093513] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.094456] ? lock_acquire+0x1b2/0x4d0 [ 1213.095254] generic_file_read_iter+0x3cf/0x540 [ 1213.096188] ext4_file_read_iter+0x184/0x490 [ 1213.097083] new_sync_read+0x427/0x6f0 [ 1213.097858] ? __ia32_sys_llseek+0x380/0x380 [ 1213.098761] ? security_file_permission+0xb1/0xd0 [ 1213.099733] vfs_read+0x356/0x5f0 [ 1213.100435] ksys_read+0x12d/0x250 [ 1213.101158] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.102068] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.103096] do_syscall_64+0x3b/0x90 [ 1213.103854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.104872] RIP: 0033:0x7f0ad231ab19 [ 1213.105599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.109223] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.110720] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1213.112129] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.113550] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.114972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1213.116367] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1213.117801] [ 1213.118259] CPU: 1 PID: 8650 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.120040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.122434] Call Trace: [ 1213.122980] [ 1213.123454] dump_stack_lvl+0x8b/0xb3 [ 1213.124284] should_fail.cold+0x5/0xa [ 1213.125129] copy_page_to_iter+0x217/0xdd0 [ 1213.126058] filemap_read+0x4ff/0xbb0 [ 1213.126887] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.127877] ? lock_acquire+0x1b2/0x4d0 [ 1213.128726] generic_file_read_iter+0x3cf/0x540 [ 1213.129729] ext4_file_read_iter+0x184/0x490 [ 1213.130672] new_sync_read+0x427/0x6f0 [ 1213.131498] ? __ia32_sys_llseek+0x380/0x380 [ 1213.132454] ? security_file_permission+0xb1/0xd0 [ 1213.133497] vfs_read+0x356/0x5f0 [ 1213.134246] ksys_read+0x12d/0x250 [ 1213.135000] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.135972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.137092] do_syscall_64+0x3b/0x90 [ 1213.137896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.138981] RIP: 0033:0x7fa9c71a5b19 [ 1213.139762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.143638] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.145245] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1213.146741] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.148244] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.149753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1213.151248] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1213.152770] 03:09:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x0) [ 1213.165264] loop2: detected capacity change from 0 to 256 [ 1213.174557] FAULT_INJECTION: forcing a failure. [ 1213.174557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1213.177096] CPU: 1 PID: 8654 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.178834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.181244] Call Trace: [ 1213.181784] [ 1213.182260] dump_stack_lvl+0x8b/0xb3 [ 1213.183093] should_fail.cold+0x5/0xa [ 1213.183919] copy_page_to_iter+0x217/0xdd0 [ 1213.184855] filemap_read+0x4ff/0xbb0 [ 1213.185703] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.186702] ? lock_acquire+0x1b2/0x4d0 [ 1213.187556] generic_file_read_iter+0x3cf/0x540 [ 1213.188553] ext4_file_read_iter+0x184/0x490 [ 1213.189520] new_sync_read+0x427/0x6f0 [ 1213.190352] ? __ia32_sys_llseek+0x380/0x380 [ 1213.191314] ? security_file_permission+0xb1/0xd0 [ 1213.192350] vfs_read+0x356/0x5f0 [ 1213.193107] ksys_read+0x12d/0x250 [ 1213.193863] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.194839] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.195941] do_syscall_64+0x3b/0x90 [ 1213.196745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.197839] RIP: 0033:0x7f37f54efb19 [ 1213.198641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.202590] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.204194] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1213.205706] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.207224] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.208741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1213.210265] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1213.211807] [ 1213.226857] FAULT_INJECTION: forcing a failure. [ 1213.226857] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1213.229489] CPU: 1 PID: 8659 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.231223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.233619] Call Trace: [ 1213.234159] [ 1213.234627] dump_stack_lvl+0x8b/0xb3 [ 1213.235454] should_fail.cold+0x5/0xa [ 1213.236285] prepare_alloc_pages+0x17b/0x500 [ 1213.237250] __alloc_pages+0x131/0x4e0 [ 1213.238084] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1213.239362] ? __lock_acquire+0xbac/0x5b70 [ 1213.240278] ? mark_lock+0xfc/0x2e10 [ 1213.241072] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1213.242259] alloc_pages_vma+0xde/0x500 [ 1213.243124] __handle_mm_fault+0xfb3/0x3570 03:09:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x23, 0x0, 0x4) 03:09:02 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000500)}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1213.244071] ? lock_is_held_type+0xd7/0x130 [ 1213.245241] ? __pmd_alloc+0x680/0x680 [ 1213.246119] handle_mm_fault+0x2e6/0xa20 [ 1213.247005] do_user_addr_fault+0x54a/0x12a0 [ 1213.247958] exc_page_fault+0xa2/0x1a0 [ 1213.248779] asm_exc_page_fault+0x1e/0x30 [ 1213.249668] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1213.250809] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1213.254672] RSP: 0018:ffff8880081979f0 EFLAGS: 00050246 [ 1213.255789] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1213.257290] RDX: 0000000000000000 RSI: ffff88801f301000 RDI: 000000002000b000 [ 1213.258853] RBP: 000000002000b000 R08: 0000000000000000 R09: ffff88801f301fff [ 1213.260678] R10: ffffed1003e603ff R11: 0000000000000001 R12: ffff88801f301000 [ 1213.262197] R13: 000000002000c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1213.263747] copyout.part.0+0xdf/0x110 [ 1213.264604] copy_page_to_iter+0x248/0xdd0 [ 1213.265560] filemap_read+0x4ff/0xbb0 [ 1213.266408] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.267414] ? lock_acquire+0x1b2/0x4d0 [ 1213.268289] generic_file_read_iter+0x3cf/0x540 [ 1213.269302] ext4_file_read_iter+0x184/0x490 [ 1213.270270] new_sync_read+0x427/0x6f0 [ 1213.271105] ? __ia32_sys_llseek+0x380/0x380 [ 1213.272078] ? security_file_permission+0xb1/0xd0 [ 1213.273153] vfs_read+0x356/0x5f0 [ 1213.273902] ksys_read+0x12d/0x250 [ 1213.274668] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.275647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.276760] do_syscall_64+0x3b/0x90 [ 1213.277576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.278660] RIP: 0033:0x7f63a2e8eb19 [ 1213.279444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.283296] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.284901] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1213.286387] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.287873] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.289368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1213.290853] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1213.292365] 03:09:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x0) 03:09:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x23, 0x0, 0x4) [ 1213.377711] Process accounting paused [ 1213.383530] loop2: detected capacity change from 0 to 256 03:09:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 24) 03:09:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x24, 0x0, 0x4) 03:09:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x24, 0x0, 0x4) [ 1213.490373] FAULT_INJECTION: forcing a failure. [ 1213.490373] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1213.492803] CPU: 0 PID: 8674 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.494568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.496735] Call Trace: [ 1213.497250] [ 1213.497674] dump_stack_lvl+0x8b/0xb3 [ 1213.498432] should_fail.cold+0x5/0xa [ 1213.499182] copy_page_to_iter+0x217/0xdd0 [ 1213.500033] filemap_read+0x4ff/0xbb0 [ 1213.500789] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.501705] ? lock_acquire+0x1b2/0x4d0 [ 1213.502482] generic_file_read_iter+0x3cf/0x540 [ 1213.503390] ext4_file_read_iter+0x184/0x490 [ 1213.504274] new_sync_read+0x427/0x6f0 [ 1213.505065] ? __ia32_sys_llseek+0x380/0x380 [ 1213.505970] ? security_file_permission+0xb1/0xd0 [ 1213.506950] vfs_read+0x356/0x5f0 [ 1213.507662] ksys_read+0x12d/0x250 [ 1213.508383] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.509332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.510358] do_syscall_64+0x3b/0x90 [ 1213.511114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.512133] RIP: 0033:0x7f0ad231ab19 [ 1213.512861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.516498] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.517999] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1213.519400] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.520802] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.522224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1213.523631] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1213.525066] 03:09:02 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 7) read(0xffffffffffffffff, 0x0, 0x0) [ 1213.580557] FAULT_INJECTION: forcing a failure. [ 1213.580557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1213.582976] CPU: 0 PID: 8678 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.584602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.586880] Call Trace: [ 1213.587387] [ 1213.587840] dump_stack_lvl+0x8b/0xb3 [ 1213.588622] should_fail.cold+0x5/0xa [ 1213.589415] prepare_alloc_pages+0x17b/0x500 [ 1213.590301] __alloc_pages+0x131/0x4e0 [ 1213.591079] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1213.592271] ? __lock_acquire+0xbac/0x5b70 [ 1213.593145] ? mark_lock+0xfc/0x2e10 [ 1213.593884] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1213.594990] alloc_pages_vma+0xde/0x500 [ 1213.595899] __handle_mm_fault+0xfb3/0x3570 [ 1213.596775] ? lock_is_held_type+0xd7/0x130 [ 1213.597636] ? __pmd_alloc+0x680/0x680 [ 1213.598458] handle_mm_fault+0x2e6/0xa20 [ 1213.599286] do_user_addr_fault+0x54a/0x12a0 [ 1213.600183] exc_page_fault+0xa2/0x1a0 [ 1213.600970] asm_exc_page_fault+0x1e/0x30 [ 1213.601790] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1213.602865] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1213.606475] RSP: 0018:ffff8880415279f0 EFLAGS: 00050246 [ 1213.607526] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1213.608949] RDX: 0000000000000000 RSI: ffff88801f2ea000 RDI: 0000000020003000 [ 1213.610347] RBP: 0000000020003000 R08: 0000000000000000 R09: ffff88801f2eafff [ 1213.611750] R10: ffffed1003e5d5ff R11: 0000000000000001 R12: ffff88801f2ea000 [ 1213.613156] R13: 0000000020004000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1213.614581] copyout.part.0+0xdf/0x110 [ 1213.615371] copy_page_to_iter+0x248/0xdd0 [ 1213.616245] filemap_read+0x4ff/0xbb0 [ 1213.617036] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.617968] ? lock_acquire+0x1b2/0x4d0 [ 1213.618763] generic_file_read_iter+0x3cf/0x540 [ 1213.619696] ext4_file_read_iter+0x184/0x490 [ 1213.620581] new_sync_read+0x427/0x6f0 [ 1213.621377] ? __ia32_sys_llseek+0x380/0x380 [ 1213.622277] ? security_file_permission+0xb1/0xd0 [ 1213.623248] vfs_read+0x356/0x5f0 [ 1213.623951] ksys_read+0x12d/0x250 [ 1213.624659] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.625583] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.626613] do_syscall_64+0x3b/0x90 [ 1213.627375] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.628393] RIP: 0033:0x7f37f54efb19 [ 1213.629139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.632785] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.634298] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1213.635721] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.637159] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.638561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1213.639960] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1213.641396] 03:09:02 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 5) 03:09:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x25, 0x0, 0x4) [ 1213.703281] FAULT_INJECTION: forcing a failure. [ 1213.703281] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1213.705825] CPU: 0 PID: 8684 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1213.707471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1213.709760] Call Trace: [ 1213.710270] [ 1213.710720] dump_stack_lvl+0x8b/0xb3 [ 1213.711507] should_fail.cold+0x5/0xa [ 1213.712292] prepare_alloc_pages+0x17b/0x500 [ 1213.713207] __alloc_pages+0x131/0x4e0 [ 1213.713989] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1213.715190] ? __lock_acquire+0xbac/0x5b70 [ 1213.716051] ? mark_lock+0xfc/0x2e10 [ 1213.716794] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1213.717908] alloc_pages_vma+0xde/0x500 [ 1213.718721] __handle_mm_fault+0xfb3/0x3570 [ 1213.719599] ? lock_is_held_type+0xd7/0x130 [ 1213.720461] ? __pmd_alloc+0x680/0x680 [ 1213.721297] handle_mm_fault+0x2e6/0xa20 [ 1213.722127] do_user_addr_fault+0x54a/0x12a0 [ 1213.723025] exc_page_fault+0xa2/0x1a0 [ 1213.723799] asm_exc_page_fault+0x1e/0x30 [ 1213.724631] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1213.725733] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1213.729384] RSP: 0018:ffff88804236f9f0 EFLAGS: 00050246 [ 1213.730439] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1213.731857] RDX: 0000000000000000 RSI: ffff88801f2ed000 RDI: 0000000020002000 [ 1213.733282] RBP: 0000000020002000 R08: 0000000000000000 R09: ffff88801f2edfff [ 1213.734693] R10: ffffed1003e5dbff R11: 0000000000000001 R12: ffff88801f2ed000 [ 1213.736104] R13: 0000000020003000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1213.737559] copyout.part.0+0xdf/0x110 [ 1213.738349] copy_page_to_iter+0x248/0xdd0 [ 1213.739227] filemap_read+0x4ff/0xbb0 [ 1213.740010] ? filemap_get_pages+0x1c90/0x1c90 [ 1213.740958] ? lock_acquire+0x1b2/0x4d0 [ 1213.741759] generic_file_read_iter+0x3cf/0x540 [ 1213.742693] ext4_file_read_iter+0x184/0x490 [ 1213.743585] new_sync_read+0x427/0x6f0 [ 1213.744365] ? __ia32_sys_llseek+0x380/0x380 [ 1213.745278] ? security_file_permission+0xb1/0xd0 [ 1213.746250] vfs_read+0x356/0x5f0 [ 1213.746955] ksys_read+0x12d/0x250 [ 1213.747664] ? __ia32_sys_pwrite64+0x230/0x230 [ 1213.748578] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1213.749629] do_syscall_64+0x3b/0x90 [ 1213.750387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1213.751409] RIP: 0033:0x7fa9c71a5b19 [ 1213.752138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.755770] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1213.757271] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1213.758669] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1213.760070] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1213.761485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1213.762903] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1213.764334] 03:09:15 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 6) 03:09:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x25, 0x0, 0x4) 03:09:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 8) read(0xffffffffffffffff, 0x0, 0x0) 03:09:15 executing program 7: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)="dcdc3d2b4be1e0397c7ee3a751bed35aa6c70e671a79253d7af3d9f08801711e7aa5e732d0f36a2f5bc9935f6ed50c46edd9", 0x32, 0x10001}, {&(0x7f0000000440)="db562ac1d10659dbb982beea318cf9d3865564eb236d144973ddaf36fcea7cfa456adf520450ca18751af171a2d046ba27ef329ab1c57f02c23120670f37cc3e7882af76159736bcb54be03825a889804b22f5fc2e3aec5538ef9a730ce11f107dd6070da2ed27a3b0ce015656f7a6509c9ca27beb829770e220b888b47da2f8ee0dccd866adbeb3dd2fb3a19d8c9a0565cf9a0470f14778bb58f943919ddd81c2447d94541385d8fbbfc12bd6808e49", 0xb0, 0x7}, {&(0x7f0000000500), 0x0, 0xff}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 25) 03:09:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 24) 03:09:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x26, 0x0, 0x4) 03:09:15 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1226.770180] FAULT_INJECTION: forcing a failure. [ 1226.770180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1226.771457] CPU: 1 PID: 8704 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1226.772290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.773477] Call Trace: [ 1226.773741] [ 1226.773975] dump_stack_lvl+0x8b/0xb3 [ 1226.774384] should_fail.cold+0x5/0xa [ 1226.774789] copy_page_to_iter+0x217/0xdd0 [ 1226.775247] filemap_read+0x4ff/0xbb0 [ 1226.775657] ? filemap_get_pages+0x1c90/0x1c90 [ 1226.776143] ? lock_acquire+0x1b2/0x4d0 [ 1226.776556] generic_file_read_iter+0x3cf/0x540 [ 1226.777053] ext4_file_read_iter+0x184/0x490 [ 1226.777536] new_sync_read+0x427/0x6f0 [ 1226.777950] ? __ia32_sys_llseek+0x380/0x380 [ 1226.778420] ? security_file_permission+0xb1/0xd0 [ 1226.778930] vfs_read+0x356/0x5f0 [ 1226.779299] ksys_read+0x12d/0x250 [ 1226.779392] FAULT_INJECTION: forcing a failure. [ 1226.779392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1226.779667] ? __ia32_sys_pwrite64+0x230/0x230 [ 1226.782657] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1226.783216] do_syscall_64+0x3b/0x90 [ 1226.783614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1226.784156] RIP: 0033:0x7f37f54efb19 [ 1226.784551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.786518] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1226.787329] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1226.788080] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.788829] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.789590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1226.790339] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1226.791103] [ 1226.791355] CPU: 0 PID: 8700 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1226.792920] FAULT_INJECTION: forcing a failure. [ 1226.792920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1226.793119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.796696] Call Trace: [ 1226.797289] [ 1226.797765] dump_stack_lvl+0x8b/0xb3 [ 1226.798595] should_fail.cold+0x5/0xa [ 1226.799423] prepare_alloc_pages+0x17b/0x500 [ 1226.800364] __alloc_pages+0x131/0x4e0 [ 1226.801212] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1226.802488] ? __lock_acquire+0xbac/0x5b70 [ 1226.803400] ? mark_lock+0xfc/0x2e10 [ 1226.804187] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1226.805364] alloc_pages_vma+0xde/0x500 [ 1226.806224] __handle_mm_fault+0xfb3/0x3570 [ 1226.807160] ? lock_is_held_type+0xd7/0x130 [ 1226.808070] ? __pmd_alloc+0x680/0x680 [ 1226.808945] handle_mm_fault+0x2e6/0xa20 [ 1226.809845] do_user_addr_fault+0x54a/0x12a0 [ 1226.810804] exc_page_fault+0xa2/0x1a0 [ 1226.811638] asm_exc_page_fault+0x1e/0x30 [ 1226.812518] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1226.813681] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1226.817529] RSP: 0018:ffff88801571f9f0 EFLAGS: 00050246 [ 1226.818646] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1226.820143] RDX: 0000000000000000 RSI: ffff88801f2f5000 RDI: 000000002000c000 [ 1226.821660] RBP: 000000002000c000 R08: 0000000000000000 R09: ffff88801f2f5fff [ 1226.823172] R10: ffffed1003e5ebff R11: 0000000000000001 R12: ffff88801f2f5000 [ 1226.824665] R13: 000000002000d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1226.826215] copyout.part.0+0xdf/0x110 [ 1226.827059] copy_page_to_iter+0x248/0xdd0 [ 1226.827992] filemap_read+0x4ff/0xbb0 [ 1226.828826] ? filemap_get_pages+0x1c90/0x1c90 [ 1226.829847] ? lock_acquire+0x1b2/0x4d0 [ 1226.830720] generic_file_read_iter+0x3cf/0x540 [ 1226.831714] ext4_file_read_iter+0x184/0x490 [ 1226.832673] new_sync_read+0x427/0x6f0 [ 1226.833512] ? __ia32_sys_llseek+0x380/0x380 [ 1226.834483] ? security_file_permission+0xb1/0xd0 [ 1226.835511] vfs_read+0x356/0x5f0 [ 1226.836276] ksys_read+0x12d/0x250 [ 1226.837033] ? __ia32_sys_pwrite64+0x230/0x230 [ 1226.838042] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1226.839135] do_syscall_64+0x3b/0x90 [ 1226.839959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1226.841040] RIP: 0033:0x7f0ad231ab19 [ 1226.841830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.845689] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1226.847279] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1226.848769] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.850266] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.851758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.853261] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1226.854779] [ 1226.855267] CPU: 1 PID: 8702 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1226.856168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.857404] Call Trace: [ 1226.857681] [ 1226.857926] dump_stack_lvl+0x8b/0xb3 [ 1226.858346] should_fail.cold+0x5/0xa [ 1226.858769] copy_page_to_iter+0x217/0xdd0 [ 1226.859245] filemap_read+0x4ff/0xbb0 [ 1226.859662] ? filemap_get_pages+0x1c90/0x1c90 [ 1226.860172] ? lock_acquire+0x1b2/0x4d0 [ 1226.860610] generic_file_read_iter+0x3cf/0x540 [ 1226.861124] ext4_file_read_iter+0x184/0x490 [ 1226.861604] new_sync_read+0x427/0x6f0 [ 1226.862030] ? __ia32_sys_llseek+0x380/0x380 [ 1226.862493] ? security_file_permission+0xb1/0xd0 [ 1226.863017] vfs_read+0x356/0x5f0 [ 1226.863397] ksys_read+0x12d/0x250 [ 1226.863764] ? __ia32_sys_pwrite64+0x230/0x230 [ 1226.864263] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1226.864822] do_syscall_64+0x3b/0x90 [ 1226.865248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1226.865795] RIP: 0033:0x7f63a2e8eb19 [ 1226.866197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.868174] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1226.868989] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1226.869758] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.870521] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.871294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.872059] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1226.872835] [ 1226.874091] loop7: detected capacity change from 0 to 256 [ 1226.876664] FAULT_INJECTION: forcing a failure. [ 1226.876664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1226.878001] CPU: 1 PID: 8708 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1226.878924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.880203] Call Trace: [ 1226.880488] [ 1226.880730] dump_stack_lvl+0x8b/0xb3 [ 1226.881199] should_fail.cold+0x5/0xa [ 1226.881660] copy_page_to_iter+0x217/0xdd0 [ 1226.882179] filemap_read+0x4ff/0xbb0 [ 1226.882631] ? filemap_get_pages+0x1c90/0x1c90 [ 1226.883169] ? lock_acquire+0x1b2/0x4d0 [ 1226.883625] generic_file_read_iter+0x3cf/0x540 [ 1226.884162] ext4_file_read_iter+0x184/0x490 [ 1226.884669] new_sync_read+0x427/0x6f0 [ 1226.885127] ? __ia32_sys_llseek+0x380/0x380 [ 1226.885638] ? security_file_permission+0xb1/0xd0 [ 1226.886186] vfs_read+0x356/0x5f0 [ 1226.886580] ksys_read+0x12d/0x250 [ 1226.886963] ? __ia32_sys_pwrite64+0x230/0x230 [ 1226.887492] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1226.888100] do_syscall_64+0x3b/0x90 [ 1226.888547] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1226.889175] RIP: 0033:0x7fa9c71a5b19 [ 1226.889592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.891669] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1226.892530] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1226.893341] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.894141] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.894941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1226.895743] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1226.896560] 03:09:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x26, 0x0, 0x4) 03:09:16 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 7) 03:09:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x27, 0x0, 0x4) 03:09:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 9) read(0xffffffffffffffff, 0x0, 0x0) 03:09:16 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1226.965970] FAULT_INJECTION: forcing a failure. [ 1226.965970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1226.967273] CPU: 1 PID: 8713 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1226.968141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.969373] Call Trace: [ 1226.969646] [ 1226.969883] dump_stack_lvl+0x8b/0xb3 [ 1226.970292] should_fail.cold+0x5/0xa [ 1226.970704] prepare_alloc_pages+0x17b/0x500 [ 1226.971179] __alloc_pages+0x131/0x4e0 [ 1226.971592] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1226.972235] ? __lock_acquire+0xbac/0x5b70 [ 1226.972676] ? mark_lock+0xfc/0x2e10 [ 1226.973068] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1226.973660] alloc_pages_vma+0xde/0x500 [ 1226.974081] __handle_mm_fault+0xfb3/0x3570 [ 1226.974543] ? lock_is_held_type+0xd7/0x130 [ 1226.975003] ? __pmd_alloc+0x680/0x680 [ 1226.975445] handle_mm_fault+0x2e6/0xa20 [ 1226.975885] do_user_addr_fault+0x54a/0x12a0 [ 1226.976365] exc_page_fault+0xa2/0x1a0 [ 1226.976776] asm_exc_page_fault+0x1e/0x30 [ 1226.977251] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1226.977842] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1226.979811] RSP: 0018:ffff88804233f9f0 EFLAGS: 00050246 [ 1226.980392] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1226.981182] RDX: 0000000000000000 RSI: ffff88801f2e9000 RDI: 0000000020004000 [ 1226.981949] RBP: 0000000020004000 R08: 0000000000000000 R09: ffff88801f2e9fff [ 1226.982715] R10: ffffed1003e5d3ff R11: 0000000000000001 R12: ffff88801f2e9000 [ 1226.983480] R13: 0000000020005000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1226.984260] copyout.part.0+0xdf/0x110 [ 1226.984689] copy_page_to_iter+0x248/0xdd0 [ 1226.985175] filemap_read+0x4ff/0xbb0 [ 1226.985600] ? filemap_get_pages+0x1c90/0x1c90 [ 1226.986117] ? lock_acquire+0x1b2/0x4d0 [ 1226.986574] generic_file_read_iter+0x3cf/0x540 [ 1226.987082] ext4_file_read_iter+0x184/0x490 [ 1226.987575] new_sync_read+0x427/0x6f0 [ 1226.988002] ? __ia32_sys_llseek+0x380/0x380 [ 1226.988491] ? security_file_permission+0xb1/0xd0 [ 1226.989030] vfs_read+0x356/0x5f0 [ 1226.989435] ksys_read+0x12d/0x250 [ 1226.989829] ? __ia32_sys_pwrite64+0x230/0x230 [ 1226.990347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1226.990909] do_syscall_64+0x3b/0x90 [ 1226.991337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1226.991891] RIP: 0033:0x7f37f54efb19 [ 1226.992302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.994291] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1226.995142] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1226.995911] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.996682] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.997469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1226.998236] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1226.999020] [ 1227.004273] FAULT_INJECTION: forcing a failure. [ 1227.004273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1227.005583] CPU: 1 PID: 8718 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1227.006438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1227.007630] Call Trace: [ 1227.007892] [ 1227.008128] dump_stack_lvl+0x8b/0xb3 [ 1227.008538] should_fail.cold+0x5/0xa [ 1227.008947] prepare_alloc_pages+0x17b/0x500 [ 1227.009431] __alloc_pages+0x131/0x4e0 [ 1227.009848] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1227.010484] ? __lock_acquire+0xbac/0x5b70 [ 1227.010944] ? mark_lock+0xfc/0x2e10 [ 1227.011331] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1227.011923] alloc_pages_vma+0xde/0x500 [ 1227.012359] __handle_mm_fault+0xfb3/0x3570 [ 1227.012824] ? lock_is_held_type+0xd7/0x130 [ 1227.013299] ? __pmd_alloc+0x680/0x680 [ 1227.013758] handle_mm_fault+0x2e6/0xa20 [ 1227.014216] do_user_addr_fault+0x54a/0x12a0 [ 1227.014716] exc_page_fault+0xa2/0x1a0 [ 1227.015146] asm_exc_page_fault+0x1e/0x30 [ 1227.015604] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1227.016198] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1227.018189] RSP: 0018:ffff8880419bf9f0 EFLAGS: 00050246 [ 1227.018767] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1227.019547] RDX: 0000000000000000 RSI: ffff88801f2ea000 RDI: 0000000020003000 [ 1227.020312] RBP: 0000000020003000 R08: 0000000000000000 R09: ffff88801f2eafff [ 1227.021088] R10: ffffed1003e5d5ff R11: 0000000000000001 R12: ffff88801f2ea000 [ 1227.021854] R13: 0000000020004000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1227.022661] copyout.part.0+0xdf/0x110 [ 1227.023097] copy_page_to_iter+0x248/0xdd0 [ 1227.023577] filemap_read+0x4ff/0xbb0 [ 1227.024013] ? filemap_get_pages+0x1c90/0x1c90 [ 1227.024528] ? lock_acquire+0x1b2/0x4d0 [ 1227.024978] generic_file_read_iter+0x3cf/0x540 [ 1227.025507] ext4_file_read_iter+0x184/0x490 [ 1227.026003] new_sync_read+0x427/0x6f0 [ 1227.026430] ? __ia32_sys_llseek+0x380/0x380 [ 1227.026933] ? security_file_permission+0xb1/0xd0 [ 1227.027469] vfs_read+0x356/0x5f0 [ 1227.027856] ksys_read+0x12d/0x250 [ 1227.028251] ? __ia32_sys_pwrite64+0x230/0x230 [ 1227.028758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1227.029337] do_syscall_64+0x3b/0x90 [ 1227.029755] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1227.030320] RIP: 0033:0x7fa9c71a5b19 [ 1227.030717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1227.032700] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1227.033532] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1227.034302] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1227.035073] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1227.035842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1227.036604] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1227.037410] 03:09:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 26) 03:09:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x26, 0x0, 0x4) [ 1227.089247] FAULT_INJECTION: forcing a failure. [ 1227.089247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1227.091319] CPU: 1 PID: 8724 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1227.092223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1227.093458] Call Trace: [ 1227.093725] [ 1227.093960] dump_stack_lvl+0x8b/0xb3 [ 1227.094371] should_fail.cold+0x5/0xa [ 1227.094774] copy_page_to_iter+0x217/0xdd0 [ 1227.095254] filemap_read+0x4ff/0xbb0 [ 1227.095670] ? filemap_get_pages+0x1c90/0x1c90 [ 1227.096165] ? lock_acquire+0x1b2/0x4d0 [ 1227.096591] generic_file_read_iter+0x3cf/0x540 [ 1227.097095] ext4_file_read_iter+0x184/0x490 [ 1227.097568] new_sync_read+0x427/0x6f0 [ 1227.097992] ? __ia32_sys_llseek+0x380/0x380 [ 1227.098475] ? security_file_permission+0xb1/0xd0 [ 1227.098996] vfs_read+0x356/0x5f0 [ 1227.099378] ksys_read+0x12d/0x250 [ 1227.099756] ? __ia32_sys_pwrite64+0x230/0x230 [ 1227.100255] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1227.100803] do_syscall_64+0x3b/0x90 [ 1227.101220] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1227.101778] RIP: 0033:0x7f0ad231ab19 [ 1227.102188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1227.104188] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1227.105042] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1227.105820] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1227.106605] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1227.107375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1227.108171] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1227.108953] 03:09:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x27, 0x0, 0x4) 03:09:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x28, 0x0, 0x4) 03:09:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x25, 0x0, 0x4) 03:09:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x28, 0x0, 0x4) 03:09:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 27) 03:09:29 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 8) 03:09:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 10) read(0xffffffffffffffff, 0x0, 0x0) 03:09:29 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1240.715020] FAULT_INJECTION: forcing a failure. [ 1240.715020] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1240.716403] CPU: 0 PID: 8743 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.717298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.718571] Call Trace: [ 1240.718846] [ 1240.719100] dump_stack_lvl+0x8b/0xb3 [ 1240.719527] should_fail.cold+0x5/0xa [ 1240.719971] prepare_alloc_pages+0x17b/0x500 [ 1240.720490] __alloc_pages+0x131/0x4e0 [ 1240.720931] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1240.721580] ? __lock_acquire+0xbac/0x5b70 [ 1240.722080] ? mark_lock+0xfc/0x2e10 [ 1240.722509] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1240.723128] alloc_pages_vma+0xde/0x500 [ 1240.723573] __handle_mm_fault+0xfb3/0x3570 03:09:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 25) [ 1240.724074] ? lock_is_held_type+0xd7/0x130 [ 1240.724677] ? __pmd_alloc+0x680/0x680 [ 1240.725140] handle_mm_fault+0x2e6/0xa20 [ 1240.725606] do_user_addr_fault+0x54a/0x12a0 [ 1240.726118] exc_page_fault+0xa2/0x1a0 [ 1240.726546] asm_exc_page_fault+0x1e/0x30 [ 1240.727000] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1240.727607] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1240.729549] RSP: 0018:ffff8880420cf9f0 EFLAGS: 00050246 [ 1240.730143] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1240.730931] RDX: 0000000000000000 RSI: ffff88801f302000 RDI: 000000002000d000 [ 1240.731716] RBP: 000000002000d000 R08: 0000000000000000 R09: ffff88801f302fff [ 1240.732498] R10: ffffed1003e605ff R11: 0000000000000001 R12: ffff88801f302000 [ 1240.733300] R13: 000000002000e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1240.734111] copyout.part.0+0xdf/0x110 [ 1240.734550] copy_page_to_iter+0x248/0xdd0 [ 1240.735044] filemap_read+0x4ff/0xbb0 [ 1240.735480] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.736014] ? lock_acquire+0x1b2/0x4d0 [ 1240.736467] generic_file_read_iter+0x3cf/0x540 [ 1240.736998] ext4_file_read_iter+0x184/0x490 [ 1240.737514] new_sync_read+0x427/0x6f0 [ 1240.737929] ? __ia32_sys_llseek+0x380/0x380 [ 1240.738436] ? security_file_permission+0xb1/0xd0 [ 1240.738988] vfs_read+0x356/0x5f0 [ 1240.739389] ksys_read+0x12d/0x250 [ 1240.739792] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.740309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.740885] do_syscall_64+0x3b/0x90 [ 1240.741323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.741900] RIP: 0033:0x7f0ad231ab19 [ 1240.742315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.744357] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.745153] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1240.745960] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.746749] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.747550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.748351] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1240.749151] [ 1240.752814] FAULT_INJECTION: forcing a failure. [ 1240.752814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1240.754230] CPU: 0 PID: 8750 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.755143] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.756414] Call Trace: [ 1240.756689] [ 1240.756940] dump_stack_lvl+0x8b/0xb3 [ 1240.757379] should_fail.cold+0x5/0xa [ 1240.757795] copy_page_to_iter+0x217/0xdd0 [ 1240.758256] filemap_read+0x4ff/0xbb0 [ 1240.758683] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.758763] FAULT_INJECTION: forcing a failure. [ 1240.758763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1240.759172] ? lock_acquire+0x1b2/0x4d0 [ 1240.759193] generic_file_read_iter+0x3cf/0x540 [ 1240.762835] ext4_file_read_iter+0x184/0x490 [ 1240.763320] new_sync_read+0x427/0x6f0 [ 1240.763764] ? __ia32_sys_llseek+0x380/0x380 [ 1240.764265] ? security_file_permission+0xb1/0xd0 [ 1240.764807] vfs_read+0x356/0x5f0 [ 1240.765194] ksys_read+0x12d/0x250 [ 1240.765603] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.766099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.766674] do_syscall_64+0x3b/0x90 [ 1240.767074] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.767663] RIP: 0033:0x7f37f54efb19 [ 1240.768060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.770130] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.770978] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1240.771775] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.772575] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.773384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.774184] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1240.774995] [ 1240.775256] CPU: 1 PID: 8751 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.776893] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.779141] Call Trace: [ 1240.779651] [ 1240.780101] dump_stack_lvl+0x8b/0xb3 [ 1240.780883] should_fail.cold+0x5/0xa [ 1240.781685] prepare_alloc_pages+0x17b/0x500 [ 1240.782574] __alloc_pages+0x131/0x4e0 [ 1240.783356] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1240.784555] ? __lock_acquire+0xbac/0x5b70 [ 1240.785448] ? mark_lock+0xfc/0x2e10 [ 1240.786193] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1240.787297] alloc_pages_vma+0xde/0x500 [ 1240.788108] __handle_mm_fault+0xfb3/0x3570 [ 1240.788995] ? lock_is_held_type+0xd7/0x130 [ 1240.789887] ? __pmd_alloc+0x680/0x680 [ 1240.790720] handle_mm_fault+0x2e6/0xa20 [ 1240.791557] do_user_addr_fault+0x54a/0x12a0 [ 1240.792466] exc_page_fault+0xa2/0x1a0 [ 1240.793254] asm_exc_page_fault+0x1e/0x30 [ 1240.794116] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1240.795218] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1240.799294] RSP: 0018:ffff8880442af9f0 EFLAGS: 00050246 [ 1240.800377] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1240.801861] RDX: 0000000000000000 RSI: ffff88801f2f5000 RDI: 000000002000c000 [ 1240.803305] RBP: 000000002000c000 R08: 0000000000000000 R09: ffff88801f2f5fff [ 1240.804747] R10: ffffed1003e5ebff R11: 0000000000000001 R12: ffff88801f2f5000 [ 1240.806221] R13: 000000002000d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1240.807706] copyout.part.0+0xdf/0x110 [ 1240.808529] copy_page_to_iter+0x248/0xdd0 [ 1240.809467] filemap_read+0x4ff/0xbb0 [ 1240.810279] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.811253] ? lock_acquire+0x1b2/0x4d0 [ 1240.812081] generic_file_read_iter+0x3cf/0x540 [ 1240.813051] ext4_file_read_iter+0x184/0x490 [ 1240.814043] new_sync_read+0x427/0x6f0 [ 1240.814870] ? __ia32_sys_llseek+0x380/0x380 [ 1240.815819] ? security_file_permission+0xb1/0xd0 [ 1240.816840] vfs_read+0x356/0x5f0 [ 1240.817604] ksys_read+0x12d/0x250 [ 1240.818352] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.819310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.820394] do_syscall_64+0x3b/0x90 [ 1240.821190] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.822293] RIP: 0033:0x7f63a2e8eb19 [ 1240.823072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.826975] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.828561] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1240.830075] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.831577] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.833071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.834381] FAULT_INJECTION: forcing a failure. [ 1240.834381] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1240.834607] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1240.834657] [ 1240.837894] CPU: 0 PID: 8756 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.838823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.840098] Call Trace: [ 1240.840387] [ 1240.840634] dump_stack_lvl+0x8b/0xb3 [ 1240.841074] should_fail.cold+0x5/0xa [ 1240.841525] copy_page_to_iter+0x217/0xdd0 [ 1240.842022] filemap_read+0x4ff/0xbb0 [ 1240.842468] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.842994] ? lock_acquire+0x1b2/0x4d0 [ 1240.843425] generic_file_read_iter+0x3cf/0x540 [ 1240.843955] ext4_file_read_iter+0x184/0x490 [ 1240.844460] new_sync_read+0x427/0x6f0 [ 1240.844909] ? __ia32_sys_llseek+0x380/0x380 [ 1240.845427] ? security_file_permission+0xb1/0xd0 [ 1240.845953] vfs_read+0x356/0x5f0 [ 1240.846323] ksys_read+0x12d/0x250 [ 1240.846702] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.847185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.847731] do_syscall_64+0x3b/0x90 [ 1240.848141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.848693] RIP: 0033:0x7f0ad231ab19 [ 1240.849088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.851037] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.851829] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1240.852612] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.853377] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.854140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.854942] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1240.855775] [ 1240.856502] FAULT_INJECTION: forcing a failure. [ 1240.856502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1240.857877] CPU: 0 PID: 8748 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.858809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.860083] Call Trace: [ 1240.860376] [ 1240.860628] dump_stack_lvl+0x8b/0xb3 [ 1240.861058] should_fail.cold+0x5/0xa [ 1240.861505] copy_page_to_iter+0x217/0xdd0 [ 1240.861994] filemap_read+0x4ff/0xbb0 [ 1240.862433] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.862957] ? lock_acquire+0x1b2/0x4d0 [ 1240.863413] generic_file_read_iter+0x3cf/0x540 [ 1240.863943] ext4_file_read_iter+0x184/0x490 [ 1240.864448] new_sync_read+0x427/0x6f0 [ 1240.864859] ? __ia32_sys_llseek+0x380/0x380 [ 1240.865406] ? security_file_permission+0xb1/0xd0 [ 1240.865947] vfs_read+0x356/0x5f0 [ 1240.866344] ksys_read+0x12d/0x250 [ 1240.866750] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.867272] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.867851] do_syscall_64+0x3b/0x90 [ 1240.867908] FAULT_INJECTION: forcing a failure. [ 1240.867908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1240.868276] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.871423] RIP: 0033:0x7fa9c71a5b19 [ 1240.871812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.873891] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.874754] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1240.875562] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.876354] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.877160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1240.877990] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1240.878798] [ 1240.879059] CPU: 1 PID: 8757 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.880892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.883417] Call Trace: [ 1240.883988] [ 1240.884485] dump_stack_lvl+0x8b/0xb3 [ 1240.885401] should_fail.cold+0x5/0xa [ 1240.886281] prepare_alloc_pages+0x17b/0x500 [ 1240.887285] __alloc_pages+0x131/0x4e0 [ 1240.888172] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1240.889565] ? __lock_acquire+0xbac/0x5b70 03:09:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 11) read(0xffffffffffffffff, 0x0, 0x0) 03:09:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 28) [ 1240.890543] ? mark_lock+0xfc/0x2e10 [ 1240.891589] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1240.892857] alloc_pages_vma+0xde/0x500 [ 1240.893823] __handle_mm_fault+0xfb3/0x3570 [ 1240.894833] ? lock_is_held_type+0xd7/0x130 03:09:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 29) [ 1240.895824] ? __pmd_alloc+0x680/0x680 [ 1240.896884] handle_mm_fault+0x2e6/0xa20 [ 1240.897899] do_user_addr_fault+0x54a/0x12a0 [ 1240.898942] exc_page_fault+0xa2/0x1a0 [ 1240.899842] asm_exc_page_fault+0x1e/0x30 [ 1240.900785] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1240.902069] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1240.906280] RSP: 0018:ffff8880371579f0 EFLAGS: 00050246 [ 1240.907316] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1240.908711] RDX: 0000000000000000 RSI: ffff88801f2eb000 RDI: 0000000020005000 [ 1240.910139] RBP: 0000000020005000 R08: 0000000000000000 R09: ffff88801f2ebfff [ 1240.911538] R10: ffffed1003e5d7ff R11: 0000000000000001 R12: ffff88801f2eb000 [ 1240.912670] FAULT_INJECTION: forcing a failure. [ 1240.912670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1240.912931] R13: 0000000020006000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1240.912976] copyout.part.0+0xdf/0x110 [ 1240.916381] copy_page_to_iter+0x248/0xdd0 [ 1240.917249] filemap_read+0x4ff/0xbb0 [ 1240.918061] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.918990] ? lock_acquire+0x1b2/0x4d0 [ 1240.919780] generic_file_read_iter+0x3cf/0x540 [ 1240.920707] ext4_file_read_iter+0x184/0x490 [ 1240.921620] new_sync_read+0x427/0x6f0 [ 1240.922396] ? __ia32_sys_llseek+0x380/0x380 [ 1240.923295] ? security_file_permission+0xb1/0xd0 [ 1240.924257] vfs_read+0x356/0x5f0 [ 1240.924968] ksys_read+0x12d/0x250 [ 1240.925707] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.926617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.927636] do_syscall_64+0x3b/0x90 [ 1240.928384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.929420] RIP: 0033:0x7f37f54efb19 [ 1240.930145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.933744] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.935227] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1240.936620] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.938053] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.939446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.940840] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1240.942282] [ 1240.942736] CPU: 0 PID: 8759 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1240.943662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1240.944927] Call Trace: [ 1240.945211] [ 1240.945470] dump_stack_lvl+0x8b/0xb3 [ 1240.945905] should_fail.cold+0x5/0xa [ 1240.946341] prepare_alloc_pages+0x17b/0x500 [ 1240.946833] __alloc_pages+0x131/0x4e0 [ 1240.947267] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1240.947928] ? __lock_acquire+0xbac/0x5b70 [ 1240.948411] ? mark_lock+0xfc/0x2e10 [ 1240.948822] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1240.949458] alloc_pages_vma+0xde/0x500 [ 1240.949910] __handle_mm_fault+0xfb3/0x3570 [ 1240.950385] ? lock_is_held_type+0xd7/0x130 [ 1240.950887] ? __pmd_alloc+0x680/0x680 [ 1240.951353] handle_mm_fault+0x2e6/0xa20 [ 1240.951805] do_user_addr_fault+0x54a/0x12a0 [ 1240.952308] exc_page_fault+0xa2/0x1a0 [ 1240.952737] asm_exc_page_fault+0x1e/0x30 [ 1240.953195] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1240.953812] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1240.955826] RSP: 0018:ffff888044bc79f0 EFLAGS: 00050246 [ 1240.956407] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1240.957178] RDX: 0000000000000000 RSI: ffff88801f2e5000 RDI: 000000002000e000 [ 1240.957973] RBP: 000000002000e000 R08: 0000000000000000 R09: ffff88801f2e5fff [ 1240.958765] R10: ffffed1003e5cbff R11: 0000000000000001 R12: ffff88801f2e5000 [ 1240.959546] R13: 000000002000f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1240.960340] copyout.part.0+0xdf/0x110 [ 1240.960785] copy_page_to_iter+0x248/0xdd0 [ 1240.961247] filemap_read+0x4ff/0xbb0 [ 1240.961702] ? filemap_get_pages+0x1c90/0x1c90 [ 1240.962222] ? lock_acquire+0x1b2/0x4d0 [ 1240.962658] generic_file_read_iter+0x3cf/0x540 [ 1240.963187] ext4_file_read_iter+0x184/0x490 [ 1240.963666] new_sync_read+0x427/0x6f0 [ 1240.964107] ? __ia32_sys_llseek+0x380/0x380 [ 1240.964609] ? security_file_permission+0xb1/0xd0 [ 1240.965157] vfs_read+0x356/0x5f0 [ 1240.965538] ksys_read+0x12d/0x250 [ 1240.965932] ? __ia32_sys_pwrite64+0x230/0x230 [ 1240.966444] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1240.967030] do_syscall_64+0x3b/0x90 [ 1240.967457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1240.968048] RIP: 0033:0x7f0ad231ab19 [ 1240.968458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1240.970518] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1240.971356] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1240.972143] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1240.972932] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1240.973725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1240.974500] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1240.975281] 03:09:30 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) (fail_nth: 1) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:09:30 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 9) 03:09:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x29, 0x0, 0x4) [ 1241.014192] FAULT_INJECTION: forcing a failure. [ 1241.014192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1241.015510] CPU: 0 PID: 8761 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1241.016390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1241.017602] Call Trace: [ 1241.017869] [ 1241.018109] dump_stack_lvl+0x8b/0xb3 [ 1241.018543] should_fail.cold+0x5/0xa [ 1241.018957] prepare_alloc_pages+0x17b/0x500 [ 1241.019436] __alloc_pages+0x131/0x4e0 [ 1241.019861] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1241.020503] ? __lock_acquire+0xbac/0x5b70 [ 1241.020979] ? mark_lock+0xfc/0x2e10 [ 1241.021380] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1241.021988] alloc_pages_vma+0xde/0x500 [ 1241.022419] __handle_mm_fault+0xfb3/0x3570 [ 1241.022891] ? lock_is_held_type+0xd7/0x130 [ 1241.023354] ? __pmd_alloc+0x680/0x680 [ 1241.023821] handle_mm_fault+0x2e6/0xa20 [ 1241.024297] do_user_addr_fault+0x54a/0x12a0 [ 1241.024824] exc_page_fault+0xa2/0x1a0 [ 1241.025273] asm_exc_page_fault+0x1e/0x30 [ 1241.025765] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1241.026373] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1241.028463] RSP: 0018:ffff888041ed79f0 EFLAGS: 00050246 [ 1241.029065] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1241.029874] RDX: 0000000000000000 RSI: ffff88801f2e9000 RDI: 0000000020004000 [ 1241.030676] RBP: 0000000020004000 R08: 0000000000000000 R09: ffff88801f2e9fff [ 1241.031483] R10: ffffed1003e5d3ff R11: 0000000000000001 R12: ffff88801f2e9000 [ 1241.032294] R13: 0000000020005000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1241.033119] copyout.part.0+0xdf/0x110 [ 1241.033571] copy_page_to_iter+0x248/0xdd0 [ 1241.034077] filemap_read+0x4ff/0xbb0 [ 1241.034521] ? filemap_get_pages+0x1c90/0x1c90 [ 1241.035059] ? lock_acquire+0x1b2/0x4d0 [ 1241.035510] generic_file_read_iter+0x3cf/0x540 [ 1241.036036] ext4_file_read_iter+0x184/0x490 [ 1241.036541] new_sync_read+0x427/0x6f0 [ 1241.036993] ? __ia32_sys_llseek+0x380/0x380 [ 1241.037531] ? security_file_permission+0xb1/0xd0 [ 1241.038076] vfs_read+0x356/0x5f0 [ 1241.038481] ksys_read+0x12d/0x250 [ 1241.038884] ? __ia32_sys_pwrite64+0x230/0x230 [ 1241.039416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1241.039997] do_syscall_64+0x3b/0x90 [ 1241.040442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1241.041025] RIP: 0033:0x7fa9c71a5b19 [ 1241.041463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1241.043552] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1241.044413] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1241.045237] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1241.046043] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1241.046840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1241.047638] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1241.048444] 03:09:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x29, 0x0, 0x4) [ 1241.073342] FAULT_INJECTION: forcing a failure. [ 1241.073342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1241.075760] CPU: 1 PID: 8763 Comm: syz-executor.7 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1241.077418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1241.079633] Call Trace: [ 1241.080139] [ 1241.080582] dump_stack_lvl+0x8b/0xb3 [ 1241.081387] should_fail.cold+0x5/0xa [ 1241.082164] _copy_to_user+0x2e/0x150 [ 1241.082929] simple_read_from_buffer+0xcc/0x160 [ 1241.083870] proc_fail_nth_read+0x194/0x220 [ 1241.084740] ? proc_fault_inject_read+0x230/0x230 [ 1241.085740] ? security_file_permission+0xb1/0xd0 [ 1241.086705] ? proc_fault_inject_read+0x230/0x230 [ 1241.087668] vfs_read+0x1b6/0x5f0 [ 1241.088368] ksys_read+0x12d/0x250 [ 1241.089077] ? __ia32_sys_pwrite64+0x230/0x230 [ 1241.090026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1241.091053] do_syscall_64+0x3b/0x90 [ 1241.091796] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1241.092818] RIP: 0033:0x7f6e042cc69c [ 1241.093565] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1241.097471] RSP: 002b:00007f6e0188f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1241.099018] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6e042cc69c [ 1241.100420] RDX: 000000000000000f RSI: 00007f6e0188f1e0 RDI: 0000000000000004 [ 1241.101836] RBP: 00007f6e0188f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1241.103225] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1241.104622] R13: 00007fff30fa8e1f R14: 00007f6e0188f300 R15: 0000000000022000 [ 1241.106065] 03:09:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 30) 03:09:30 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2a, 0x0, 0x4) [ 1241.150136] loop2: detected capacity change from 0 to 256 [ 1241.151229] FAULT_INJECTION: forcing a failure. [ 1241.151229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1241.153717] CPU: 1 PID: 8773 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1241.155330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1241.157570] Call Trace: [ 1241.158080] [ 1241.158517] dump_stack_lvl+0x8b/0xb3 [ 1241.159291] should_fail.cold+0x5/0xa [ 1241.160047] copy_page_to_iter+0x217/0xdd0 [ 1241.160914] filemap_read+0x4ff/0xbb0 [ 1241.161708] ? filemap_get_pages+0x1c90/0x1c90 [ 1241.162637] ? lock_acquire+0x1b2/0x4d0 [ 1241.163435] generic_file_read_iter+0x3cf/0x540 [ 1241.164351] ext4_file_read_iter+0x184/0x490 [ 1241.165220] new_sync_read+0x427/0x6f0 [ 1241.166011] ? __ia32_sys_llseek+0x380/0x380 [ 1241.166939] ? security_file_permission+0xb1/0xd0 [ 1241.167898] vfs_read+0x356/0x5f0 [ 1241.168592] ksys_read+0x12d/0x250 [ 1241.169316] ? __ia32_sys_pwrite64+0x230/0x230 [ 1241.170233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1241.171249] do_syscall_64+0x3b/0x90 [ 1241.171990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1241.172991] RIP: 0033:0x7f0ad231ab19 [ 1241.173739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1241.177344] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1241.178846] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1241.180234] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1241.181664] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1241.183050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1241.184434] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1241.185866] [ 1241.214417] FAULT_INJECTION: forcing a failure. [ 1241.214417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1241.215712] CPU: 0 PID: 8778 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1241.216569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1241.217768] Call Trace: [ 1241.218047] [ 1241.218285] dump_stack_lvl+0x8b/0xb3 [ 1241.218708] should_fail.cold+0x5/0xa [ 1241.219130] copy_page_to_iter+0x217/0xdd0 [ 1241.219594] filemap_read+0x4ff/0xbb0 [ 1241.220014] ? filemap_get_pages+0x1c90/0x1c90 [ 1241.220505] ? lock_acquire+0x1b2/0x4d0 [ 1241.220940] generic_file_read_iter+0x3cf/0x540 [ 1241.221448] ext4_file_read_iter+0x184/0x490 [ 1241.221933] new_sync_read+0x427/0x6f0 [ 1241.222354] ? __ia32_sys_llseek+0x380/0x380 [ 1241.222835] ? security_file_permission+0xb1/0xd0 [ 1241.223355] vfs_read+0x356/0x5f0 [ 1241.223734] ksys_read+0x12d/0x250 [ 1241.224114] ? __ia32_sys_pwrite64+0x230/0x230 [ 1241.224612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1241.225193] do_syscall_64+0x3b/0x90 [ 1241.225631] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1241.226215] RIP: 0033:0x7fa9c71a5b19 [ 1241.226640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1241.228726] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1241.229587] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1241.230397] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1241.231205] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1241.232020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1241.232819] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1241.233654] 03:09:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2b, 0x0, 0x4) 03:09:30 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 10) 03:09:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2a, 0x0, 0x4) 03:09:30 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2c, 0x0, 0x4) [ 1241.284769] loop2: detected capacity change from 0 to 256 03:09:43 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:09:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 26) 03:09:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2b, 0x0, 0x4) 03:09:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 12) read(0xffffffffffffffff, 0x0, 0x0) 03:09:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 31) 03:09:43 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:43 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 11) 03:09:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2d, 0x0, 0x4) [ 1254.432634] FAULT_INJECTION: forcing a failure. [ 1254.432634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1254.435142] CPU: 0 PID: 8799 Comm: syz-executor.4 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1254.436834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1254.439205] Call Trace: [ 1254.439743] [ 1254.440212] dump_stack_lvl+0x8b/0xb3 [ 1254.441017] should_fail.cold+0x5/0xa [ 1254.441861] copy_page_to_iter+0x217/0xdd0 [ 1254.442773] filemap_read+0x4ff/0xbb0 [ 1254.443597] ? filemap_get_pages+0x1c90/0x1c90 [ 1254.444596] ? lock_acquire+0x1b2/0x4d0 [ 1254.445438] generic_file_read_iter+0x3cf/0x540 [ 1254.445994] FAULT_INJECTION: forcing a failure. [ 1254.445994] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1254.446432] ext4_file_read_iter+0x184/0x490 [ 1254.449658] new_sync_read+0x427/0x6f0 [ 1254.450480] ? __ia32_sys_llseek+0x380/0x380 [ 1254.451427] ? security_file_permission+0xb1/0xd0 [ 1254.452454] vfs_read+0x356/0x5f0 [ 1254.453195] ksys_read+0x12d/0x250 [ 1254.453958] ? __ia32_sys_pwrite64+0x230/0x230 [ 1254.454926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.456010] do_syscall_64+0x3b/0x90 [ 1254.456801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.457865] RIP: 0033:0x7f37f54efb19 [ 1254.458638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.462488] RSP: 002b:00007f37f2a65188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1254.464062] RAX: ffffffffffffffda RBX: 00007f37f5602f60 RCX: 00007f37f54efb19 [ 1254.465556] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1254.467039] RBP: 00007f37f2a651d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.468524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.470030] R13: 00007fff7655342f R14: 00007f37f2a65300 R15: 0000000000022000 [ 1254.471539] [ 1254.472022] CPU: 1 PID: 8801 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1254.473679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1254.475934] Call Trace: [ 1254.476444] [ 1254.476888] dump_stack_lvl+0x8b/0xb3 [ 1254.477668] should_fail.cold+0x5/0xa [ 1254.478448] prepare_alloc_pages+0x17b/0x500 [ 1254.479337] __alloc_pages+0x131/0x4e0 [ 1254.480117] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1254.481319] ? __lock_acquire+0xbac/0x5b70 [ 1254.482196] ? mark_lock+0xfc/0x2e10 [ 1254.482939] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1254.484046] alloc_pages_vma+0xde/0x500 [ 1254.484862] __handle_mm_fault+0xfb3/0x3570 [ 1254.485763] ? lock_is_held_type+0xd7/0x130 [ 1254.486602] ? __pmd_alloc+0x680/0x680 [ 1254.487407] handle_mm_fault+0x2e6/0xa20 [ 1254.488211] do_user_addr_fault+0x54a/0x12a0 [ 1254.489084] exc_page_fault+0xa2/0x1a0 [ 1254.489865] asm_exc_page_fault+0x1e/0x30 [ 1254.490666] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1254.491737] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1254.495306] RSP: 0018:ffff888044b479f0 EFLAGS: 00050246 [ 1254.496253] FAULT_INJECTION: forcing a failure. [ 1254.496253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1254.496327] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1254.500192] RDX: 0000000000000000 RSI: ffff88801f30a000 RDI: 000000002000f000 [ 1254.501576] RBP: 000000002000f000 R08: 0000000000000000 R09: ffff88801f30afff [ 1254.502946] R10: ffffed1003e615ff R11: 0000000000000001 R12: ffff88801f30a000 [ 1254.504345] R13: 0000000020010000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1254.505765] copyout.part.0+0xdf/0x110 [ 1254.506537] copy_page_to_iter+0x248/0xdd0 [ 1254.507386] filemap_read+0x4ff/0xbb0 [ 1254.508147] ? filemap_get_pages+0x1c90/0x1c90 [ 1254.509051] ? lock_acquire+0x1b2/0x4d0 [ 1254.509862] generic_file_read_iter+0x3cf/0x540 [ 1254.510770] ext4_file_read_iter+0x184/0x490 [ 1254.511659] new_sync_read+0x427/0x6f0 [ 1254.512415] ? __ia32_sys_llseek+0x380/0x380 [ 1254.513291] ? security_file_permission+0xb1/0xd0 [ 1254.514246] vfs_read+0x356/0x5f0 [ 1254.514927] ksys_read+0x12d/0x250 [ 1254.515620] ? __ia32_sys_pwrite64+0x230/0x230 [ 1254.516501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.517528] do_syscall_64+0x3b/0x90 [ 1254.518264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.519252] RIP: 0033:0x7f0ad231ab19 [ 1254.519953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.523508] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1254.524967] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1254.526337] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1254.527692] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.529052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.530424] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1254.531798] [ 1254.532245] CPU: 0 PID: 8808 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1254.533572] FAULT_INJECTION: forcing a failure. [ 1254.533572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1254.534028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1254.534048] Call Trace: [ 1254.534059] [ 1254.534070] dump_stack_lvl+0x8b/0xb3 [ 1254.534120] should_fail.cold+0x5/0xa [ 1254.534163] prepare_alloc_pages+0x17b/0x500 [ 1254.534203] __alloc_pages+0x131/0x4e0 [ 1254.534235] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1254.534272] ? __lock_acquire+0xbac/0x5b70 [ 1254.534317] ? mark_lock+0xfc/0x2e10 [ 1254.534342] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1254.534383] alloc_pages_vma+0xde/0x500 [ 1254.534426] __handle_mm_fault+0xfb3/0x3570 [ 1254.534471] ? lock_is_held_type+0xd7/0x130 [ 1254.534498] ? __pmd_alloc+0x680/0x680 [ 1254.534573] handle_mm_fault+0x2e6/0xa20 [ 1254.534619] do_user_addr_fault+0x54a/0x12a0 [ 1254.534668] exc_page_fault+0xa2/0x1a0 [ 1254.534697] asm_exc_page_fault+0x1e/0x30 [ 1254.534722] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1254.534761] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1254.534785] RSP: 0018:ffff888044a7f9f0 EFLAGS: 00050246 [ 1254.534807] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1254.534824] RDX: 0000000000000000 RSI: ffff88801f2eb000 RDI: 0000000020005000 [ 1254.534840] RBP: 0000000020005000 R08: 0000000000000000 R09: ffff88801f2ebfff [ 1254.534856] R10: ffffed1003e5d7ff R11: 0000000000000001 R12: ffff88801f2eb000 [ 1254.534872] R13: 0000000020006000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1254.534917] copyout.part.0+0xdf/0x110 [ 1254.534960] copy_page_to_iter+0x248/0xdd0 [ 1254.535022] filemap_read+0x4ff/0xbb0 [ 1254.535075] ? filemap_get_pages+0x1c90/0x1c90 [ 1254.535131] ? lock_acquire+0x1b2/0x4d0 [ 1254.535167] generic_file_read_iter+0x3cf/0x540 [ 1254.535208] ext4_file_read_iter+0x184/0x490 [ 1254.535248] new_sync_read+0x427/0x6f0 [ 1254.535280] ? __ia32_sys_llseek+0x380/0x380 [ 1254.535336] ? security_file_permission+0xb1/0xd0 [ 1254.535379] vfs_read+0x356/0x5f0 [ 1254.535419] ksys_read+0x12d/0x250 [ 1254.535449] ? __ia32_sys_pwrite64+0x230/0x230 [ 1254.535486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.535524] do_syscall_64+0x3b/0x90 [ 1254.535560] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.535585] RIP: 0033:0x7fa9c71a5b19 [ 1254.535603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.585556] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1254.587117] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1254.588563] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1254.590030] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.591475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.592925] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1254.594422] [ 1254.594900] CPU: 1 PID: 8795 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1254.596544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1254.598824] Call Trace: [ 1254.599332] [ 1254.599778] dump_stack_lvl+0x8b/0xb3 [ 1254.600544] should_fail.cold+0x5/0xa [ 1254.601317] copy_page_to_iter+0x217/0xdd0 [ 1254.602216] filemap_read+0x4ff/0xbb0 [ 1254.603006] ? filemap_get_pages+0x1c90/0x1c90 [ 1254.603945] ? lock_acquire+0x1b2/0x4d0 [ 1254.604749] generic_file_read_iter+0x3cf/0x540 [ 1254.605698] ext4_file_read_iter+0x184/0x490 [ 1254.606599] new_sync_read+0x427/0x6f0 [ 1254.607379] ? __ia32_sys_llseek+0x380/0x380 [ 1254.608283] ? security_file_permission+0xb1/0xd0 [ 1254.609260] vfs_read+0x356/0x5f0 [ 1254.609983] ksys_read+0x12d/0x250 [ 1254.610700] ? __ia32_sys_pwrite64+0x230/0x230 [ 1254.611618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.612657] do_syscall_64+0x3b/0x90 [ 1254.613418] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.614446] RIP: 0033:0x7f63a2e8eb19 [ 1254.615180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.619268] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1254.620769] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1254.622195] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1254.623610] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.625024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.626444] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1254.627886] 03:09:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 13) read(0xffffffffffffffff, 0x0, 0x0) [ 1254.659424] loop2: detected capacity change from 0 to 256 03:09:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2c, 0x0, 0x4) 03:09:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2e, 0x0, 0x4) 03:09:43 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:09:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 27) 03:09:43 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1254.770802] Process accounting resumed [ 1254.819588] FAULT_INJECTION: forcing a failure. [ 1254.819588] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1254.822038] CPU: 1 PID: 8820 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1254.823719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1254.825976] Call Trace: [ 1254.826499] [ 1254.826941] dump_stack_lvl+0x8b/0xb3 [ 1254.827738] should_fail.cold+0x5/0xa [ 1254.828524] prepare_alloc_pages+0x17b/0x500 [ 1254.829430] __alloc_pages+0x131/0x4e0 [ 1254.830236] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1254.831429] ? __lock_acquire+0xbac/0x5b70 [ 1254.832309] ? mark_lock+0xfc/0x2e10 [ 1254.833047] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1254.834174] alloc_pages_vma+0xde/0x500 [ 1254.834982] __handle_mm_fault+0xfb3/0x3570 [ 1254.835867] ? lock_is_held_type+0xd7/0x130 [ 1254.836721] ? __pmd_alloc+0x680/0x680 [ 1254.837568] handle_mm_fault+0x2e6/0xa20 [ 1254.838392] do_user_addr_fault+0x54a/0x12a0 [ 1254.839303] exc_page_fault+0xa2/0x1a0 [ 1254.840077] asm_exc_page_fault+0x1e/0x30 [ 1254.840909] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1254.842005] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1254.845689] RSP: 0018:ffff8880442d79f0 EFLAGS: 00050246 [ 1254.846747] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1254.848171] RDX: 0000000000000000 RSI: ffff88801f302000 RDI: 000000002000d000 [ 1254.849599] RBP: 000000002000d000 R08: 0000000000000000 R09: ffff88801f302fff [ 1254.851030] R10: ffffed1003e605ff R11: 0000000000000001 R12: ffff88801f302000 [ 1254.852448] R13: 000000002000e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1254.853898] copyout.part.0+0xdf/0x110 [ 1254.854697] copy_page_to_iter+0x248/0xdd0 [ 1254.855581] filemap_read+0x4ff/0xbb0 [ 1254.856371] ? filemap_get_pages+0x1c90/0x1c90 [ 1254.857317] ? lock_acquire+0x1b2/0x4d0 [ 1254.858140] generic_file_read_iter+0x3cf/0x540 [ 1254.859091] ext4_file_read_iter+0x184/0x490 [ 1254.859989] new_sync_read+0x427/0x6f0 [ 1254.860793] ? __ia32_sys_llseek+0x380/0x380 [ 1254.861714] ? security_file_permission+0xb1/0xd0 [ 1254.862697] vfs_read+0x356/0x5f0 [ 1254.863402] ksys_read+0x12d/0x250 [ 1254.864120] ? __ia32_sys_pwrite64+0x230/0x230 [ 1254.865067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.866117] do_syscall_64+0x3b/0x90 [ 1254.866881] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1254.867910] RIP: 0033:0x7f63a2e8eb19 [ 1254.868666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.872349] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1254.873919] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1254.875355] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1254.876773] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1254.878200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1254.879615] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1254.881058] [ 1254.896497] loop2: detected capacity change from 0 to 256 03:09:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 32) 03:09:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:09:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2d, 0x0, 0x4) 03:09:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 28) 03:09:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2f, 0x0, 0x4) 03:09:58 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:09:58 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 12) 03:09:58 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1269.670809] FAULT_INJECTION: forcing a failure. [ 1269.670809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.673453] CPU: 0 PID: 8835 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1269.675201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.677538] Call Trace: [ 1269.678086] [ 1269.678552] dump_stack_lvl+0x8b/0xb3 [ 1269.679369] should_fail.cold+0x5/0xa [ 1269.680188] copy_page_to_iter+0x217/0xdd0 [ 1269.681112] filemap_read+0x4ff/0xbb0 [ 1269.681947] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.682936] ? lock_acquire+0x1b2/0x4d0 [ 1269.683779] generic_file_read_iter+0x3cf/0x540 [ 1269.684766] ext4_file_read_iter+0x184/0x490 [ 1269.685702] new_sync_read+0x427/0x6f0 [ 1269.686551] ? __ia32_sys_llseek+0x380/0x380 [ 1269.687499] ? security_file_permission+0xb1/0xd0 [ 1269.688526] vfs_read+0x356/0x5f0 [ 1269.689279] ksys_read+0x12d/0x250 [ 1269.690039] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.691008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.692089] do_syscall_64+0x3b/0x90 [ 1269.692886] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.693964] RIP: 0033:0x7f63a2e8eb19 [ 1269.694740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.697530] FAULT_INJECTION: forcing a failure. [ 1269.697530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.698565] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.701315] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1269.702832] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.704338] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.705875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.707350] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1269.708847] [ 1269.709328] CPU: 1 PID: 8840 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1269.710209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.711389] Call Trace: [ 1269.711659] [ 1269.711893] dump_stack_lvl+0x8b/0xb3 [ 1269.712306] should_fail.cold+0x5/0xa [ 1269.712720] copy_page_to_iter+0x217/0xdd0 [ 1269.713193] filemap_read+0x4ff/0xbb0 [ 1269.713621] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.714129] ? lock_acquire+0x1b2/0x4d0 [ 1269.714552] generic_file_read_iter+0x3cf/0x540 [ 1269.715048] ext4_file_read_iter+0x184/0x490 [ 1269.715522] new_sync_read+0x427/0x6f0 [ 1269.715938] ? __ia32_sys_llseek+0x380/0x380 [ 1269.716411] ? security_file_permission+0xb1/0xd0 [ 1269.716888] vfs_read+0x356/0x5f0 [ 1269.717253] ksys_read+0x12d/0x250 [ 1269.717622] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.718079] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.718612] do_syscall_64+0x3b/0x90 [ 1269.719007] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.719531] RIP: 0033:0x7f0ad231ab19 [ 1269.719911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.721797] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.722582] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1269.723306] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.724033] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.724757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.725490] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1269.726249] [ 1269.728523] FAULT_INJECTION: forcing a failure. [ 1269.728523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.731091] CPU: 0 PID: 8849 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1269.732843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.735278] Call Trace: [ 1269.735825] [ 1269.736300] dump_stack_lvl+0x8b/0xb3 [ 1269.737138] should_fail.cold+0x5/0xa [ 1269.737978] copy_page_to_iter+0x217/0xdd0 [ 1269.738919] filemap_read+0x4ff/0xbb0 [ 1269.739760] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.740766] ? lock_acquire+0x1b2/0x4d0 [ 1269.741633] generic_file_read_iter+0x3cf/0x540 [ 1269.742665] ext4_file_read_iter+0x184/0x490 [ 1269.743621] new_sync_read+0x427/0x6f0 [ 1269.744465] ? __ia32_sys_llseek+0x380/0x380 [ 1269.745431] ? security_file_permission+0xb1/0xd0 [ 1269.746484] vfs_read+0x356/0x5f0 [ 1269.747237] ksys_read+0x12d/0x250 [ 1269.748003] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.748988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.750103] do_syscall_64+0x3b/0x90 [ 1269.750911] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.752009] RIP: 0033:0x7fa9c71a5b19 [ 1269.752798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.756727] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.758366] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1269.759886] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.761405] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.762932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.764441] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1269.765993] [ 1269.800101] FAULT_INJECTION: forcing a failure. [ 1269.800101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1269.801570] CPU: 1 PID: 8854 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1269.802476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.803712] Call Trace: [ 1269.803995] [ 1269.804278] dump_stack_lvl+0x8b/0xb3 [ 1269.804841] should_fail.cold+0x5/0xa [ 1269.805439] prepare_alloc_pages+0x17b/0x500 [ 1269.806079] __alloc_pages+0x131/0x4e0 [ 1269.806517] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1269.807170] ? __lock_acquire+0xbac/0x5b70 [ 1269.807621] ? mark_lock+0xfc/0x2e10 [ 1269.808033] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1269.808606] alloc_pages_vma+0xde/0x500 [ 1269.809058] __handle_mm_fault+0xfb3/0x3570 [ 1269.809517] ? lock_is_held_type+0xd7/0x130 [ 1269.810005] ? __pmd_alloc+0x680/0x680 [ 1269.810427] handle_mm_fault+0x2e6/0xa20 [ 1269.810874] do_user_addr_fault+0x54a/0x12a0 [ 1269.811336] exc_page_fault+0xa2/0x1a0 [ 1269.811757] asm_exc_page_fault+0x1e/0x30 [ 1269.812181] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1269.812772] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1269.814601] RSP: 0018:ffff8880181b79f0 EFLAGS: 00050246 [ 1269.814777] FAULT_INJECTION: forcing a failure. [ 1269.814777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1269.815173] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1269.815185] RDX: 0000000000000000 RSI: ffff88801f2e5000 RDI: 000000002000e000 [ 1269.815194] RBP: 000000002000e000 R08: 0000000000000000 R09: ffff88801f2e5fff [ 1269.815204] R10: ffffed1003e5cbff R11: 0000000000000001 R12: ffff88801f2e5000 [ 1269.815213] R13: 000000002000f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1269.821478] copyout.part.0+0xdf/0x110 [ 1269.821930] copy_page_to_iter+0x248/0xdd0 [ 1269.822404] filemap_read+0x4ff/0xbb0 [ 1269.822832] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.823333] ? lock_acquire+0x1b2/0x4d0 [ 1269.823765] generic_file_read_iter+0x3cf/0x540 [ 1269.824274] ext4_file_read_iter+0x184/0x490 [ 1269.824772] new_sync_read+0x427/0x6f0 [ 1269.825200] ? __ia32_sys_llseek+0x380/0x380 [ 1269.825664] ? security_file_permission+0xb1/0xd0 [ 1269.826217] vfs_read+0x356/0x5f0 [ 1269.826600] ksys_read+0x12d/0x250 [ 1269.826996] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.827497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.828054] do_syscall_64+0x3b/0x90 [ 1269.828462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.829014] RIP: 0033:0x7f63a2e8eb19 [ 1269.829409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.831369] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.832179] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1269.832937] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.833699] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.834475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.835239] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1269.836026] [ 1269.836278] CPU: 0 PID: 8857 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 03:09:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 33) 03:09:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 29) [ 1269.838033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.840548] Call Trace: [ 1269.841090] [ 1269.841563] dump_stack_lvl+0x8b/0xb3 [ 1269.842418] should_fail.cold+0x5/0xa [ 1269.843244] prepare_alloc_pages+0x17b/0x500 [ 1269.844195] __alloc_pages+0x131/0x4e0 [ 1269.845029] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1269.846307] ? __lock_acquire+0xbac/0x5b70 [ 1269.847218] ? mark_lock+0xfc/0x2e10 [ 1269.848006] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1269.849181] alloc_pages_vma+0xde/0x500 [ 1269.850055] __handle_mm_fault+0xfb3/0x3570 [ 1269.850987] ? lock_is_held_type+0xd7/0x130 [ 1269.851895] ? __pmd_alloc+0x680/0x680 [ 1269.852768] handle_mm_fault+0x2e6/0xa20 [ 1269.853648] do_user_addr_fault+0x54a/0x12a0 [ 1269.854619] exc_page_fault+0xa2/0x1a0 [ 1269.855447] asm_exc_page_fault+0x1e/0x30 [ 1269.856316] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1269.857463] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1269.861292] RSP: 0018:ffff8880454af9f0 EFLAGS: 00050246 [ 1269.862406] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1269.863890] RDX: 0000000000000000 RSI: ffff88801f304000 RDI: 0000000020010000 [ 1269.865373] RBP: 0000000020010000 R08: 0000000000000000 R09: ffff88801f304fff [ 1269.866874] R10: ffffed1003e609ff R11: 0000000000000001 R12: ffff88801f304000 [ 1269.868365] R13: 0000000020011000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1269.869888] copyout.part.0+0xdf/0x110 [ 1269.870721] copy_page_to_iter+0x248/0xdd0 [ 1269.871648] filemap_read+0x4ff/0xbb0 [ 1269.872476] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.873462] ? lock_acquire+0x1b2/0x4d0 [ 1269.874329] generic_file_read_iter+0x3cf/0x540 [ 1269.875321] ext4_file_read_iter+0x184/0x490 [ 1269.876260] new_sync_read+0x427/0x6f0 [ 1269.877089] ? __ia32_sys_llseek+0x380/0x380 [ 1269.878059] ? security_file_permission+0xb1/0xd0 [ 1269.879088] vfs_read+0x356/0x5f0 [ 1269.879832] ksys_read+0x12d/0x250 [ 1269.880589] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.881557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.882669] do_syscall_64+0x3b/0x90 [ 1269.883462] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.884556] RIP: 0033:0x7f0ad231ab19 [ 1269.885333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.889219] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.890817] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1269.892306] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.893812] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.895299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.896791] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1269.898333] 03:09:58 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:09:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 30) 03:09:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2e, 0x0, 0x4) [ 1269.949272] FAULT_INJECTION: forcing a failure. [ 1269.949272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.950650] CPU: 1 PID: 8863 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1269.951558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1269.952817] Call Trace: [ 1269.953102] [ 1269.953339] dump_stack_lvl+0x8b/0xb3 [ 1269.953782] should_fail.cold+0x5/0xa [ 1269.954211] copy_page_to_iter+0x217/0xdd0 [ 1269.954702] filemap_read+0x4ff/0xbb0 [ 1269.955140] ? filemap_get_pages+0x1c90/0x1c90 [ 1269.955650] ? lock_acquire+0x1b2/0x4d0 [ 1269.956103] generic_file_read_iter+0x3cf/0x540 [ 1269.956625] ext4_file_read_iter+0x184/0x490 [ 1269.957078] new_sync_read+0x427/0x6f0 [ 1269.957526] ? __ia32_sys_llseek+0x380/0x380 [ 1269.958029] ? security_file_permission+0xb1/0xd0 [ 1269.958555] vfs_read+0x356/0x5f0 [ 1269.958939] ksys_read+0x12d/0x250 [ 1269.959329] ? __ia32_sys_pwrite64+0x230/0x230 [ 1269.959827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.960387] do_syscall_64+0x3b/0x90 [ 1269.960798] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1269.961352] RIP: 0033:0x7f63a2e8eb19 [ 1269.961754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.963576] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1269.964391] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1269.965156] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1269.965937] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1269.966692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.967458] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1269.968237] 03:10:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 34) 03:10:11 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x2f, 0x0, 0x4) 03:10:11 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 13) 03:10:11 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x30, 0x0, 0x4) 03:10:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x11ffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:10:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 31) [ 1282.396907] FAULT_INJECTION: forcing a failure. [ 1282.396907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1282.398276] CPU: 1 PID: 8879 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1282.399180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.400433] Call Trace: [ 1282.400713] [ 1282.400950] dump_stack_lvl+0x8b/0xb3 [ 1282.401387] should_fail.cold+0x5/0xa [ 1282.401819] prepare_alloc_pages+0x17b/0x500 [ 1282.402321] __alloc_pages+0x131/0x4e0 [ 1282.402762] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1282.403427] ? __lock_acquire+0xbac/0x5b70 [ 1282.403924] ? mark_lock+0xfc/0x2e10 [ 1282.404326] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1282.404946] alloc_pages_vma+0xde/0x500 [ 1282.405386] __handle_mm_fault+0xfb3/0x3570 [ 1282.405837] ? lock_is_held_type+0xd7/0x130 [ 1282.406322] ? __pmd_alloc+0x680/0x680 [ 1282.406784] handle_mm_fault+0x2e6/0xa20 [ 1282.407239] do_user_addr_fault+0x54a/0x12a0 [ 1282.407729] exc_page_fault+0xa2/0x1a0 [ 1282.408157] asm_exc_page_fault+0x1e/0x30 [ 1282.408617] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1282.409216] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1282.411226] RSP: 0018:ffff888044bcf9f0 EFLAGS: 00050246 [ 1282.411802] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1282.412574] RDX: 0000000000000000 RSI: ffff88801f30a000 RDI: 000000002000f000 [ 1282.413350] RBP: 000000002000f000 R08: 0000000000000000 R09: ffff88801f30afff [ 1282.414084] R10: ffffed1003e615ff R11: 0000000000000001 R12: ffff88801f30a000 [ 1282.414856] R13: 0000000020010000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1282.415604] copyout.part.0+0xdf/0x110 [ 1282.416040] copy_page_to_iter+0x248/0xdd0 [ 1282.416524] filemap_read+0x4ff/0xbb0 [ 1282.416952] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.417465] ? lock_acquire+0x1b2/0x4d0 [ 1282.417901] generic_file_read_iter+0x3cf/0x540 [ 1282.418436] ext4_file_read_iter+0x184/0x490 [ 1282.418921] new_sync_read+0x427/0x6f0 [ 1282.419349] ? __ia32_sys_llseek+0x380/0x380 [ 1282.419845] ? security_file_permission+0xb1/0xd0 [ 1282.420379] vfs_read+0x356/0x5f0 [ 1282.420763] ksys_read+0x12d/0x250 [ 1282.421153] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.421655] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.422210] do_syscall_64+0x3b/0x90 [ 1282.422636] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.423198] RIP: 0033:0x7f63a2e8eb19 [ 1282.423603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.425605] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.426439] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1282.427213] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.427981] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.428751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.429527] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1282.430341] [ 1282.439170] FAULT_INJECTION: forcing a failure. [ 1282.439170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1282.440479] CPU: 1 PID: 8878 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1282.441370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.442631] Call Trace: [ 1282.442903] [ 1282.443150] dump_stack_lvl+0x8b/0xb3 [ 1282.443578] should_fail.cold+0x5/0xa [ 1282.443998] prepare_alloc_pages+0x17b/0x500 [ 1282.444479] __alloc_pages+0x131/0x4e0 [ 1282.444906] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1282.445561] ? __lock_acquire+0xbac/0x5b70 [ 1282.446044] ? mark_lock+0xfc/0x2e10 [ 1282.446446] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1282.447058] alloc_pages_vma+0xde/0x500 [ 1282.447498] __handle_mm_fault+0xfb3/0x3570 [ 1282.447983] ? lock_is_held_type+0xd7/0x130 [ 1282.448453] ? __pmd_alloc+0x680/0x680 [ 1282.448903] handle_mm_fault+0x2e6/0xa20 [ 1282.449353] do_user_addr_fault+0x54a/0x12a0 [ 1282.449838] exc_page_fault+0xa2/0x1a0 [ 1282.450268] asm_exc_page_fault+0x1e/0x30 [ 1282.450668] FAULT_INJECTION: forcing a failure. [ 1282.450668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1282.450719] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1282.453928] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1282.455929] RSP: 0018:ffff88801b50f9f0 EFLAGS: 00050246 [ 1282.456482] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1282.457257] RDX: 0000000000000000 RSI: ffff88801f2e4000 RDI: 0000000020006000 [ 1282.458038] RBP: 0000000020006000 R08: 0000000000000000 R09: ffff88801f2e4fff [ 1282.458779] R10: ffffed1003e5c9ff R11: 0000000000000001 R12: ffff88801f2e4000 [ 1282.459552] R13: 0000000020007000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1282.460331] copyout.part.0+0xdf/0x110 [ 1282.460767] copy_page_to_iter+0x248/0xdd0 [ 1282.461247] filemap_read+0x4ff/0xbb0 [ 1282.461674] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.462193] ? lock_acquire+0x1b2/0x4d0 [ 1282.462631] generic_file_read_iter+0x3cf/0x540 [ 1282.463141] ext4_file_read_iter+0x184/0x490 [ 1282.463626] new_sync_read+0x427/0x6f0 [ 1282.464045] ? __ia32_sys_llseek+0x380/0x380 [ 1282.464545] ? security_file_permission+0xb1/0xd0 [ 1282.465055] vfs_read+0x356/0x5f0 [ 1282.465446] ksys_read+0x12d/0x250 [ 1282.465821] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.466368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.466938] do_syscall_64+0x3b/0x90 [ 1282.467326] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.467900] RIP: 0033:0x7fa9c71a5b19 [ 1282.468299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.470323] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.471127] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1282.471911] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.472682] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.473478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.474272] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1282.475069] [ 1282.475321] CPU: 0 PID: 8890 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1282.477096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.479512] Call Trace: [ 1282.480062] [ 1282.480539] dump_stack_lvl+0x8b/0xb3 [ 1282.481380] should_fail.cold+0x5/0xa [ 1282.482364] copy_page_to_iter+0x217/0xdd0 [ 1282.483385] filemap_read+0x4ff/0xbb0 [ 1282.484242] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.485260] ? lock_acquire+0x1b2/0x4d0 [ 1282.486151] generic_file_read_iter+0x3cf/0x540 [ 1282.487177] ext4_file_read_iter+0x184/0x490 [ 1282.488147] new_sync_read+0x427/0x6f0 [ 1282.488991] ? __ia32_sys_llseek+0x380/0x380 [ 1282.489980] ? security_file_permission+0xb1/0xd0 [ 1282.491032] vfs_read+0x356/0x5f0 [ 1282.491796] ksys_read+0x12d/0x250 [ 1282.492569] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.493563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.494690] do_syscall_64+0x3b/0x90 [ 1282.495497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.496589] RIP: 0033:0x7f0ad231ab19 [ 1282.497382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.501265] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.502911] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1282.504416] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.505976] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.507485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.508990] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1282.510531] 03:10:11 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 32) 03:10:11 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 14) [ 1282.639470] FAULT_INJECTION: forcing a failure. [ 1282.639470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1282.640850] CPU: 1 PID: 8897 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1282.641772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.643041] Call Trace: [ 1282.643319] [ 1282.643565] dump_stack_lvl+0x8b/0xb3 [ 1282.644001] should_fail.cold+0x5/0xa [ 1282.644427] copy_page_to_iter+0x217/0xdd0 [ 1282.644922] filemap_read+0x4ff/0xbb0 [ 1282.645377] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.645899] ? lock_acquire+0x1b2/0x4d0 [ 1282.646379] generic_file_read_iter+0x3cf/0x540 [ 1282.646913] ext4_file_read_iter+0x184/0x490 [ 1282.647407] new_sync_read+0x427/0x6f0 [ 1282.647851] ? __ia32_sys_llseek+0x380/0x380 [ 1282.648365] ? security_file_permission+0xb1/0xd0 [ 1282.648911] vfs_read+0x356/0x5f0 [ 1282.649309] ksys_read+0x12d/0x250 [ 1282.649698] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.650227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.650797] do_syscall_64+0x3b/0x90 [ 1282.651216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.651776] RIP: 0033:0x7fa9c71a5b19 [ 1282.652177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.654181] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.655001] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1282.655772] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.656546] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.657323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.658120] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1282.658890] [ 1282.661813] FAULT_INJECTION: forcing a failure. [ 1282.661813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1282.665487] CPU: 0 PID: 8900 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1282.667631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.670568] Call Trace: [ 1282.671242] [ 1282.671841] dump_stack_lvl+0x8b/0xb3 [ 1282.672881] should_fail.cold+0x5/0xa [ 1282.673900] copy_page_to_iter+0x217/0xdd0 [ 1282.675092] filemap_read+0x4ff/0xbb0 [ 1282.676143] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.677412] ? lock_acquire+0x1b2/0x4d0 [ 1282.678494] generic_file_read_iter+0x3cf/0x540 [ 1282.679734] ext4_file_read_iter+0x184/0x490 [ 1282.680914] new_sync_read+0x427/0x6f0 [ 1282.682005] ? __ia32_sys_llseek+0x380/0x380 [ 1282.683185] ? security_file_permission+0xb1/0xd0 [ 1282.684545] vfs_read+0x356/0x5f0 [ 1282.685293] FAULT_INJECTION: forcing a failure. [ 1282.685293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1282.685493] ksys_read+0x12d/0x250 [ 1282.687499] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.688594] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.690006] do_syscall_64+0x3b/0x90 [ 1282.691012] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.692384] RIP: 0033:0x7f63a2e8eb19 [ 1282.693378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.697445] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.699081] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1282.700561] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.702020] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.703448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.704879] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1282.706354] [ 1282.706814] CPU: 1 PID: 8902 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 03:10:11 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 35) [ 1282.707711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1282.709159] Call Trace: [ 1282.709433] [ 1282.709686] dump_stack_lvl+0x8b/0xb3 [ 1282.710137] should_fail.cold+0x5/0xa [ 1282.710558] prepare_alloc_pages+0x17b/0x500 [ 1282.711051] __alloc_pages+0x131/0x4e0 [ 1282.711482] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1282.712149] ? __lock_acquire+0xbac/0x5b70 [ 1282.712625] ? mark_lock+0xfc/0x2e10 [ 1282.713031] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1282.713654] alloc_pages_vma+0xde/0x500 [ 1282.714108] __handle_mm_fault+0xfb3/0x3570 [ 1282.714601] ? lock_is_held_type+0xd7/0x130 [ 1282.715077] ? __pmd_alloc+0x680/0x680 [ 1282.715526] handle_mm_fault+0x2e6/0xa20 [ 1282.715978] do_user_addr_fault+0x54a/0x12a0 [ 1282.716471] exc_page_fault+0xa2/0x1a0 [ 1282.716898] asm_exc_page_fault+0x1e/0x30 [ 1282.717345] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1282.717959] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1282.719960] RSP: 0018:ffff8880456a79f0 EFLAGS: 00050246 [ 1282.720528] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1282.721314] RDX: 0000000000000000 RSI: ffff88801f316000 RDI: 0000000020011000 [ 1282.722070] RBP: 0000000020011000 R08: 0000000000000000 R09: ffff88801f316fff [ 1282.722851] R10: ffffed1003e62dff R11: 0000000000000001 R12: ffff88801f316000 [ 1282.723578] R13: 0000000020012000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1282.724358] copyout.part.0+0xdf/0x110 [ 1282.724790] copy_page_to_iter+0x248/0xdd0 [ 1282.725265] filemap_read+0x4ff/0xbb0 [ 1282.725693] ? filemap_get_pages+0x1c90/0x1c90 [ 1282.726215] ? lock_acquire+0x1b2/0x4d0 [ 1282.726651] generic_file_read_iter+0x3cf/0x540 [ 1282.727162] ext4_file_read_iter+0x184/0x490 [ 1282.727649] new_sync_read+0x427/0x6f0 [ 1282.728078] ? __ia32_sys_llseek+0x380/0x380 [ 1282.728577] ? security_file_permission+0xb1/0xd0 [ 1282.729124] vfs_read+0x356/0x5f0 [ 1282.729515] ksys_read+0x12d/0x250 [ 1282.729911] ? __ia32_sys_pwrite64+0x230/0x230 [ 1282.730400] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1282.730985] do_syscall_64+0x3b/0x90 [ 1282.731404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1282.731980] RIP: 0033:0x7f0ad231ab19 [ 1282.732362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1282.734359] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.735207] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1282.735995] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1282.736789] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1282.737584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1282.738333] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1282.739129] 03:10:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x90d7588a4685d807, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="fc3000"/16]) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e24, 0xfffffffb, @mcast1, 0xfffffffa}}, 0x0, 0x0, 0x26, 0x0, "9577d692321dc03b759361df365c5d1431b8b1f429c473e6e50e0cb9d1206c29a3a473a8a52909c7df2484ccbecec27614d1733c898e0624031787b04b67c6830d61a914ff68da7871a81d83b31b13e0"}, 0xd8) 03:10:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x31, 0x0, 0x4) 03:10:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x30, 0x0, 0x4) 03:10:11 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 33) 03:10:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 36) 03:10:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x32, 0x0, 0x4) 03:10:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x31, 0x0, 0x4) 03:10:28 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 15) 03:10:28 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x8c) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1299.099980] FAULT_INJECTION: forcing a failure. [ 1299.099980] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1299.102646] CPU: 1 PID: 8933 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1299.104438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1299.106493] FAULT_INJECTION: forcing a failure. [ 1299.106493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1299.106922] Call Trace: [ 1299.106933] [ 1299.106944] dump_stack_lvl+0x8b/0xb3 [ 1299.111040] should_fail.cold+0x5/0xa [ 1299.111890] prepare_alloc_pages+0x17b/0x500 [ 1299.112860] __alloc_pages+0x131/0x4e0 [ 1299.113711] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1299.115032] ? __lock_acquire+0xbac/0x5b70 [ 1299.115973] ? mark_lock+0xfc/0x2e10 [ 1299.116779] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1299.117995] alloc_pages_vma+0xde/0x500 [ 1299.118905] __handle_mm_fault+0xfb3/0x3570 [ 1299.119869] ? lock_is_held_type+0xd7/0x130 [ 1299.120809] ? __pmd_alloc+0x680/0x680 [ 1299.121708] handle_mm_fault+0x2e6/0xa20 [ 1299.122622] do_user_addr_fault+0x54a/0x12a0 [ 1299.123604] exc_page_fault+0xa2/0x1a0 [ 1299.124455] asm_exc_page_fault+0x1e/0x30 [ 1299.125355] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1299.126545] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1299.130527] RSP: 0018:ffff888041f6f9f0 EFLAGS: 00050246 [ 1299.131674] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1299.133199] RDX: 0000000000000000 RSI: ffff88801f304000 RDI: 0000000020010000 [ 1299.134728] RBP: 0000000020010000 R08: 0000000000000000 R09: ffff88801f304fff [ 1299.136252] R10: ffffed1003e609ff R11: 0000000000000001 R12: ffff88801f304000 [ 1299.137773] R13: 0000000020011000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1299.139345] copyout.part.0+0xdf/0x110 [ 1299.140212] copy_page_to_iter+0x248/0xdd0 [ 1299.141161] filemap_read+0x4ff/0xbb0 [ 1299.142011] ? filemap_get_pages+0x1c90/0x1c90 [ 1299.143033] ? lock_acquire+0x1b2/0x4d0 [ 1299.143901] generic_file_read_iter+0x3cf/0x540 [ 1299.144907] ext4_file_read_iter+0x184/0x490 [ 1299.145872] new_sync_read+0x427/0x6f0 [ 1299.146728] ? __ia32_sys_llseek+0x380/0x380 [ 1299.147700] ? security_file_permission+0xb1/0xd0 [ 1299.148746] vfs_read+0x356/0x5f0 [ 1299.149508] ksys_read+0x12d/0x250 [ 1299.150289] ? __ia32_sys_pwrite64+0x230/0x230 [ 1299.151280] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.152375] do_syscall_64+0x3b/0x90 [ 1299.153186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1299.154292] RIP: 0033:0x7f63a2e8eb19 [ 1299.155072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.158936] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1299.160531] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1299.162056] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1299.163571] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.165076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.166605] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1299.168133] [ 1299.168624] CPU: 0 PID: 8938 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1299.170219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1299.172351] Call Trace: [ 1299.172829] [ 1299.173247] dump_stack_lvl+0x8b/0xb3 [ 1299.173990] should_fail.cold+0x5/0xa [ 1299.174742] copy_page_to_iter+0x217/0xdd0 [ 1299.175446] FAULT_INJECTION: forcing a failure. [ 1299.175446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1299.175575] filemap_read+0x4ff/0xbb0 [ 1299.178807] ? filemap_get_pages+0x1c90/0x1c90 [ 1299.179692] ? lock_acquire+0x1b2/0x4d0 [ 1299.180458] generic_file_read_iter+0x3cf/0x540 [ 1299.181335] ext4_file_read_iter+0x184/0x490 [ 1299.182189] new_sync_read+0x427/0x6f0 [ 1299.182945] ? __ia32_sys_llseek+0x380/0x380 [ 1299.183797] ? security_file_permission+0xb1/0xd0 [ 1299.184712] vfs_read+0x356/0x5f0 [ 1299.185368] ksys_read+0x12d/0x250 [ 1299.186031] ? __ia32_sys_pwrite64+0x230/0x230 [ 1299.186912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.187875] do_syscall_64+0x3b/0x90 [ 1299.188573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1299.189524] RIP: 0033:0x7f0ad231ab19 [ 1299.190216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.193608] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1299.195010] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1299.196306] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1299.197608] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.198930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.200236] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1299.201565] [ 1299.201992] CPU: 1 PID: 8926 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1299.203818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1299.206292] Call Trace: [ 1299.206853] [ 1299.207341] dump_stack_lvl+0x8b/0xb3 [ 1299.208198] should_fail.cold+0x5/0xa [ 1299.209052] prepare_alloc_pages+0x17b/0x500 [ 1299.210026] __alloc_pages+0x131/0x4e0 [ 1299.210910] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1299.212245] ? __lock_acquire+0xbac/0x5b70 [ 1299.213199] ? mark_lock+0xfc/0x2e10 [ 1299.214020] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1299.215221] alloc_pages_vma+0xde/0x500 [ 1299.216106] __handle_mm_fault+0xfb3/0x3570 [ 1299.217057] ? lock_is_held_type+0xd7/0x130 [ 1299.217992] ? __pmd_alloc+0x680/0x680 [ 1299.218912] handle_mm_fault+0x2e6/0xa20 [ 1299.219810] do_user_addr_fault+0x54a/0x12a0 [ 1299.220783] exc_page_fault+0xa2/0x1a0 [ 1299.221626] asm_exc_page_fault+0x1e/0x30 [ 1299.221770] loop2: detected capacity change from 0 to 256 [ 1299.222524] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1299.222570] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1299.228626] RSP: 0018:ffff88803c89f9f0 EFLAGS: 00050246 [ 1299.229759] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1299.231289] RDX: 0000000000000000 RSI: ffff88801f2ec000 RDI: 0000000020007000 [ 1299.232806] RBP: 0000000020007000 R08: 0000000000000000 R09: ffff88801f2ecfff [ 1299.234335] R10: ffffed1003e5d9ff R11: 0000000000000001 R12: ffff88801f2ec000 [ 1299.235837] R13: 0000000020008000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1299.237363] copyout.part.0+0xdf/0x110 [ 1299.238217] copy_page_to_iter+0x248/0xdd0 [ 1299.239146] filemap_read+0x4ff/0xbb0 [ 1299.239988] ? filemap_get_pages+0x1c90/0x1c90 [ 1299.240989] ? lock_acquire+0x1b2/0x4d0 [ 1299.242202] generic_file_read_iter+0x3cf/0x540 [ 1299.243279] ext4_file_read_iter+0x184/0x490 [ 1299.244233] new_sync_read+0x427/0x6f0 [ 1299.245074] ? __ia32_sys_llseek+0x380/0x380 [ 1299.246041] ? security_file_permission+0xb1/0xd0 [ 1299.247104] vfs_read+0x356/0x5f0 [ 1299.247859] ksys_read+0x12d/0x250 [ 1299.248626] ? __ia32_sys_pwrite64+0x230/0x230 [ 1299.249607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.250744] do_syscall_64+0x3b/0x90 [ 1299.251560] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1299.252647] RIP: 0033:0x7fa9c71a5b19 [ 1299.253424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.257283] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1299.258875] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1299.260361] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1299.261845] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1299.263343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1299.264827] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1299.266355] 03:10:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x9, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x33, 0x0, 0x4) 03:10:28 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1299.501365] Process accounting paused 03:10:44 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 16) 03:10:44 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xa, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:44 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x34, 0x0, 0x4) 03:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x32, 0x0, 0x4) 03:10:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) pwrite64(r1, &(0x7f0000000140)="df3aa53195bac0e553b26bd3d098e31b09ae34848e4d2556d4ed14190be399a9d6262ff097049e24577c9b571a52f7d8e34ea01b21bfe6d31d1df426f8e3bad203435745bb341dcb8c37704860dedda11221df32c0b1a6de63cb406479c4e921d8fa03db9a60f2803f86180a5147b39d8560fb5de14c5693759c451e8fcafd30de76f0c7", 0x84, 0x1) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x105000, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) recvmsg$unix(r3, &(0x7f0000001640)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/122, 0x7a}, {&(0x7f0000001340)=""/214, 0xd6}, {&(0x7f0000001440)=""/48, 0x30}, {&(0x7f0000001480)=""/168, 0xa8}], 0x5, &(0x7f00000015c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x1) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000001680)=0x4) 03:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 34) 03:10:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 37) [ 1315.135375] FAULT_INJECTION: forcing a failure. [ 1315.135375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1315.138055] CPU: 1 PID: 8961 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1315.139885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1315.140193] FAULT_INJECTION: forcing a failure. [ 1315.140193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1315.142396] Call Trace: [ 1315.142432] [ 1315.142443] dump_stack_lvl+0x8b/0xb3 [ 1315.146713] should_fail.cold+0x5/0xa [ 1315.147592] copy_page_to_iter+0x217/0xdd0 [ 1315.148588] filemap_read+0x4ff/0xbb0 [ 1315.149476] ? filemap_get_pages+0x1c90/0x1c90 [ 1315.150545] ? lock_acquire+0x1b2/0x4d0 [ 1315.151453] generic_file_read_iter+0x3cf/0x540 [ 1315.152518] ext4_file_read_iter+0x184/0x490 [ 1315.153528] new_sync_read+0x427/0x6f0 [ 1315.154446] ? __ia32_sys_llseek+0x380/0x380 [ 1315.155487] ? security_file_permission+0xb1/0xd0 [ 1315.156603] vfs_read+0x356/0x5f0 [ 1315.157411] ksys_read+0x12d/0x250 [ 1315.158229] ? __ia32_sys_pwrite64+0x230/0x230 [ 1315.159288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.160478] do_syscall_64+0x3b/0x90 [ 1315.161343] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1315.162533] RIP: 0033:0x7f63a2e8eb19 [ 1315.163377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1315.167547] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1315.169287] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1315.170928] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1315.172551] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1315.174178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.175822] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1315.177492] [ 1315.178033] CPU: 0 PID: 8967 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1315.179700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1315.181944] Call Trace: [ 1315.182462] [ 1315.182928] dump_stack_lvl+0x8b/0xb3 [ 1315.183714] should_fail.cold+0x5/0xa [ 1315.184495] copy_page_to_iter+0x217/0xdd0 [ 1315.185381] filemap_read+0x4ff/0xbb0 [ 1315.186184] ? filemap_get_pages+0x1c90/0x1c90 [ 1315.187157] ? lock_acquire+0x1b2/0x4d0 [ 1315.187971] generic_file_read_iter+0x3cf/0x540 [ 1315.188904] ext4_file_read_iter+0x184/0x490 [ 1315.189798] new_sync_read+0x427/0x6f0 [ 1315.190593] ? __ia32_sys_llseek+0x380/0x380 [ 1315.191516] ? security_file_permission+0xb1/0xd0 [ 1315.192487] vfs_read+0x356/0x5f0 [ 1315.193201] ksys_read+0x12d/0x250 [ 1315.193928] ? __ia32_sys_pwrite64+0x230/0x230 [ 1315.194871] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.195923] do_syscall_64+0x3b/0x90 [ 1315.196697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1315.196733] FAULT_INJECTION: forcing a failure. [ 1315.196733] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1315.197721] RIP: 0033:0x7fa9c71a5b19 [ 1315.197744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1315.204459] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1315.205976] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1315.207413] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1315.208846] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1315.210256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.211700] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1315.213138] [ 1315.213604] CPU: 1 PID: 8971 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1315.215267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1315.217753] Call Trace: [ 1315.218272] [ 1315.218737] dump_stack_lvl+0x8b/0xb3 [ 1315.219528] should_fail.cold+0x5/0xa [ 1315.220322] prepare_alloc_pages+0x17b/0x500 [ 1315.221230] __alloc_pages+0x131/0x4e0 [ 1315.222020] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1315.223257] ? __lock_acquire+0xbac/0x5b70 [ 1315.224131] ? mark_lock+0xfc/0x2e10 [ 1315.224872] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1315.226000] alloc_pages_vma+0xde/0x500 [ 1315.226835] __handle_mm_fault+0xfb3/0x3570 [ 1315.227725] ? lock_is_held_type+0xd7/0x130 [ 1315.228600] ? __pmd_alloc+0x680/0x680 [ 1315.229440] handle_mm_fault+0x2e6/0xa20 [ 1315.230283] do_user_addr_fault+0x54a/0x12a0 [ 1315.231222] exc_page_fault+0xa2/0x1a0 [ 1315.232023] asm_exc_page_fault+0x1e/0x30 [ 1315.232859] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1315.233973] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1315.237710] RSP: 0018:ffff88804196f9f0 EFLAGS: 00050246 [ 1315.238798] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1315.240246] RDX: 0000000000000000 RSI: ffff88801f317000 RDI: 0000000020012000 [ 1315.241688] RBP: 0000000020012000 R08: 0000000000000000 R09: ffff88801f317fff [ 1315.243165] R10: ffffed1003e62fff R11: 0000000000000001 R12: ffff88801f317000 [ 1315.244629] R13: 0000000020013000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1315.246118] copyout.part.0+0xdf/0x110 [ 1315.246957] copy_page_to_iter+0x248/0xdd0 [ 1315.247866] filemap_read+0x4ff/0xbb0 [ 1315.248679] ? filemap_get_pages+0x1c90/0x1c90 [ 1315.249654] ? lock_acquire+0x1b2/0x4d0 [ 1315.250498] generic_file_read_iter+0x3cf/0x540 [ 1315.251477] ext4_file_read_iter+0x184/0x490 [ 1315.252410] new_sync_read+0x427/0x6f0 [ 1315.253235] ? __ia32_sys_llseek+0x380/0x380 [ 1315.254184] ? security_file_permission+0xb1/0xd0 [ 1315.255231] vfs_read+0x356/0x5f0 [ 1315.255970] ksys_read+0x12d/0x250 [ 1315.256716] ? __ia32_sys_pwrite64+0x230/0x230 [ 1315.257675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.258773] do_syscall_64+0x3b/0x90 [ 1315.259568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1315.260646] RIP: 0033:0x7f0ad231ab19 [ 1315.261421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1315.265290] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1315.266898] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1315.268402] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1315.269918] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1315.271451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.272969] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1315.274518] [ 1315.280267] loop2: detected capacity change from 0 to 256 03:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x35, 0x0, 0x4) 03:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x33, 0x0, 0x4) 03:10:44 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xb, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:44 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x8100, 0x8) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_DEFRAG_RANGE(r2, 0x40309410, &(0x7f0000000000)={0x1ff, 0x8, 0x0, 0xb8c, 0x2, [0xfffffffc, 0x8, 0x4, 0x3]}) 03:10:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x36, 0x0, 0x4) 03:10:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x34, 0x0, 0x4) 03:10:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 35) [ 1315.603075] FAULT_INJECTION: forcing a failure. [ 1315.603075] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1315.605624] CPU: 0 PID: 8995 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1315.607274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1315.609526] Call Trace: [ 1315.610049] [ 1315.610515] dump_stack_lvl+0x8b/0xb3 [ 1315.611314] should_fail.cold+0x5/0xa [ 1315.612104] prepare_alloc_pages+0x17b/0x500 [ 1315.613005] __alloc_pages+0x131/0x4e0 [ 1315.613790] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1315.615016] ? __lock_acquire+0xbac/0x5b70 [ 1315.615883] ? mark_lock+0xfc/0x2e10 [ 1315.616624] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1315.617735] alloc_pages_vma+0xde/0x500 [ 1315.618571] __handle_mm_fault+0xfb3/0x3570 [ 1315.619454] ? lock_is_held_type+0xd7/0x130 [ 1315.620325] ? __pmd_alloc+0x680/0x680 [ 1315.621159] handle_mm_fault+0x2e6/0xa20 [ 1315.621994] do_user_addr_fault+0x54a/0x12a0 [ 1315.622921] exc_page_fault+0xa2/0x1a0 [ 1315.623704] asm_exc_page_fault+0x1e/0x30 [ 1315.624532] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1315.625617] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1315.629252] RSP: 0018:ffff888044b7f9f0 EFLAGS: 00050246 [ 1315.630314] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1315.631731] RDX: 0000000000000000 RSI: ffff88801f316000 RDI: 0000000020011000 [ 1315.633137] RBP: 0000000020011000 R08: 0000000000000000 R09: ffff88801f316fff [ 1315.634569] R10: ffffed1003e62dff R11: 0000000000000001 R12: ffff88801f316000 [ 1315.635975] R13: 0000000020012000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1315.637413] copyout.part.0+0xdf/0x110 [ 1315.638209] copy_page_to_iter+0x248/0xdd0 [ 1315.639100] filemap_read+0x4ff/0xbb0 [ 1315.639887] ? filemap_get_pages+0x1c90/0x1c90 [ 1315.640823] ? lock_acquire+0x1b2/0x4d0 [ 1315.641625] generic_file_read_iter+0x3cf/0x540 [ 1315.642622] ext4_file_read_iter+0x184/0x490 [ 1315.643539] new_sync_read+0x427/0x6f0 [ 1315.644327] ? __ia32_sys_llseek+0x380/0x380 [ 1315.645243] ? security_file_permission+0xb1/0xd0 [ 1315.646233] vfs_read+0x356/0x5f0 [ 1315.646964] ksys_read+0x12d/0x250 [ 1315.647681] ? __ia32_sys_pwrite64+0x230/0x230 [ 1315.648608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.649646] do_syscall_64+0x3b/0x90 [ 1315.650403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1315.651450] RIP: 0033:0x7f63a2e8eb19 [ 1315.652186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1315.655808] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1315.657316] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1315.658732] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1315.660140] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1315.661555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.662991] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1315.664440] 03:10:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 38) 03:10:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x37, 0x0, 0x4) 03:10:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 36) 03:10:57 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:57 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xc, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x35, 0x0, 0x4) 03:10:57 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 17) 03:10:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)="9411b20518964e9f3a0543432db336e0f2ba7e9b3a25efa782fd7e278420f5bc2494fd868629d41dac9346514eb4bf755bee2dfa0326d198911b655706c5a3e7ce3f7d7b861b1adf51f631679ed77852baec5d1372c87c62169b4e7521c669ca4be4f6393304b9979b5d6107a27d28094abe16eca1e67bd0b6dfaacc1da574d707518ec31d84e46857ef7b15f2cdfb7e2ded7a3e418e8bd049ced4b0c9f98e10f7c14196cb67dbb58790fd2ea13d9e41d3da8d099eddf81be99d25d96fd03170557f18948c7941f4f3956ab81d2d56fd9e1d2082d6c34b0f18c97898d1b28306d5832cfc32cedfddb1fc30e7b798069df958", 0xf2, r0}, 0x68) [ 1328.961050] FAULT_INJECTION: forcing a failure. [ 1328.961050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1328.963547] CPU: 1 PID: 9010 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1328.965100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1328.967335] Call Trace: [ 1328.967812] [ 1328.968232] dump_stack_lvl+0x8b/0xb3 [ 1328.968989] should_fail.cold+0x5/0xa [ 1328.969725] prepare_alloc_pages+0x17b/0x500 [ 1328.970070] FAULT_INJECTION: forcing a failure. [ 1328.970070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1328.970559] __alloc_pages+0x131/0x4e0 [ 1328.973534] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1328.974648] ? __lock_acquire+0xbac/0x5b70 [ 1328.975437] ? mark_lock+0xfc/0x2e10 [ 1328.976115] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1328.977141] alloc_pages_vma+0xde/0x500 [ 1328.977894] __handle_mm_fault+0xfb3/0x3570 [ 1328.978719] ? lock_is_held_type+0xd7/0x130 [ 1328.979516] ? __pmd_alloc+0x680/0x680 [ 1328.980277] handle_mm_fault+0x2e6/0xa20 [ 1328.981042] do_user_addr_fault+0x54a/0x12a0 [ 1328.981862] exc_page_fault+0xa2/0x1a0 [ 1328.982592] asm_exc_page_fault+0x1e/0x30 [ 1328.983368] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1328.984361] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1328.987804] RSP: 0018:ffff88800823f9f0 EFLAGS: 00050246 [ 1328.988757] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1328.990078] RDX: 0000000000000000 RSI: ffff88801f2ef000 RDI: 0000000020008000 [ 1328.991360] RBP: 0000000020008000 R08: 0000000000000000 R09: ffff88801f2effff [ 1328.992676] R10: ffffed1003e5dfff R11: 0000000000000001 R12: ffff88801f2ef000 [ 1328.993953] R13: 0000000020009000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1328.995267] copyout.part.0+0xdf/0x110 [ 1328.995993] copy_page_to_iter+0x248/0xdd0 [ 1328.996790] filemap_read+0x4ff/0xbb0 [ 1328.997508] ? filemap_get_pages+0x1c90/0x1c90 [ 1328.998370] ? lock_acquire+0x1b2/0x4d0 [ 1328.999106] generic_file_read_iter+0x3cf/0x540 [ 1328.999965] ext4_file_read_iter+0x184/0x490 [ 1329.000772] new_sync_read+0x427/0x6f0 [ 1329.001485] ? __ia32_sys_llseek+0x380/0x380 [ 1329.002305] ? security_file_permission+0xb1/0xd0 [ 1329.003212] vfs_read+0x356/0x5f0 [ 1329.003856] ksys_read+0x12d/0x250 [ 1329.004512] ? __ia32_sys_pwrite64+0x230/0x230 [ 1329.005384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1329.006314] do_syscall_64+0x3b/0x90 [ 1329.007021] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.007945] RIP: 0033:0x7fa9c71a5b19 [ 1329.008638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.011930] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1329.013316] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1329.014587] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1329.015874] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.017144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.018408] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1329.019715] [ 1329.020134] CPU: 0 PID: 9014 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1329.021758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1329.022347] FAULT_INJECTION: forcing a failure. [ 1329.022347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.023979] Call Trace: [ 1329.023990] [ 1329.023999] dump_stack_lvl+0x8b/0xb3 [ 1329.027700] should_fail.cold+0x5/0xa [ 1329.028466] copy_page_to_iter+0x217/0xdd0 [ 1329.029334] filemap_read+0x4ff/0xbb0 [ 1329.030114] ? filemap_get_pages+0x1c90/0x1c90 [ 1329.031061] ? lock_acquire+0x1b2/0x4d0 [ 1329.031851] generic_file_read_iter+0x3cf/0x540 [ 1329.032777] ext4_file_read_iter+0x184/0x490 [ 1329.033650] new_sync_read+0x427/0x6f0 [ 1329.034420] ? __ia32_sys_llseek+0x380/0x380 [ 1329.035322] ? security_file_permission+0xb1/0xd0 [ 1329.036283] vfs_read+0x356/0x5f0 [ 1329.036975] ksys_read+0x12d/0x250 [ 1329.037680] ? __ia32_sys_pwrite64+0x230/0x230 [ 1329.038581] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1329.039629] do_syscall_64+0x3b/0x90 [ 1329.040380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.041388] RIP: 0033:0x7f0ad231ab19 [ 1329.042115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.045717] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1329.047209] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1329.048594] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1329.049996] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.051403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.052790] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1329.054202] [ 1329.054662] CPU: 1 PID: 9013 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1329.056119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1329.058106] Call Trace: [ 1329.058554] [ 1329.058957] dump_stack_lvl+0x8b/0xb3 [ 1329.059641] should_fail.cold+0x5/0xa [ 1329.060323] copy_page_to_iter+0x217/0xdd0 [ 1329.061095] filemap_read+0x4ff/0xbb0 [ 1329.061786] ? filemap_get_pages+0x1c90/0x1c90 [ 1329.062652] ? lock_acquire+0x1b2/0x4d0 [ 1329.063371] generic_file_read_iter+0x3cf/0x540 [ 1329.064216] ext4_file_read_iter+0x184/0x490 [ 1329.065005] new_sync_read+0x427/0x6f0 [ 1329.065717] ? __ia32_sys_llseek+0x380/0x380 [ 1329.066522] ? security_file_permission+0xb1/0xd0 [ 1329.067401] vfs_read+0x356/0x5f0 [ 1329.068025] ksys_read+0x12d/0x250 [ 1329.068676] ? __ia32_sys_pwrite64+0x230/0x230 [ 1329.069487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1329.070425] do_syscall_64+0x3b/0x90 [ 1329.071122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1329.072035] RIP: 0033:0x7f63a2e8eb19 [ 1329.072688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1329.075938] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1329.077275] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1329.078540] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1329.079802] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1329.081062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1329.082318] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1329.083614] 03:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x36, 0x0, 0x4) 03:10:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x38, 0x0, 0x4) 03:10:58 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xd, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:58 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='\x00', 0x0, 0x40) read(r0, &(0x7f00000000c0)=""/102390, 0x18ff6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000019280), &(0x7f00000192c0)={'U-', 0x5}, 0x16, 0x3) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000019240)={0x80, 0x0, &(0x7f0000019100)=[@acquire_done={0x40106309, 0x1}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000000)={@fd={0x66642a85, 0x0, r1}, @flat=@weak_binder={0x77622a85, 0x1001, 0x2}, @fd={0x66642a85, 0x0, r0}}, &(0x7f00000190c0)={0x0, 0x18, 0x30}}}, @acquire_done={0x40106309, 0x2}, @increfs_done={0x40106308, 0x2}], 0xaf, 0x0, &(0x7f0000019180)="f8f581db55e7c959d1e34d5a2ae49b16a5c80828fbda0bda1d650076c24d40d4ade1888d1f411a18d19dd2c6ba0e381ca3172fe1858074d8c5e35355b5166b1b9782cff0a3e080650a4034a2c4a68e0abee4cd0c639cf35aef561455da29607be3d1cf34827668fa0fab101a5b0368cb3943229630b9766cfc21c8b05ba38374124f8564a2e08c987ade6464cab97c60aa1839527796bdc7ba276be5793aeee50af81078aa4d7f726fb420d1fb0b87"}) 03:10:58 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xe, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:10:58 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:10:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x37, 0x0, 0x4) 03:11:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 39) 03:11:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xf, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:11:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000280)={0x53, 0xfffffffffffffffd, 0x1000, 0x7d, @buffer={0x0, 0x46, &(0x7f00000000c0)=""/70}, &(0x7f0000001040)="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", &(0x7f0000000140)=""/234, 0x400, 0x20, 0xffffffffffffffff, &(0x7f0000000240)}) ioctl$FICLONE(r3, 0x40049409, r0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0xd1, &(0x7f0000000840)=""/209}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r2, 0x0, 0x0) 03:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x39, 0x0, 0x4) 03:11:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 37) 03:11:12 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x38, 0x0, 0x4) 03:11:12 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 18) [ 1343.481568] FAULT_INJECTION: forcing a failure. [ 1343.481568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1343.484553] CPU: 0 PID: 9060 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1343.486492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1343.489194] Call Trace: [ 1343.489806] [ 1343.490336] dump_stack_lvl+0x8b/0xb3 [ 1343.491275] should_fail.cold+0x5/0xa [ 1343.492201] prepare_alloc_pages+0x17b/0x500 [ 1343.493258] __alloc_pages+0x131/0x4e0 [ 1343.494186] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1343.495621] ? __lock_acquire+0xbac/0x5b70 [ 1343.496637] ? mark_lock+0xfc/0x2e10 [ 1343.497516] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1343.498818] alloc_pages_vma+0xde/0x500 [ 1343.499793] __handle_mm_fault+0xfb3/0x3570 [ 1343.500678] ? lock_is_held_type+0xd7/0x130 [ 1343.501550] ? __pmd_alloc+0x680/0x680 [ 1343.502381] handle_mm_fault+0x2e6/0xa20 [ 1343.503230] do_user_addr_fault+0x54a/0x12a0 [ 1343.504132] exc_page_fault+0xa2/0x1a0 [ 1343.504911] asm_exc_page_fault+0x1e/0x30 [ 1343.505748] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1343.506833] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1343.510750] RSP: 0018:ffff8880371779f0 EFLAGS: 00050246 [ 1343.511823] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1343.513245] RDX: 0000000000000000 RSI: ffff88801f317000 RDI: 0000000020012000 [ 1343.514663] RBP: 0000000020012000 R08: 0000000000000000 R09: ffff88801f317fff [ 1343.516096] R10: ffffed1003e62fff R11: 0000000000000001 R12: ffff88801f317000 [ 1343.517517] R13: 0000000020013000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1343.518988] copyout.part.0+0xdf/0x110 [ 1343.519794] copy_page_to_iter+0x248/0xdd0 [ 1343.520682] filemap_read+0x4ff/0xbb0 [ 1343.521473] ? filemap_get_pages+0x1c90/0x1c90 [ 1343.522422] ? lock_acquire+0x1b2/0x4d0 [ 1343.523238] generic_file_read_iter+0x3cf/0x540 [ 1343.524190] ext4_file_read_iter+0x184/0x490 [ 1343.525090] new_sync_read+0x427/0x6f0 [ 1343.525881] ? __ia32_sys_llseek+0x380/0x380 [ 1343.526791] ? security_file_permission+0xb1/0xd0 [ 1343.527798] vfs_read+0x356/0x5f0 [ 1343.528511] ksys_read+0x12d/0x250 [ 1343.529234] ? __ia32_sys_pwrite64+0x230/0x230 [ 1343.530160] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1343.531221] do_syscall_64+0x3b/0x90 [ 1343.531977] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1343.533007] RIP: 0033:0x7f63a2e8eb19 [ 1343.533746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.537486] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1343.538532] FAULT_INJECTION: forcing a failure. [ 1343.538532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1343.539007] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1343.539026] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1343.539042] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1343.539059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1343.546977] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1343.548426] [ 1343.548891] CPU: 1 PID: 9067 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1343.550580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1343.552833] Call Trace: [ 1343.553346] [ 1343.553792] dump_stack_lvl+0x8b/0xb3 [ 1343.554572] should_fail.cold+0x5/0xa [ 1343.555370] copy_page_to_iter+0x217/0xdd0 [ 1343.556256] filemap_read+0x4ff/0xbb0 [ 1343.557045] ? filemap_get_pages+0x1c90/0x1c90 [ 1343.557986] ? lock_acquire+0x1b2/0x4d0 [ 1343.558790] generic_file_read_iter+0x3cf/0x540 [ 1343.559745] ext4_file_read_iter+0x184/0x490 [ 1343.560638] new_sync_read+0x427/0x6f0 [ 1343.561426] ? __ia32_sys_llseek+0x380/0x380 [ 1343.562332] ? security_file_permission+0xb1/0xd0 [ 1343.563334] vfs_read+0x356/0x5f0 [ 1343.564049] ksys_read+0x12d/0x250 [ 1343.564767] ? __ia32_sys_pwrite64+0x230/0x230 [ 1343.565689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1343.566730] do_syscall_64+0x3b/0x90 [ 1343.567498] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1343.568526] RIP: 0033:0x7fa9c71a5b19 [ 1343.569266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.572920] RSP: 002b:00007fa9c46fa188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1343.574433] RAX: ffffffffffffffda RBX: 00007fa9c72b9020 RCX: 00007fa9c71a5b19 [ 1343.575867] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1343.577282] RBP: 00007fa9c46fa1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1343.578700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1343.580128] R13: 00007ffeb12f784f R14: 00007fa9c46fa300 R15: 0000000000022000 [ 1343.581589] [ 1343.586242] FAULT_INJECTION: forcing a failure. [ 1343.586242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1343.588863] CPU: 0 PID: 9059 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1343.590514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1343.592813] Call Trace: [ 1343.593334] [ 1343.593775] dump_stack_lvl+0x8b/0xb3 [ 1343.594564] should_fail.cold+0x5/0xa [ 1343.595353] prepare_alloc_pages+0x17b/0x500 [ 1343.596242] __alloc_pages+0x131/0x4e0 [ 1343.597034] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1343.598241] ? __lock_acquire+0xbac/0x5b70 [ 1343.599125] ? mark_lock+0xfc/0x2e10 [ 1343.599869] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1343.600990] alloc_pages_vma+0xde/0x500 [ 1343.601911] __handle_mm_fault+0xfb3/0x3570 [ 1343.602870] ? lock_is_held_type+0xd7/0x130 [ 1343.603740] ? __pmd_alloc+0x680/0x680 03:11:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x10, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1343.604568] handle_mm_fault+0x2e6/0xa20 [ 1343.605549] do_user_addr_fault+0x54a/0x12a0 [ 1343.606454] exc_page_fault+0xa2/0x1a0 [ 1343.607256] asm_exc_page_fault+0x1e/0x30 [ 1343.608081] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1343.609175] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1343.612846] RSP: 0018:ffff888036fff9f0 EFLAGS: 00050246 [ 1343.613915] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1343.615337] RDX: 0000000000000000 RSI: ffff88801f311000 RDI: 0000000020013000 [ 1343.616763] RBP: 0000000020013000 R08: 0000000000000000 R09: ffff88801f311fff [ 1343.618177] R10: ffffed1003e623ff R11: 0000000000000001 R12: ffff88801f311000 [ 1343.619620] R13: 0000000020014000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1343.621068] copyout.part.0+0xdf/0x110 [ 1343.621863] copy_page_to_iter+0x248/0xdd0 [ 1343.622741] filemap_read+0x4ff/0xbb0 [ 1343.623539] ? filemap_get_pages+0x1c90/0x1c90 [ 1343.624485] ? lock_acquire+0x1b2/0x4d0 [ 1343.625295] generic_file_read_iter+0x3cf/0x540 [ 1343.626244] ext4_file_read_iter+0x184/0x490 [ 1343.627154] new_sync_read+0x427/0x6f0 [ 1343.627945] ? __ia32_sys_llseek+0x380/0x380 [ 1343.628858] ? security_file_permission+0xb1/0xd0 [ 1343.629838] vfs_read+0x356/0x5f0 [ 1343.630552] ksys_read+0x12d/0x250 [ 1343.631283] ? __ia32_sys_pwrite64+0x230/0x230 [ 1343.632212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1343.633255] do_syscall_64+0x3b/0x90 [ 1343.634013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1343.635055] RIP: 0033:0x7f0ad231ab19 [ 1343.635794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.639469] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1343.640989] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1343.642414] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1343.643845] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1343.645267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1343.646688] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1343.648157] 03:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3a, 0x0, 0x4) 03:11:12 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 19) 03:11:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x11, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:11:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x39, 0x0, 0x4) 03:11:12 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:11:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3b, 0x0, 0x4) [ 1343.783605] FAULT_INJECTION: forcing a failure. [ 1343.783605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1343.786055] CPU: 1 PID: 9081 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1343.787713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1343.789969] Call Trace: [ 1343.790479] [ 1343.790939] dump_stack_lvl+0x8b/0xb3 [ 1343.791722] should_fail.cold+0x5/0xa [ 1343.792506] prepare_alloc_pages+0x17b/0x500 [ 1343.793401] __alloc_pages+0x131/0x4e0 [ 1343.794190] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1343.795404] ? __lock_acquire+0xbac/0x5b70 [ 1343.796271] ? mark_lock+0xfc/0x2e10 [ 1343.797018] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1343.798135] alloc_pages_vma+0xde/0x500 [ 1343.798967] __handle_mm_fault+0xfb3/0x3570 [ 1343.799854] ? lock_is_held_type+0xd7/0x130 [ 1343.800718] ? __pmd_alloc+0x680/0x680 [ 1343.801546] handle_mm_fault+0x2e6/0xa20 [ 1343.802384] do_user_addr_fault+0x54a/0x12a0 [ 1343.803295] exc_page_fault+0xa2/0x1a0 [ 1343.804079] asm_exc_page_fault+0x1e/0x30 [ 1343.804907] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1343.806001] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1343.809662] RSP: 0018:ffff8880363cf9f0 EFLAGS: 00050246 [ 1343.810720] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1343.812146] RDX: 0000000000000000 RSI: ffff88801f2f0000 RDI: 0000000020009000 [ 1343.813561] RBP: 0000000020009000 R08: 0000000000000000 R09: ffff88801f2f0fff [ 1343.814991] R10: ffffed1003e5e1ff R11: 0000000000000001 R12: ffff88801f2f0000 [ 1343.816409] R13: 000000002000a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1343.817882] copyout.part.0+0xdf/0x110 [ 1343.818681] copy_page_to_iter+0x248/0xdd0 [ 1343.819584] filemap_read+0x4ff/0xbb0 [ 1343.820376] ? filemap_get_pages+0x1c90/0x1c90 [ 1343.821319] ? lock_acquire+0x1b2/0x4d0 [ 1343.822130] generic_file_read_iter+0x3cf/0x540 [ 1343.823084] ext4_file_read_iter+0x184/0x490 [ 1343.823980] new_sync_read+0x427/0x6f0 [ 1343.824764] ? __ia32_sys_llseek+0x380/0x380 [ 1343.825676] ? security_file_permission+0xb1/0xd0 [ 1343.826667] vfs_read+0x356/0x5f0 [ 1343.827405] ksys_read+0x12d/0x250 [ 1343.828112] ? __ia32_sys_pwrite64+0x230/0x230 [ 1343.829031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1343.830065] do_syscall_64+0x3b/0x90 [ 1343.830821] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1343.831859] RIP: 0033:0x7fa9c71a5b19 [ 1343.832597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.836251] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1343.837760] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1343.839191] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1343.840607] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1343.842020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1343.843439] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1343.844903] 03:11:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x12, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1344.021559] Process accounting resumed 03:11:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(r0, &(0x7f0000000180)=""/200, 0xc8) close(0xffffffffffffffff) read(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000000)=""/12) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r1) 03:11:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 40) 03:11:31 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x4000) 03:11:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 38) 03:11:31 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x13, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:11:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3c, 0x0, 0x4) 03:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3a, 0x0, 0x4) 03:11:31 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 20) [ 1362.674686] FAULT_INJECTION: forcing a failure. [ 1362.674686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1362.677202] CPU: 1 PID: 9101 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1362.678884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1362.681197] Call Trace: [ 1362.681790] [ 1362.682251] dump_stack_lvl+0x8b/0xb3 [ 1362.683228] should_fail.cold+0x5/0xa [ 1362.684112] copy_page_to_iter+0x217/0xdd0 [ 1362.685018] filemap_read+0x4ff/0xbb0 [ 1362.685828] ? filemap_get_pages+0x1c90/0x1c90 [ 1362.686782] ? lock_acquire+0x1b2/0x4d0 [ 1362.687612] generic_file_read_iter+0x3cf/0x540 [ 1362.688564] ext4_file_read_iter+0x184/0x490 [ 1362.689475] new_sync_read+0x427/0x6f0 [ 1362.690272] ? __ia32_sys_llseek+0x380/0x380 [ 1362.691230] ? security_file_permission+0xb1/0xd0 [ 1362.692227] vfs_read+0x356/0x5f0 [ 1362.692951] ksys_read+0x12d/0x250 [ 1362.693683] ? __ia32_sys_pwrite64+0x230/0x230 [ 1362.694624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1362.695707] do_syscall_64+0x3b/0x90 [ 1362.696468] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1362.697509] RIP: 0033:0x7f0ad231ab19 [ 1362.698259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1362.701970] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1362.703499] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1362.704951] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1362.706379] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1362.707834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1362.709271] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1362.710769] 03:11:31 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x14, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1362.722284] FAULT_INJECTION: forcing a failure. [ 1362.722284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1362.724752] CPU: 1 PID: 9106 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1362.726412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1362.728731] Call Trace: [ 1362.729240] [ 1362.729692] dump_stack_lvl+0x8b/0xb3 [ 1362.730470] should_fail.cold+0x5/0xa [ 1362.731289] copy_page_to_iter+0x217/0xdd0 [ 1362.732179] filemap_read+0x4ff/0xbb0 [ 1362.732975] ? filemap_get_pages+0x1c90/0x1c90 [ 1362.733922] ? lock_acquire+0x1b2/0x4d0 [ 1362.734746] generic_file_read_iter+0x3cf/0x540 [ 1362.735719] ext4_file_read_iter+0x184/0x490 [ 1362.736616] new_sync_read+0x427/0x6f0 [ 1362.737394] ? __ia32_sys_llseek+0x380/0x380 [ 1362.738303] ? security_file_permission+0xb1/0xd0 [ 1362.739480] vfs_read+0x356/0x5f0 [ 1362.740410] ksys_read+0x12d/0x250 [ 1362.741313] ? __ia32_sys_pwrite64+0x230/0x230 [ 1362.742468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1362.743794] do_syscall_64+0x3b/0x90 [ 1362.744748] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1362.746015] RIP: 0033:0x7f63a2e8eb19 [ 1362.746915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1362.750639] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1362.752196] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1362.753632] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1362.755060] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1362.756501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1362.757940] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 03:11:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3b, 0x0, 0x4) [ 1362.759414] [ 1362.777097] FAULT_INJECTION: forcing a failure. [ 1362.777097] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1362.779651] CPU: 0 PID: 9114 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1362.781358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1362.783719] Call Trace: [ 1362.784277] [ 1362.784796] dump_stack_lvl+0x8b/0xb3 [ 1362.785704] should_fail.cold+0x5/0xa [ 1362.786613] copy_page_to_iter+0x217/0xdd0 [ 1362.787660] filemap_read+0x4ff/0xbb0 [ 1362.788572] ? filemap_get_pages+0x1c90/0x1c90 [ 1362.789659] ? lock_acquire+0x1b2/0x4d0 [ 1362.790593] generic_file_read_iter+0x3cf/0x540 [ 1362.791691] ext4_file_read_iter+0x184/0x490 [ 1362.792732] new_sync_read+0x427/0x6f0 [ 1362.793642] ? __ia32_sys_llseek+0x380/0x380 [ 1362.794695] ? security_file_permission+0xb1/0xd0 [ 1362.795835] vfs_read+0x356/0x5f0 [ 1362.796661] ksys_read+0x12d/0x250 [ 1362.797492] ? __ia32_sys_pwrite64+0x230/0x230 [ 1362.798555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1362.799781] do_syscall_64+0x3b/0x90 [ 1362.800660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1362.801848] RIP: 0033:0x7fa9c71a5b19 [ 1362.802704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1362.806916] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1362.808680] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1362.810312] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1362.811957] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1362.813593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1362.815238] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1362.816906] 03:11:31 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(0x0, 0x4000) 03:11:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 03:11:31 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 21) 03:11:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 41) 03:11:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3d, 0x0, 0x4) 03:11:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x15, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1363.003468] FAULT_INJECTION: forcing a failure. [ 1363.003468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1363.006095] CPU: 1 PID: 9130 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1363.007815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1363.010111] Call Trace: [ 1363.010641] [ 1363.011095] dump_stack_lvl+0x8b/0xb3 [ 1363.011924] should_fail.cold+0x5/0xa [ 1363.012716] prepare_alloc_pages+0x17b/0x500 [ 1363.013624] __alloc_pages+0x131/0x4e0 [ 1363.014404] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1363.015643] ? __lock_acquire+0xbac/0x5b70 [ 1363.016505] ? mark_lock+0xfc/0x2e10 [ 1363.017253] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1363.018384] alloc_pages_vma+0xde/0x500 [ 1363.019236] __handle_mm_fault+0xfb3/0x3570 [ 1363.020260] ? lock_is_held_type+0xd7/0x130 [ 1363.021191] ? __pmd_alloc+0x680/0x680 [ 1363.022029] handle_mm_fault+0x2e6/0xa20 [ 1363.022871] do_user_addr_fault+0x54a/0x12a0 [ 1363.023790] exc_page_fault+0xa2/0x1a0 [ 1363.024578] asm_exc_page_fault+0x1e/0x30 [ 1363.025421] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1363.026515] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1363.030198] RSP: 0018:ffff8880356479f0 EFLAGS: 00050246 [ 1363.031292] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1363.032729] RDX: 0000000000000000 RSI: ffff88801f2e2000 RDI: 000000002000a000 [ 1363.034158] RBP: 000000002000a000 R08: 0000000000000000 R09: ffff88801f2e2fff [ 1363.035593] R10: ffffed1003e5c5ff R11: 0000000000000001 R12: ffff88801f2e2000 [ 1363.037010] R13: 000000002000b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1363.038452] copyout.part.0+0xdf/0x110 [ 1363.039286] copy_page_to_iter+0x248/0xdd0 [ 1363.040174] filemap_read+0x4ff/0xbb0 [ 1363.040969] ? filemap_get_pages+0x1c90/0x1c90 [ 1363.041919] ? lock_acquire+0x1b2/0x4d0 [ 1363.042731] generic_file_read_iter+0x3cf/0x540 [ 1363.043713] ext4_file_read_iter+0x184/0x490 [ 1363.044613] new_sync_read+0x427/0x6f0 [ 1363.045392] ? __ia32_sys_llseek+0x380/0x380 [ 1363.046439] ? security_file_permission+0xb1/0xd0 [ 1363.047713] vfs_read+0x356/0x5f0 [ 1363.048606] ksys_read+0x12d/0x250 [ 1363.049503] ? __ia32_sys_pwrite64+0x230/0x230 [ 1363.050657] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.051981] do_syscall_64+0x3b/0x90 [ 1363.052834] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1363.053873] RIP: 0033:0x7fa9c71a5b19 [ 1363.054616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.058296] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1363.059842] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1363.061266] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1363.062691] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.064128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.065565] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1363.067025] [ 1363.069307] FAULT_INJECTION: forcing a failure. 03:11:32 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(0x0, 0x4000) [ 1363.069307] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1363.071979] CPU: 1 PID: 9133 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1363.073652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1363.075926] Call Trace: [ 1363.076432] [ 1363.076887] dump_stack_lvl+0x8b/0xb3 [ 1363.077678] should_fail.cold+0x5/0xa [ 1363.078457] prepare_alloc_pages+0x17b/0x500 [ 1363.079365] __alloc_pages+0x131/0x4e0 [ 1363.080153] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1363.081358] ? __lock_acquire+0xbac/0x5b70 [ 1363.082237] ? mark_lock+0xfc/0x2e10 [ 1363.082990] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1363.084124] alloc_pages_vma+0xde/0x500 [ 1363.084945] __handle_mm_fault+0xfb3/0x3570 [ 1363.085830] ? lock_is_held_type+0xd7/0x130 [ 1363.086720] ? __pmd_alloc+0x680/0x680 [ 1363.087558] handle_mm_fault+0x2e6/0xa20 [ 1363.088408] do_user_addr_fault+0x54a/0x12a0 [ 1363.089312] exc_page_fault+0xa2/0x1a0 [ 1363.090104] asm_exc_page_fault+0x1e/0x30 [ 1363.090943] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1363.092054] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1363.095741] RSP: 0018:ffff8880403ef9f0 EFLAGS: 00050246 [ 1363.096813] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1363.098227] RDX: 0000000000000000 RSI: ffff88801f312000 RDI: 0000000020014000 [ 1363.099673] RBP: 0000000020014000 R08: 0000000000000000 R09: ffff88801f312fff [ 1363.101089] R10: ffffed1003e625ff R11: 0000000000000001 R12: ffff88801f312000 [ 1363.102512] R13: 0000000020015000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1363.103989] copyout.part.0+0xdf/0x110 [ 1363.104795] copy_page_to_iter+0x248/0xdd0 [ 1363.105689] filemap_read+0x4ff/0xbb0 [ 1363.106470] ? filemap_get_pages+0x1c90/0x1c90 [ 1363.107432] ? lock_acquire+0x1b2/0x4d0 [ 1363.108247] generic_file_read_iter+0x3cf/0x540 [ 1363.109199] ext4_file_read_iter+0x184/0x490 [ 1363.110109] new_sync_read+0x427/0x6f0 [ 1363.110899] ? __ia32_sys_llseek+0x380/0x380 [ 1363.111832] ? security_file_permission+0xb1/0xd0 [ 1363.112821] vfs_read+0x356/0x5f0 [ 1363.113525] ksys_read+0x12d/0x250 [ 1363.114247] ? __ia32_sys_pwrite64+0x230/0x230 [ 1363.115196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.116242] do_syscall_64+0x3b/0x90 [ 1363.117013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1363.118043] RIP: 0033:0x7f0ad231ab19 [ 1363.118788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.122467] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1363.124021] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1363.125462] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1363.126917] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.128350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.129792] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1363.131248] 03:11:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 39) 03:11:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3c, 0x0, 0x4) 03:11:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3e, 0x0, 0x4) 03:11:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x16, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1363.238293] FAULT_INJECTION: forcing a failure. [ 1363.238293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1363.240676] CPU: 0 PID: 9146 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1363.242265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1363.244449] Call Trace: [ 1363.244946] [ 1363.245377] dump_stack_lvl+0x8b/0xb3 [ 1363.246138] should_fail.cold+0x5/0xa [ 1363.246897] prepare_alloc_pages+0x17b/0x500 [ 1363.247776] __alloc_pages+0x131/0x4e0 [ 1363.248536] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1363.249717] ? __lock_acquire+0xbac/0x5b70 [ 1363.250650] ? mark_lock+0xfc/0x2e10 [ 1363.251485] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1363.252702] alloc_pages_vma+0xde/0x500 [ 1363.253580] __handle_mm_fault+0xfb3/0x3570 [ 1363.254543] ? lock_is_held_type+0xd7/0x130 [ 1363.255489] ? __pmd_alloc+0x680/0x680 [ 1363.256393] handle_mm_fault+0x2e6/0xa20 [ 1363.257302] do_user_addr_fault+0x54a/0x12a0 [ 1363.258288] exc_page_fault+0xa2/0x1a0 [ 1363.259151] asm_exc_page_fault+0x1e/0x30 [ 1363.260057] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1363.261244] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1363.265234] RSP: 0018:ffff88800d0279f0 EFLAGS: 00050246 [ 1363.266379] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1363.267925] RDX: 0000000000000000 RSI: ffff88801f311000 RDI: 0000000020013000 [ 1363.269462] RBP: 0000000020013000 R08: 0000000000000000 R09: ffff88801f311fff [ 1363.270992] R10: ffffed1003e623ff R11: 0000000000000001 R12: ffff88801f311000 [ 1363.272532] R13: 0000000020014000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1363.274100] copyout.part.0+0xdf/0x110 [ 1363.274965] copy_page_to_iter+0x248/0xdd0 [ 1363.275946] filemap_read+0x4ff/0xbb0 [ 1363.276804] ? filemap_get_pages+0x1c90/0x1c90 [ 1363.277831] ? lock_acquire+0x1b2/0x4d0 [ 1363.278707] generic_file_read_iter+0x3cf/0x540 [ 1363.279741] ext4_file_read_iter+0x184/0x490 [ 1363.280710] new_sync_read+0x427/0x6f0 [ 1363.281565] ? __ia32_sys_llseek+0x380/0x380 [ 1363.282555] ? security_file_permission+0xb1/0xd0 [ 1363.283639] vfs_read+0x356/0x5f0 [ 1363.284409] ksys_read+0x12d/0x250 [ 1363.285187] ? __ia32_sys_pwrite64+0x230/0x230 [ 1363.286192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.287331] do_syscall_64+0x3b/0x90 [ 1363.288156] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1363.289268] RIP: 0033:0x7f63a2e8eb19 [ 1363.290071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.294024] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1363.295665] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1363.297198] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1363.298739] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.300293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.301834] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1363.303410] 03:11:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x41, 0x0, 0x4) 03:11:32 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(0x0, 0x4000) 03:11:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x17, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:11:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 42) 03:11:48 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:11:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3d, 0x0, 0x4) 03:11:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x42, 0x0, 0x4) 03:11:48 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 22) [ 1379.322686] FAULT_INJECTION: forcing a failure. [ 1379.322686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1379.325045] CPU: 0 PID: 9167 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1379.325407] FAULT_INJECTION: forcing a failure. [ 1379.325407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1379.326658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1379.326676] Call Trace: [ 1379.326684] [ 1379.326693] dump_stack_lvl+0x8b/0xb3 [ 1379.332815] should_fail.cold+0x5/0xa [ 1379.333589] copy_page_to_iter+0x217/0xdd0 [ 1379.334461] filemap_read+0x4ff/0xbb0 [ 1379.335246] ? filemap_get_pages+0x1c90/0x1c90 [ 1379.336184] ? lock_acquire+0x1b2/0x4d0 [ 1379.336983] generic_file_read_iter+0x3cf/0x540 [ 1379.337917] ext4_file_read_iter+0x184/0x490 [ 1379.338803] new_sync_read+0x427/0x6f0 [ 1379.339603] ? __ia32_sys_llseek+0x380/0x380 [ 1379.340498] ? security_file_permission+0xb1/0xd0 [ 1379.341462] vfs_read+0x356/0x5f0 [ 1379.342161] ksys_read+0x12d/0x250 [ 1379.342872] ? __ia32_sys_pwrite64+0x230/0x230 [ 1379.343806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1379.344833] do_syscall_64+0x3b/0x90 [ 1379.345581] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1379.346589] RIP: 0033:0x7f0ad231ab19 [ 1379.347311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.350907] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1379.352401] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1379.353800] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1379.355238] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1379.356680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1379.358102] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1379.359573] [ 1379.360081] CPU: 1 PID: 9168 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1379.361746] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1379.364020] Call Trace: [ 1379.364536] [ 1379.364975] dump_stack_lvl+0x8b/0xb3 [ 1379.365742] should_fail.cold+0x5/0xa [ 1379.366512] copy_page_to_iter+0x217/0xdd0 [ 1379.367408] filemap_read+0x4ff/0xbb0 [ 1379.368185] ? filemap_get_pages+0x1c90/0x1c90 [ 1379.369114] ? lock_acquire+0x1b2/0x4d0 [ 1379.369912] generic_file_read_iter+0x3cf/0x540 [ 1379.370841] ext4_file_read_iter+0x184/0x490 [ 1379.371731] new_sync_read+0x427/0x6f0 [ 1379.372510] ? __ia32_sys_llseek+0x380/0x380 [ 1379.373410] ? security_file_permission+0xb1/0xd0 [ 1379.374379] vfs_read+0x356/0x5f0 [ 1379.375076] ksys_read+0x12d/0x250 [ 1379.375793] ? __ia32_sys_pwrite64+0x230/0x230 [ 1379.376704] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1379.377726] do_syscall_64+0x3b/0x90 [ 1379.378480] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1379.379517] RIP: 0033:0x7fa9c71a5b19 [ 1379.380243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.383865] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1379.385346] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1379.386735] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1379.388140] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1379.389531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:11:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x18, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:11:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 40) 03:11:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x14, 0x0, &(0x7f0000000000)=[@increfs={0x40046304, 0x3}, @free_buffer], 0x14, 0x0, &(0x7f0000000040)="0f34a8246da7c5c7afaaaea7fb2ef7188d4ac3c6"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1379.390921] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1379.392515] [ 1379.425705] FAULT_INJECTION: forcing a failure. [ 1379.425705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1379.428046] CPU: 1 PID: 9178 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1379.429672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1379.431893] Call Trace: [ 1379.432404] [ 1379.432849] dump_stack_lvl+0x8b/0xb3 [ 1379.433625] should_fail.cold+0x5/0xa [ 1379.434389] copy_page_to_iter+0x217/0xdd0 [ 1379.435255] filemap_read+0x4ff/0xbb0 [ 1379.436047] ? filemap_get_pages+0x1c90/0x1c90 [ 1379.436969] ? lock_acquire+0x1b2/0x4d0 [ 1379.437760] generic_file_read_iter+0x3cf/0x540 [ 1379.438683] ext4_file_read_iter+0x184/0x490 [ 1379.439566] new_sync_read+0x427/0x6f0 [ 1379.440334] ? __ia32_sys_llseek+0x380/0x380 [ 1379.441223] ? security_file_permission+0xb1/0xd0 [ 1379.442183] vfs_read+0x356/0x5f0 03:11:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3e, 0x0, 0x4) [ 1379.442878] ksys_read+0x12d/0x250 [ 1379.443757] ? __ia32_sys_pwrite64+0x230/0x230 [ 1379.444661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1379.445682] do_syscall_64+0x3b/0x90 [ 1379.446427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1379.447455] RIP: 0033:0x7f63a2e8eb19 [ 1379.448179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1379.451784] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1379.453262] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1379.454646] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1379.456028] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1379.457403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1379.458785] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1379.460204] [ 1379.598757] Process accounting paused 03:12:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x19, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:04 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 23) 03:12:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 41) 03:12:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, 0x0, 0xffffff57) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@local, @broadcast, 0x0, 0xc, [@broadcast, @loopback, @loopback, @dev={0xac, 0x14, 0x14, 0x3c}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @empty, @local, @broadcast, @remote, @dev={0xac, 0x14, 0x14, 0x1b}]}, 0x40) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f00000001c0)) r3 = accept(r0, &(0x7f0000000000)=@isdn, &(0x7f00000000c0)=0x80) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000180)=ANY=[@ANYBLOB="2b043d740066af005a7f478b0862b800000000000000000000000000d9d56294c35a6f38000101fe80000000"], 0x28) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x200, 0x8a) 03:12:04 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:12:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x43, 0x0, 0x4) 03:12:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 43) [ 1395.914982] FAULT_INJECTION: forcing a failure. [ 1395.914982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1395.917513] CPU: 0 PID: 9199 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1395.919266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1395.921676] Call Trace: [ 1395.922223] [ 1395.922699] dump_stack_lvl+0x8b/0xb3 [ 1395.923542] should_fail.cold+0x5/0xa 03:12:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x41, 0x0, 0x4) [ 1395.924403] prepare_alloc_pages+0x17b/0x500 [ 1395.925465] __alloc_pages+0x131/0x4e0 [ 1395.926024] FAULT_INJECTION: forcing a failure. [ 1395.926024] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1395.926294] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1395.928768] ? __lock_acquire+0xbac/0x5b70 [ 1395.929676] ? mark_lock+0xfc/0x2e10 [ 1395.930468] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1395.931661] alloc_pages_vma+0xde/0x500 [ 1395.932532] __handle_mm_fault+0xfb3/0x3570 [ 1395.933466] ? lock_is_held_type+0xd7/0x130 [ 1395.934380] ? __pmd_alloc+0x680/0x680 [ 1395.935260] handle_mm_fault+0x2e6/0xa20 [ 1395.936155] do_user_addr_fault+0x54a/0x12a0 [ 1395.937113] exc_page_fault+0xa2/0x1a0 [ 1395.937944] asm_exc_page_fault+0x1e/0x30 [ 1395.938818] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1395.940008] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1395.943896] RSP: 0018:ffff88804076f9f0 EFLAGS: 00050246 [ 1395.945016] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1395.946510] RDX: 0000000000000000 RSI: ffff88801f30e000 RDI: 0000000020015000 [ 1395.948028] RBP: 0000000020015000 R08: 0000000000000000 R09: ffff88801f30efff [ 1395.949514] R10: ffffed1003e61dff R11: 0000000000000001 R12: ffff88801f30e000 [ 1395.951028] R13: 0000000020016000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1395.952585] copyout.part.0+0xdf/0x110 [ 1395.953436] copy_page_to_iter+0x248/0xdd0 [ 1395.954375] filemap_read+0x4ff/0xbb0 [ 1395.955219] ? filemap_get_pages+0x1c90/0x1c90 [ 1395.956230] ? lock_acquire+0x1b2/0x4d0 [ 1395.957091] generic_file_read_iter+0x3cf/0x540 [ 1395.958098] ext4_file_read_iter+0x184/0x490 [ 1395.959059] new_sync_read+0x427/0x6f0 [ 1395.959899] ? __ia32_sys_llseek+0x380/0x380 [ 1395.960866] ? security_file_permission+0xb1/0xd0 [ 1395.961910] vfs_read+0x356/0x5f0 [ 1395.962665] ksys_read+0x12d/0x250 [ 1395.963429] ? __ia32_sys_pwrite64+0x230/0x230 [ 1395.964433] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1395.965544] do_syscall_64+0x3b/0x90 [ 1395.966362] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1395.967454] RIP: 0033:0x7f0ad231ab19 [ 1395.968242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.972111] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1395.973708] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1395.975213] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1395.976731] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1395.978232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1395.979749] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1395.981280] [ 1395.981771] CPU: 1 PID: 9205 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1395.982664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1395.983851] Call Trace: [ 1395.984119] [ 1395.984421] dump_stack_lvl+0x8b/0xb3 [ 1395.984831] should_fail.cold+0x5/0xa [ 1395.985232] prepare_alloc_pages+0x17b/0x500 [ 1395.985696] __alloc_pages+0x131/0x4e0 [ 1395.986099] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1395.986725] ? __lock_acquire+0xbac/0x5b70 [ 1395.987168] ? mark_lock+0xfc/0x2e10 [ 1395.987552] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1395.988144] alloc_pages_vma+0xde/0x500 [ 1395.988575] __handle_mm_fault+0xfb3/0x3570 [ 1395.989036] ? lock_is_held_type+0xd7/0x130 [ 1395.989484] ? __pmd_alloc+0x680/0x680 [ 1395.989918] handle_mm_fault+0x2e6/0xa20 [ 1395.990360] do_user_addr_fault+0x54a/0x12a0 [ 1395.990835] exc_page_fault+0xa2/0x1a0 [ 1395.991253] asm_exc_page_fault+0x1e/0x30 [ 1395.991689] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1395.992259] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1395.994166] RSP: 0018:ffff8880357bf9f0 EFLAGS: 00050246 [ 1395.994711] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1395.995436] RDX: 0000000000000000 RSI: ffff88801f312000 RDI: 0000000020014000 [ 1395.996177] RBP: 0000000020014000 R08: 0000000000000000 R09: ffff88801f312fff [ 1395.996894] R10: ffffed1003e625ff R11: 0000000000000001 R12: ffff88801f312000 [ 1395.997660] R13: 0000000020015000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1395.998404] copyout.part.0+0xdf/0x110 [ 1395.998820] copy_page_to_iter+0x248/0xdd0 [ 1395.999276] filemap_read+0x4ff/0xbb0 [ 1395.999697] ? filemap_get_pages+0x1c90/0x1c90 [ 1396.000183] ? lock_acquire+0x1b2/0x4d0 [ 1396.000605] generic_file_read_iter+0x3cf/0x540 [ 1396.001108] ext4_file_read_iter+0x184/0x490 [ 1396.001572] new_sync_read+0x427/0x6f0 [ 1396.001969] ? __ia32_sys_llseek+0x380/0x380 [ 1396.002439] ? security_file_permission+0xb1/0xd0 [ 1396.002946] vfs_read+0x356/0x5f0 [ 1396.003307] ksys_read+0x12d/0x250 [ 1396.003687] ? __ia32_sys_pwrite64+0x230/0x230 [ 1396.004167] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.004707] do_syscall_64+0x3b/0x90 [ 1396.005095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1396.005632] RIP: 0033:0x7f63a2e8eb19 [ 1396.006017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.007879] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.008649] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1396.009370] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1396.010096] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.010822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.011543] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1396.012295] [ 1396.019865] FAULT_INJECTION: forcing a failure. [ 1396.019865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1396.022361] CPU: 0 PID: 9201 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1396.024077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1396.026421] Call Trace: [ 1396.026955] [ 1396.027419] dump_stack_lvl+0x8b/0xb3 [ 1396.028239] should_fail.cold+0x5/0xa [ 1396.029051] prepare_alloc_pages+0x17b/0x500 [ 1396.029993] __alloc_pages+0x131/0x4e0 [ 1396.030827] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1396.032132] ? __lock_acquire+0xbac/0x5b70 [ 1396.033052] ? mark_lock+0xfc/0x2e10 [ 1396.033848] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1396.035214] alloc_pages_vma+0xde/0x500 [ 1396.036080] __handle_mm_fault+0xfb3/0x3570 [ 1396.037021] ? lock_is_held_type+0xd7/0x130 [ 1396.037928] ? __pmd_alloc+0x680/0x680 [ 1396.038809] handle_mm_fault+0x2e6/0xa20 [ 1396.039693] do_user_addr_fault+0x54a/0x12a0 [ 1396.040651] exc_page_fault+0xa2/0x1a0 [ 1396.041471] asm_exc_page_fault+0x1e/0x30 [ 1396.042346] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1396.043490] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1396.047321] RSP: 0018:ffff8880407679f0 EFLAGS: 00050246 [ 1396.048436] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1396.049913] RDX: 0000000000000000 RSI: ffff88801f301000 RDI: 000000002000b000 [ 1396.051392] RBP: 000000002000b000 R08: 0000000000000000 R09: ffff88801f301fff [ 1396.052900] R10: ffffed1003e603ff R11: 0000000000000001 R12: ffff88801f301000 [ 1396.054380] R13: 000000002000c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1396.055897] copyout.part.0+0xdf/0x110 [ 1396.056733] copy_page_to_iter+0x248/0xdd0 [ 1396.057662] filemap_read+0x4ff/0xbb0 [ 1396.058494] ? filemap_get_pages+0x1c90/0x1c90 [ 1396.059488] ? lock_acquire+0x1b2/0x4d0 [ 1396.060359] generic_file_read_iter+0x3cf/0x540 [ 1396.061359] ext4_file_read_iter+0x184/0x490 [ 1396.062305] new_sync_read+0x427/0x6f0 [ 1396.063137] ? __ia32_sys_llseek+0x380/0x380 [ 1396.064105] ? security_file_permission+0xb1/0xd0 [ 1396.065138] vfs_read+0x356/0x5f0 [ 1396.065887] ksys_read+0x12d/0x250 [ 1396.066644] ? __ia32_sys_pwrite64+0x230/0x230 [ 1396.067619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.068741] do_syscall_64+0x3b/0x90 [ 1396.069546] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1396.070633] RIP: 0033:0x7fa9c71a5b19 [ 1396.071412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.075271] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.076878] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1396.078387] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1396.079937] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.081498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.083054] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1396.084648] 03:12:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x44, 0x0, 0x4) 03:12:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3e, 0x0, 0x4) 03:12:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x42, 0x0, 0x4) 03:12:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x45, 0x0, 0x4) 03:12:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 42) 03:12:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x14, 0x0, &(0x7f0000000000)=[@increfs={0x40046304, 0x3}, @free_buffer], 0x14, 0x0, &(0x7f0000000040)="0f34a8246da7c5c7afaaaea7fb2ef7188d4ac3c6"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:12:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 44) [ 1396.254009] FAULT_INJECTION: forcing a failure. [ 1396.254009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1396.256004] CPU: 1 PID: 9226 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1396.256873] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1396.258097] Call Trace: [ 1396.258364] [ 1396.258598] dump_stack_lvl+0x8b/0xb3 [ 1396.259009] should_fail.cold+0x5/0xa [ 1396.259413] copy_page_to_iter+0x217/0xdd0 [ 1396.259876] filemap_read+0x4ff/0xbb0 [ 1396.260295] ? filemap_get_pages+0x1c90/0x1c90 [ 1396.260795] ? lock_acquire+0x1b2/0x4d0 [ 1396.261221] generic_file_read_iter+0x3cf/0x540 [ 1396.261712] ext4_file_read_iter+0x184/0x490 [ 1396.262190] new_sync_read+0x427/0x6f0 [ 1396.262599] ? __ia32_sys_llseek+0x380/0x380 [ 1396.263068] ? security_file_permission+0xb1/0xd0 [ 1396.263577] vfs_read+0x356/0x5f0 [ 1396.263955] ksys_read+0x12d/0x250 [ 1396.264347] ? __ia32_sys_pwrite64+0x230/0x230 [ 1396.264838] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.265397] do_syscall_64+0x3b/0x90 [ 1396.265815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1396.266373] RIP: 0033:0x7f63a2e8eb19 [ 1396.266777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.268777] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.269608] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1396.270379] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1396.271148] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.271940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.272711] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1396.273478] [ 1396.347730] FAULT_INJECTION: forcing a failure. [ 1396.347730] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1396.350237] CPU: 0 PID: 9231 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1396.351974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1396.354331] Call Trace: [ 1396.354865] [ 1396.355333] dump_stack_lvl+0x8b/0xb3 [ 1396.356162] should_fail.cold+0x5/0xa [ 1396.356976] copy_page_to_iter+0x217/0xdd0 [ 1396.357898] filemap_read+0x4ff/0xbb0 [ 1396.358722] ? filemap_get_pages+0x1c90/0x1c90 [ 1396.359722] ? lock_acquire+0x1b2/0x4d0 [ 1396.360566] generic_file_read_iter+0x3cf/0x540 [ 1396.361553] ext4_file_read_iter+0x184/0x490 [ 1396.362488] new_sync_read+0x427/0x6f0 [ 1396.363308] ? __ia32_sys_llseek+0x380/0x380 [ 1396.364265] ? security_file_permission+0xb1/0xd0 [ 1396.365290] vfs_read+0x356/0x5f0 [ 1396.366031] ksys_read+0x12d/0x250 [ 1396.366780] ? __ia32_sys_pwrite64+0x230/0x230 [ 1396.367752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.368841] do_syscall_64+0x3b/0x90 [ 1396.369637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1396.370712] RIP: 0033:0x7f0ad231ab19 [ 1396.371483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.375309] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.376894] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1396.378376] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1396.379869] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1396.381352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.382846] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1396.384381] [ 1412.478918] FAULT_INJECTION: forcing a failure. [ 1412.478918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1412.480262] CPU: 1 PID: 9250 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1412.481136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1412.482307] Call Trace: [ 1412.482579] [ 1412.482813] dump_stack_lvl+0x8b/0xb3 [ 1412.483233] should_fail.cold+0x5/0xa 03:12:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f00000000c0)={{r1}, "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"}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000010c0)='./file0\x00', 0x1, 0x4, &(0x7f0000001300)=[{&(0x7f0000001100)="bc790eaa6c00bb77ec2a578209a1857ea33236e8989a197c1f1f0db9cf354b2d824ed869a255e6be88482bc06bcc5529d5", 0x31, 0xd5}, {&(0x7f0000001140)="8d6595150064c4b74a", 0x9, 0x2}, {&(0x7f0000001180)="708479139d0112cd1fbd4f825022149f1fbdd2067f8c372374e7011cf1d06fafd1332a1b42fef7e12790ce0ad40c94d74370bd3bbbba73b5f4361b306daa328fcf6d9b6bc87c9c4335d1ea0139d670a5e3829c7e869144a6a11346e765441eec7233f594e09acd3e05cb16715cc33fa0", 0x70, 0x1}, {&(0x7f0000001200)="e6d5f86c67b0e525bee99e8d486b8c8821411323badb2a9c92a3b3b8bddfb07c3f13a9ddba6a7d6ce0f66d1b38beb9011a965ba485606ef8c4528b9bbaf507a479969a8704f6f1dfb1ff71487a5ada6f525fd2e6d8c72acd043a4a3d2bc164b7c55c37d247cf0173b9faa39f2138d27fc083527175172f54ec0d9d567aa939904da0deaed652dbf95ea6e6bda7e694c7a3f2ae3fd339c7e942d69374698bb6e2259b371ceb9fe60f039f7a914e8a5e3ac90991239cf9d18dab1cc37e7e047876aab5321220d5753865322e2927d6cf87e1ef0279b1169cbc1d48188c7092b353d97e761494c1cec2e280292acad8beb3927443550494e7d8", 0xf8, 0x6}], 0xc800, &(0x7f0000001380)={[{@nodots}, {@nodots}, {@dots}, {@dots}, {@nodots}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, '{@\'^[[-{$\x9e@,#*!'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@euid_lt}, {@subj_type={'subj_type', 0x3d, '{]:@'}}, {@uid_gt}]}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x800000) [ 1412.483958] copy_page_to_iter+0x217/0xdd0 [ 1412.484558] filemap_read+0x4ff/0xbb0 [ 1412.485015] ? filemap_get_pages+0x1c90/0x1c90 [ 1412.485513] ? lock_acquire+0x1b2/0x4d0 [ 1412.485938] generic_file_read_iter+0x3cf/0x540 [ 1412.486448] ext4_file_read_iter+0x184/0x490 [ 1412.486938] new_sync_read+0x427/0x6f0 [ 1412.487346] ? __ia32_sys_llseek+0x380/0x380 [ 1412.487820] ? security_file_permission+0xb1/0xd0 [ 1412.488354] vfs_read+0x356/0x5f0 [ 1412.488736] ksys_read+0x12d/0x250 [ 1412.489128] ? __ia32_sys_pwrite64+0x230/0x230 [ 1412.489624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.490181] do_syscall_64+0x3b/0x90 [ 1412.490604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1412.491147] RIP: 0033:0x7fa9c71a5b19 [ 1412.491547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.493514] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1412.494324] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 03:12:21 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:12:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x43, 0x0, 0x4) 03:12:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 43) 03:12:21 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x46, 0x0, 0x4) 03:12:21 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 24) 03:12:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 45) [ 1412.495105] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1412.496054] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.496821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.497580] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1412.498370] [ 1412.514079] FAULT_INJECTION: forcing a failure. [ 1412.514079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1412.514536] FAULT_INJECTION: forcing a failure. [ 1412.514536] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1412.516766] CPU: 0 PID: 9255 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1412.516799] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1412.522283] Call Trace: [ 1412.522843] [ 1412.523328] dump_stack_lvl+0x8b/0xb3 [ 1412.524195] should_fail.cold+0x5/0xa [ 1412.525039] prepare_alloc_pages+0x17b/0x500 [ 1412.526009] __alloc_pages+0x131/0x4e0 [ 1412.526862] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1412.528188] ? __lock_acquire+0xbac/0x5b70 [ 1412.529131] ? mark_lock+0xfc/0x2e10 [ 1412.529943] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1412.531150] alloc_pages_vma+0xde/0x500 [ 1412.532042] __handle_mm_fault+0xfb3/0x3570 [ 1412.533017] ? lock_is_held_type+0xd7/0x130 [ 1412.533959] ? __pmd_alloc+0x680/0x680 [ 1412.534860] handle_mm_fault+0x2e6/0xa20 [ 1412.535766] do_user_addr_fault+0x54a/0x12a0 [ 1412.536758] exc_page_fault+0xa2/0x1a0 [ 1412.537614] asm_exc_page_fault+0x1e/0x30 [ 1412.538511] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1412.539692] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1412.543668] RSP: 0018:ffff88803572f9f0 EFLAGS: 00050246 [ 1412.544809] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1412.546325] RDX: 0000000000000000 RSI: ffff88801f30e000 RDI: 0000000020015000 [ 1412.547843] RBP: 0000000020015000 R08: 0000000000000000 R09: ffff88801f30efff [ 1412.549368] R10: ffffed1003e61dff R11: 0000000000000001 R12: ffff88801f30e000 [ 1412.550887] R13: 0000000020016000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1412.552452] copyout.part.0+0xdf/0x110 [ 1412.553306] copy_page_to_iter+0x248/0xdd0 [ 1412.554255] filemap_read+0x4ff/0xbb0 [ 1412.555100] ? filemap_get_pages+0x1c90/0x1c90 [ 1412.556121] ? lock_acquire+0x1b2/0x4d0 [ 1412.556984] generic_file_read_iter+0x3cf/0x540 [ 1412.557995] ext4_file_read_iter+0x184/0x490 [ 1412.558961] new_sync_read+0x427/0x6f0 [ 1412.559801] ? __ia32_sys_llseek+0x380/0x380 [ 1412.560800] ? security_file_permission+0xb1/0xd0 [ 1412.561854] vfs_read+0x356/0x5f0 [ 1412.562607] ksys_read+0x12d/0x250 [ 1412.563368] ? __ia32_sys_pwrite64+0x230/0x230 [ 1412.564357] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.565463] do_syscall_64+0x3b/0x90 [ 1412.566265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1412.567355] RIP: 0033:0x7f63a2e8eb19 [ 1412.568158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.572039] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1412.573642] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1412.575155] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1412.576667] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.578167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.579665] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1412.581206] [ 1412.581698] CPU: 1 PID: 9254 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1412.582610] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1412.583809] Call Trace: [ 1412.584093] [ 1412.584339] dump_stack_lvl+0x8b/0xb3 [ 1412.584767] should_fail.cold+0x5/0xa [ 1412.585187] prepare_alloc_pages+0x17b/0x500 [ 1412.585675] __alloc_pages+0x131/0x4e0 [ 1412.586101] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1412.586747] ? __lock_acquire+0xbac/0x5b70 [ 1412.587203] ? mark_lock+0xfc/0x2e10 [ 1412.587606] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1412.588203] alloc_pages_vma+0xde/0x500 [ 1412.588642] __handle_mm_fault+0xfb3/0x3570 [ 1412.589121] ? lock_is_held_type+0xd7/0x130 [ 1412.589593] ? __pmd_alloc+0x680/0x680 [ 1412.590049] handle_mm_fault+0x2e6/0xa20 [ 1412.590499] do_user_addr_fault+0x54a/0x12a0 [ 1412.590986] exc_page_fault+0xa2/0x1a0 [ 1412.591409] asm_exc_page_fault+0x1e/0x30 [ 1412.591860] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1412.592461] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1412.594436] RSP: 0018:ffff8880419279f0 EFLAGS: 00050246 [ 1412.595010] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1412.595774] RDX: 0000000000000000 RSI: ffff88801f310000 RDI: 0000000020016000 [ 1412.596556] RBP: 0000000020016000 R08: 0000000000000000 R09: ffff88801f310fff [ 1412.597316] R10: ffffed1003e621ff R11: 0000000000000001 R12: ffff88801f310000 [ 1412.598075] R13: 0000000020017000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1412.598858] copyout.part.0+0xdf/0x110 [ 1412.599289] copy_page_to_iter+0x248/0xdd0 [ 1412.599762] filemap_read+0x4ff/0xbb0 [ 1412.600199] ? filemap_get_pages+0x1c90/0x1c90 [ 1412.600701] ? lock_acquire+0x1b2/0x4d0 [ 1412.601138] generic_file_read_iter+0x3cf/0x540 [ 1412.601638] ext4_file_read_iter+0x184/0x490 [ 1412.602123] new_sync_read+0x427/0x6f0 [ 1412.602548] ? __ia32_sys_llseek+0x380/0x380 [ 1412.603029] ? security_file_permission+0xb1/0xd0 [ 1412.603555] vfs_read+0x356/0x5f0 [ 1412.603955] ksys_read+0x12d/0x250 [ 1412.604342] ? __ia32_sys_pwrite64+0x230/0x230 [ 1412.604839] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.605392] do_syscall_64+0x3b/0x90 [ 1412.605797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1412.606346] RIP: 0033:0x7f0ad231ab19 [ 1412.606738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.608686] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1412.609506] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1412.610262] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1412.611022] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.611778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.612553] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1412.613332] 03:12:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x44, 0x0, 0x4) 03:12:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x47, 0x0, 0x4) 03:12:21 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:21 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3d, 0x0, 0x4) 03:12:21 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 25) 03:12:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x48, 0x0, 0x4) 03:12:21 executing program 4: read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@phonet, &(0x7f00000000c0)=0x80) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x801) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x1, &(0x7f0000001240)=[&(0x7f0000001200)={0x0, 0x0, 0x0, 0x1, 0x5, r1, &(0x7f0000000200)="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", 0x1000, 0x2, 0x0, 0x3}]) mknodat$null(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4, 0x103) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000012c0)=0x1) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000140)={{}, 0x1, &(0x7f0000000100)=[0x4948], 0x6, 0x2, [0xfffffffc, 0x7, 0x20, 0x2007fff]}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_QUOTA_CTL(r2, 0xc0109428, &(0x7f0000001280)={0x2, 0x9}) [ 1412.846753] FAULT_INJECTION: forcing a failure. [ 1412.846753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1412.849434] CPU: 0 PID: 9274 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1412.851119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1412.853475] Call Trace: [ 1412.854005] [ 1412.854472] dump_stack_lvl+0x8b/0xb3 [ 1412.855286] should_fail.cold+0x5/0xa [ 1412.856103] prepare_alloc_pages+0x17b/0x500 [ 1412.857025] __alloc_pages+0x131/0x4e0 [ 1412.857837] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1412.859073] ? __lock_acquire+0xbac/0x5b70 [ 1412.859987] ? mark_lock+0xfc/0x2e10 [ 1412.860763] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1412.861912] alloc_pages_vma+0xde/0x500 [ 1412.862755] __handle_mm_fault+0xfb3/0x3570 [ 1412.863671] ? lock_is_held_type+0xd7/0x130 [ 1412.864580] ? __pmd_alloc+0x680/0x680 [ 1412.865438] handle_mm_fault+0x2e6/0xa20 [ 1412.866304] do_user_addr_fault+0x54a/0x12a0 [ 1412.867248] exc_page_fault+0xa2/0x1a0 [ 1412.868070] asm_exc_page_fault+0x1e/0x30 [ 1412.868925] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1412.870044] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1412.873799] RSP: 0018:ffff8880455879f0 EFLAGS: 00050246 [ 1412.874882] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1412.876352] RDX: 0000000000000000 RSI: ffff88801f2f5000 RDI: 000000002000c000 [ 1412.877811] RBP: 000000002000c000 R08: 0000000000000000 R09: ffff88801f2f5fff [ 1412.879266] R10: ffffed1003e5ebff R11: 0000000000000001 R12: ffff88801f2f5000 [ 1412.880745] R13: 000000002000d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1412.882227] copyout.part.0+0xdf/0x110 [ 1412.883037] copy_page_to_iter+0x248/0xdd0 [ 1412.883946] filemap_read+0x4ff/0xbb0 [ 1412.884753] ? filemap_get_pages+0x1c90/0x1c90 [ 1412.885707] ? lock_acquire+0x1b2/0x4d0 [ 1412.886529] generic_file_read_iter+0x3cf/0x540 [ 1412.887495] ext4_file_read_iter+0x184/0x490 [ 1412.888415] new_sync_read+0x427/0x6f0 [ 1412.889212] ? __ia32_sys_llseek+0x380/0x380 [ 1412.890136] ? security_file_permission+0xb1/0xd0 [ 1412.891140] vfs_read+0x356/0x5f0 [ 1412.891858] ksys_read+0x12d/0x250 [ 1412.892604] ? __ia32_sys_pwrite64+0x230/0x230 [ 1412.893547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.894603] do_syscall_64+0x3b/0x90 [ 1412.895370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1412.896430] RIP: 0033:0x7fa9c71a5b19 [ 1412.897176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.900889] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1412.902419] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1412.903855] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1412.905429] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.906991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.908418] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1412.909869] 03:12:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 44) 03:12:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x45, 0x0, 0x4) [ 1412.947080] FAULT_INJECTION: forcing a failure. [ 1412.947080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1412.949708] CPU: 0 PID: 9279 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1412.951536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1412.954048] Call Trace: [ 1412.954624] [ 1412.955117] dump_stack_lvl+0x8b/0xb3 [ 1412.955989] should_fail.cold+0x5/0xa [ 1412.956841] copy_page_to_iter+0x217/0xdd0 [ 1412.957809] filemap_read+0x4ff/0xbb0 [ 1412.958675] ? filemap_get_pages+0x1c90/0x1c90 [ 1412.959710] ? lock_acquire+0x1b2/0x4d0 [ 1412.960603] generic_file_read_iter+0x3cf/0x540 [ 1412.961641] ext4_file_read_iter+0x184/0x490 [ 1412.962623] new_sync_read+0x427/0x6f0 [ 1412.963485] ? __ia32_sys_llseek+0x380/0x380 [ 1412.964503] ? security_file_permission+0xb1/0xd0 [ 1412.965580] vfs_read+0x356/0x5f0 [ 1412.966358] ksys_read+0x12d/0x250 [ 1412.967146] ? __ia32_sys_pwrite64+0x230/0x230 [ 1412.968167] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.969300] do_syscall_64+0x3b/0x90 [ 1412.970130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1412.971250] RIP: 0033:0x7f63a2e8eb19 [ 1412.972076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.976069] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1412.977719] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1412.979264] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1412.980807] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.982341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.983871] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1412.985453] [ 1413.056029] Process accounting resumed 03:12:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 45) 03:12:37 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 26) 03:12:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 46) 03:12:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x49, 0x0, 0x4) 03:12:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'sit0\x00'}) socketpair$unix(0x1, 0xb234ce61ef28a22c, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) read(r2, &(0x7f00000000c0)=""/36, 0x24) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000000)=0x1, &(0x7f0000000100)=0x2) 03:12:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x48, 0x0, 0x4) 03:12:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x21, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x46, 0x0, 0x4) [ 1428.772909] FAULT_INJECTION: forcing a failure. [ 1428.772909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1428.775675] CPU: 0 PID: 9293 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1428.777546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1428.780094] Call Trace: [ 1428.780685] [ 1428.781190] dump_stack_lvl+0x8b/0xb3 [ 1428.782081] should_fail.cold+0x5/0xa [ 1428.782974] prepare_alloc_pages+0x17b/0x500 [ 1428.784000] __alloc_pages+0x131/0x4e0 [ 1428.784932] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1428.786309] ? __lock_acquire+0xbac/0x5b70 [ 1428.787291] ? mark_lock+0xfc/0x2e10 [ 1428.788159] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1428.789439] alloc_pages_vma+0xde/0x500 [ 1428.790373] __handle_mm_fault+0xfb3/0x3570 [ 1428.791397] ? lock_is_held_type+0xd7/0x130 [ 1428.792409] ? __pmd_alloc+0x680/0x680 [ 1428.793377] handle_mm_fault+0x2e6/0xa20 [ 1428.794349] do_user_addr_fault+0x54a/0x12a0 [ 1428.795412] exc_page_fault+0xa2/0x1a0 [ 1428.796330] asm_exc_page_fault+0x1e/0x30 [ 1428.797298] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1428.798572] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1428.802653] RSP: 0018:ffff8880454079f0 EFLAGS: 00050246 [ 1428.803703] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1428.805134] RDX: 0000000000000000 RSI: ffff88801f310000 RDI: 0000000020016000 [ 1428.806550] RBP: 0000000020016000 R08: 0000000000000000 R09: ffff88801f310fff [ 1428.807965] R10: ffffed1003e621ff R11: 0000000000000001 R12: ffff88801f310000 [ 1428.809861] R13: 0000000020017000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1428.811586] copyout.part.0+0xdf/0x110 [ 1428.812547] copy_page_to_iter+0x248/0xdd0 [ 1428.813595] filemap_read+0x4ff/0xbb0 [ 1428.814531] ? filemap_get_pages+0x1c90/0x1c90 [ 1428.815649] ? lock_acquire+0x1b2/0x4d0 [ 1428.816613] generic_file_read_iter+0x3cf/0x540 [ 1428.817554] ext4_file_read_iter+0x184/0x490 [ 1428.818453] new_sync_read+0x427/0x6f0 [ 1428.819244] ? __ia32_sys_llseek+0x380/0x380 [ 1428.820157] ? security_file_permission+0xb1/0xd0 [ 1428.821143] vfs_read+0x356/0x5f0 [ 1428.821852] ksys_read+0x12d/0x250 [ 1428.822573] ? __ia32_sys_pwrite64+0x230/0x230 [ 1428.823503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1428.824568] do_syscall_64+0x3b/0x90 [ 1428.825205] FAULT_INJECTION: forcing a failure. [ 1428.825205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1428.825328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1428.827602] RIP: 0033:0x7f63a2e8eb19 [ 1428.828356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1428.831977] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1428.833507] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1428.834930] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1428.836364] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1428.837788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1428.839206] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1428.840674] [ 1428.841141] CPU: 1 PID: 9302 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1428.842071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1428.843249] Call Trace: [ 1428.843513] [ 1428.843747] dump_stack_lvl+0x8b/0xb3 [ 1428.844173] should_fail.cold+0x5/0xa [ 1428.844571] copy_page_to_iter+0x217/0xdd0 [ 1428.845031] filemap_read+0x4ff/0xbb0 [ 1428.845442] ? filemap_get_pages+0x1c90/0x1c90 [ 1428.845942] ? lock_acquire+0x1b2/0x4d0 [ 1428.846364] generic_file_read_iter+0x3cf/0x540 [ 1428.846859] ext4_file_read_iter+0x184/0x490 [ 1428.847321] new_sync_read+0x427/0x6f0 [ 1428.847748] ? __ia32_sys_llseek+0x380/0x380 [ 1428.848235] ? security_file_permission+0xb1/0xd0 [ 1428.848761] vfs_read+0x356/0x5f0 [ 1428.849144] ksys_read+0x12d/0x250 [ 1428.849520] ? __ia32_sys_pwrite64+0x230/0x230 [ 1428.850019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1428.850576] do_syscall_64+0x3b/0x90 [ 1428.850987] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1428.851527] RIP: 0033:0x7f0ad231ab19 [ 1428.851917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1428.853877] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1428.854673] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1428.855425] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1428.856200] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1428.856946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1428.857709] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1428.858480] 03:12:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4a, 0x0, 0x4) 03:12:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x22, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1428.866065] FAULT_INJECTION: forcing a failure. [ 1428.866065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1428.867333] CPU: 1 PID: 9312 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1428.868202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1428.869367] Call Trace: [ 1428.869653] [ 1428.869897] dump_stack_lvl+0x8b/0xb3 [ 1428.870312] should_fail.cold+0x5/0xa [ 1428.870722] copy_page_to_iter+0x217/0xdd0 [ 1428.871179] filemap_read+0x4ff/0xbb0 [ 1428.871585] ? filemap_get_pages+0x1c90/0x1c90 [ 1428.872086] ? lock_acquire+0x1b2/0x4d0 [ 1428.872527] generic_file_read_iter+0x3cf/0x540 [ 1428.873025] ext4_file_read_iter+0x184/0x490 [ 1428.873485] new_sync_read+0x427/0x6f0 [ 1428.873904] ? __ia32_sys_llseek+0x380/0x380 [ 1428.874380] ? security_file_permission+0xb1/0xd0 [ 1428.874882] vfs_read+0x356/0x5f0 [ 1428.875254] ksys_read+0x12d/0x250 [ 1428.875634] ? __ia32_sys_pwrite64+0x230/0x230 [ 1428.876129] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1428.876696] do_syscall_64+0x3b/0x90 [ 1428.877100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1428.877644] RIP: 0033:0x7fa9c71a5b19 [ 1428.878039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1428.880008] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1428.880812] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1428.881590] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1428.882346] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1428.883097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1428.883855] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1428.884642] 03:12:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x48, 0x0, 0x4) 03:12:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x47, 0x0, 0x4) 03:12:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4b, 0x0, 0x4) 03:12:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000001440)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f0000000000)="67abd8d115922f9faf084dc05b4bff21075e88182de7b4e465af51cc57286fcd72a1f935fd", 0x25}, {&(0x7f00000010c0)="324bf75cbea58653192e4cef303c5e219bf7eb8091a8a9c5f36e5ad2389ed4bf15ab51ca96766e2b53bd4c25d459465a95090bd5367d9dd996d7b6393aeae7548122287962ae4ecf799f9a4712afb183b6446e9baf3bc5e7109bdacbad2df2eff32c14ec2bcbb9d562b83c1a73a87f63c467e4b0465eebdea14d100eee7a195452cc4f647fb84debbac29868eda602a5dccfc590f519437748d6b6162addc1d8b65ddcc6468bcd5c5d20c87554c6cb4d4115aa48da81425b3c42c22bf01739a985e1b9346a6dba1b7cbca546c215a94855bd09ac9bc5f974fb7d076db7fb2ba90e7041888bf6ae26142b06d6f12c738f7800d2ab73b2c6", 0xf7}, {&(0x7f00000011c0)="294180715a1e22d44ad942d574fc1bd110cc9b2cd4cde11b3ee5b65a120a71ee38f1b3f4b79ba1b8d5da13d5cc2545f3b223d576efa4c6c5e5926c75a8aa2e0684cf755d31cfba5772e69f88ed6155866cce465e9d33f0877162cdbaade6910421f216b5ced146ad406464e7c66c121500", 0x71}, {&(0x7f0000001240)="05efb13d8e6a893bcd4faa74d353607314f282df550169f3f428233753a65f74554c75cdaa885a952a5fca8d25125dd07d7b2b6d424435543e742ddb91dc473963755d99ac6fc60cf0245cca05761ec8348c8cfabc9d912de39391f048eb82c02f0924edc2eaa132d13c367ab8c94fcfcb6ae8897260cd7a10c86f136e7a86844661743e39aed896028608511320b8d910f05f7f51c5cd882c1a7ada6d232a8b5b2e5148b68e0e0956c5eb31ec19ceeeda254aa43a90104761399fbfa2b877b00fe3cd90eb6ca570fb34d01ec5c8b505159fac148640dd6c97af09b61fb2b62a41967e0b24c90e0f565f024ebc69bf7e56d07fe7", 0xf4}, {&(0x7f0000000040)="540dc715ddf3522e", 0x8}, {&(0x7f0000001340)="c9312dd10c0dadb9da6ce7390726b41a9a020725e0f867210cf699a8ada7cdaafb8db58c7e06cd8a00da718d9047c8d76f9d460d37a865a3ff65d438c20f5333c09a08f17ffb3c4e1008a73e0a392857a17286d83a80e153dd99e5791f9d2cf9f370aa02fb7c0c85e0a2", 0x6a}, {&(0x7f00000013c0)="9c1482d6745142a3ee1e8cffcfe3a6705175a73aad19687911f1589e262a9958485cfcbe51057f39a6f25fa6d0c667e78327510609c72c4610e3695c3d065e3a6335e00f0b7d20fcc824d3829178ae2f78372fe25351d5550abb5cb7a72c59b4a2591e530f", 0x65}], 0x8, 0x0, 0x10000) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:12:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 46) [ 1429.040311] FAULT_INJECTION: forcing a failure. [ 1429.040311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1429.041608] CPU: 1 PID: 9323 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1429.042469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1429.043648] Call Trace: [ 1429.043922] [ 1429.044166] dump_stack_lvl+0x8b/0xb3 [ 1429.044579] should_fail.cold+0x5/0xa [ 1429.044985] copy_page_to_iter+0x217/0xdd0 [ 1429.045453] filemap_read+0x4ff/0xbb0 [ 1429.045862] ? filemap_get_pages+0x1c90/0x1c90 [ 1429.046351] ? lock_acquire+0x1b2/0x4d0 [ 1429.046770] generic_file_read_iter+0x3cf/0x540 [ 1429.047270] ext4_file_read_iter+0x184/0x490 [ 1429.047739] new_sync_read+0x427/0x6f0 [ 1429.048172] ? __ia32_sys_llseek+0x380/0x380 [ 1429.048646] ? security_file_permission+0xb1/0xd0 [ 1429.049163] vfs_read+0x356/0x5f0 [ 1429.049534] ksys_read+0x12d/0x250 [ 1429.049915] ? __ia32_sys_pwrite64+0x230/0x230 [ 1429.050408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1429.050981] do_syscall_64+0x3b/0x90 [ 1429.051395] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1429.051952] RIP: 0033:0x7f63a2e8eb19 [ 1429.052372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.054340] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1429.055151] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1429.055924] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1429.056700] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.057482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1429.058249] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1429.059029] 03:12:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 47) 03:12:51 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x23, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x28000, 0x2) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000180)='./file0\x00', 0x10002, 0x100) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="11669e820b7130121a7995944b37ebbdcc99891a5e7fb54ecfa747e5107823", 0x1f}, {&(0x7f00000000c0)="a7d932f3ad8c90bdb0f7ca7be08095739a89a3952791c60f05de7788016d7455146c6722116ca9b7ec2e7bb85ee00014c7e48ff6a82157eaee91e09ae000fe6cd9", 0x41}], 0x2, 0x69a1, 0x2) 03:12:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 47) 03:12:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4a, 0x0, 0x4) 03:12:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4c, 0x0, 0x4) 03:12:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x48, 0x0, 0x4) 03:12:51 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 27) [ 1442.901544] FAULT_INJECTION: forcing a failure. [ 1442.901544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1442.902858] CPU: 0 PID: 9346 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1442.903709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1442.904901] Call Trace: [ 1442.905179] [ 1442.905412] dump_stack_lvl+0x8b/0xb3 [ 1442.905825] should_fail.cold+0x5/0xa [ 1442.906244] prepare_alloc_pages+0x17b/0x500 [ 1442.906709] __alloc_pages+0x131/0x4e0 [ 1442.907121] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1442.907753] ? __lock_acquire+0xbac/0x5b70 [ 1442.908214] ? mark_lock+0xfc/0x2e10 [ 1442.908616] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1442.909205] alloc_pages_vma+0xde/0x500 [ 1442.909629] __handle_mm_fault+0xfb3/0x3570 [ 1442.910097] ? lock_is_held_type+0xd7/0x130 [ 1442.910546] ? __pmd_alloc+0x680/0x680 [ 1442.910980] handle_mm_fault+0x2e6/0xa20 [ 1442.911413] do_user_addr_fault+0x54a/0x12a0 [ 1442.911886] exc_page_fault+0xa2/0x1a0 [ 1442.912295] asm_exc_page_fault+0x1e/0x30 [ 1442.912740] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1442.913311] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1442.915215] RSP: 0018:ffff88803f6779f0 EFLAGS: 00050246 [ 1442.915343] FAULT_INJECTION: forcing a failure. [ 1442.915343] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1442.915774] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1442.915784] RDX: 0000000000000000 RSI: ffff88801f302000 RDI: 000000002000d000 [ 1442.915792] RBP: 000000002000d000 R08: 0000000000000000 R09: ffff88801f302fff [ 1442.915801] R10: ffffed1003e605ff R11: 0000000000000001 R12: ffff88801f302000 [ 1442.915810] R13: 000000002000e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1442.915833] copyout.part.0+0xdf/0x110 [ 1442.922497] copy_page_to_iter+0x248/0xdd0 [ 1442.922959] filemap_read+0x4ff/0xbb0 [ 1442.923374] ? filemap_get_pages+0x1c90/0x1c90 [ 1442.923875] ? lock_acquire+0x1b2/0x4d0 [ 1442.924297] generic_file_read_iter+0x3cf/0x540 [ 1442.924805] ext4_file_read_iter+0x184/0x490 [ 1442.925276] new_sync_read+0x427/0x6f0 [ 1442.925690] ? __ia32_sys_llseek+0x380/0x380 [ 1442.926164] ? security_file_permission+0xb1/0xd0 [ 1442.926679] vfs_read+0x356/0x5f0 [ 1442.927046] ksys_read+0x12d/0x250 [ 1442.927420] ? __ia32_sys_pwrite64+0x230/0x230 [ 1442.927902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1442.928461] do_syscall_64+0x3b/0x90 [ 1442.928863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1442.929409] RIP: 0033:0x7fa9c71a5b19 [ 1442.929798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1442.931707] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1442.932506] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1442.933246] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1442.933982] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.934717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1442.935458] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1442.936216] [ 1442.936477] CPU: 1 PID: 9347 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1442.938431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1442.941098] Call Trace: [ 1442.941708] [ 1442.942239] dump_stack_lvl+0x8b/0xb3 [ 1442.943029] should_fail.cold+0x5/0xa [ 1442.943953] prepare_alloc_pages+0x17b/0x500 [ 1442.944860] __alloc_pages+0x131/0x4e0 [ 1442.945790] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1442.946977] ? __lock_acquire+0xbac/0x5b70 [ 1442.948094] ? mark_lock+0xfc/0x2e10 [ 1442.949089] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1442.950392] alloc_pages_vma+0xde/0x500 [ 1442.951198] __handle_mm_fault+0xfb3/0x3570 [ 1442.952237] ? lock_is_held_type+0xd7/0x130 [ 1442.953108] ? __pmd_alloc+0x680/0x680 [ 1442.953910] handle_mm_fault+0x2e6/0xa20 [ 1442.954742] do_user_addr_fault+0x54a/0x12a0 [ 1442.955650] exc_page_fault+0xa2/0x1a0 [ 1442.956453] asm_exc_page_fault+0x1e/0x30 [ 1442.957285] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1442.958378] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1442.962037] RSP: 0018:ffff888033f1f9f0 EFLAGS: 00050246 [ 1442.963095] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1442.964522] RDX: 0000000000000000 RSI: ffff88801f313000 RDI: 0000000020017000 [ 1442.965926] RBP: 0000000020017000 R08: 0000000000000000 R09: ffff88801f313fff [ 1442.967343] R10: ffffed1003e627ff R11: 0000000000000001 R12: ffff88801f313000 [ 1442.968758] R13: 0000000020018000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1442.970188] copyout.part.0+0xdf/0x110 [ 1442.970980] copy_page_to_iter+0x248/0xdd0 [ 1442.971864] filemap_read+0x4ff/0xbb0 [ 1442.972666] ? filemap_get_pages+0x1c90/0x1c90 [ 1442.973610] ? lock_acquire+0x1b2/0x4d0 [ 1442.974420] generic_file_read_iter+0x3cf/0x540 [ 1442.975356] ext4_file_read_iter+0x184/0x490 [ 1442.976249] new_sync_read+0x427/0x6f0 [ 1442.977037] ? __ia32_sys_llseek+0x380/0x380 [ 1442.977950] ? security_file_permission+0xb1/0xd0 [ 1442.978900] vfs_read+0x356/0x5f0 [ 1442.979607] ksys_read+0x12d/0x250 [ 1442.980304] ? __ia32_sys_pwrite64+0x230/0x230 [ 1442.981233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1442.982267] do_syscall_64+0x3b/0x90 [ 1442.983023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1442.984038] RIP: 0033:0x7f63a2e8eb19 [ 1442.984780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1442.988559] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1442.990397] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1442.992082] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1442.993777] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.995451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1442.997168] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1442.998297] [ 1443.002590] FAULT_INJECTION: forcing a failure. [ 1443.002590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1443.004361] CPU: 1 PID: 9352 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1443.005608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1443.007288] Call Trace: [ 1443.007671] [ 1443.008022] dump_stack_lvl+0x8b/0xb3 [ 1443.008625] should_fail.cold+0x5/0xa [ 1443.009230] FAULT_INJECTION: forcing a failure. [ 1443.009230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1443.009233] prepare_alloc_pages+0x17b/0x500 [ 1443.010963] __alloc_pages+0x131/0x4e0 [ 1443.011402] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1443.012071] ? __lock_acquire+0xbac/0x5b70 [ 1443.012545] ? mark_lock+0xfc/0x2e10 [ 1443.012962] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1443.013590] alloc_pages_vma+0xde/0x500 [ 1443.014046] __handle_mm_fault+0xfb3/0x3570 [ 1443.014532] ? lock_is_held_type+0xd7/0x130 [ 1443.015000] ? __pmd_alloc+0x680/0x680 [ 1443.015455] handle_mm_fault+0x2e6/0xa20 [ 1443.015919] do_user_addr_fault+0x54a/0x12a0 [ 1443.016422] exc_page_fault+0xa2/0x1a0 [ 1443.016848] asm_exc_page_fault+0x1e/0x30 [ 1443.017308] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1443.017918] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1443.019961] RSP: 0018:ffff888037ed79f0 EFLAGS: 00050246 [ 1443.020556] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1443.021341] RDX: 0000000000000000 RSI: ffff88801f313000 RDI: 0000000020017000 [ 1443.022119] RBP: 0000000020017000 R08: 0000000000000000 R09: ffff88801f313fff [ 1443.022898] R10: ffffed1003e627ff R11: 0000000000000001 R12: ffff88801f313000 [ 1443.023678] R13: 0000000020018000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1443.024471] copyout.part.0+0xdf/0x110 [ 1443.024909] copy_page_to_iter+0x248/0xdd0 [ 1443.025404] filemap_read+0x4ff/0xbb0 [ 1443.025836] ? filemap_get_pages+0x1c90/0x1c90 [ 1443.026334] ? lock_acquire+0x1b2/0x4d0 [ 1443.026778] generic_file_read_iter+0x3cf/0x540 [ 1443.027301] ext4_file_read_iter+0x184/0x490 [ 1443.027778] new_sync_read+0x427/0x6f0 [ 1443.028204] ? __ia32_sys_llseek+0x380/0x380 [ 1443.028720] ? security_file_permission+0xb1/0xd0 [ 1443.029264] vfs_read+0x356/0x5f0 [ 1443.029652] ksys_read+0x12d/0x250 [ 1443.030051] ? __ia32_sys_pwrite64+0x230/0x230 [ 1443.030540] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1443.031108] do_syscall_64+0x3b/0x90 [ 1443.031529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1443.032101] RIP: 0033:0x7f0ad231ab19 [ 1443.032508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1443.034486] RSP: 002b:00007f0acf86f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1443.035292] RAX: ffffffffffffffda RBX: 00007f0ad242e020 RCX: 00007f0ad231ab19 [ 1443.036063] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1443.036844] RBP: 00007f0acf86f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1443.037612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1443.038361] R13: 00007ffea8f7559f R14: 00007f0acf86f300 R15: 0000000000022000 [ 1443.039145] [ 1443.039398] CPU: 0 PID: 9354 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 03:12:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 28) [ 1443.040283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1443.041687] Call Trace: [ 1443.041961] [ 1443.042199] dump_stack_lvl+0x8b/0xb3 [ 1443.042603] should_fail.cold+0x5/0xa [ 1443.043002] copy_page_to_iter+0x217/0xdd0 [ 1443.043476] filemap_read+0x4ff/0xbb0 [ 1443.043897] ? filemap_get_pages+0x1c90/0x1c90 [ 1443.044388] ? lock_acquire+0x1b2/0x4d0 [ 1443.044808] generic_file_read_iter+0x3cf/0x540 [ 1443.045309] ext4_file_read_iter+0x184/0x490 [ 1443.045782] new_sync_read+0x427/0x6f0 [ 1443.046187] ? __ia32_sys_llseek+0x380/0x380 [ 1443.046675] ? security_file_permission+0xb1/0xd0 [ 1443.047195] vfs_read+0x356/0x5f0 [ 1443.047579] ksys_read+0x12d/0x250 [ 1443.047959] ? __ia32_sys_pwrite64+0x230/0x230 [ 1443.048438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1443.048982] do_syscall_64+0x3b/0x90 [ 1443.049396] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1443.049940] RIP: 0033:0x7fa9c71a5b19 [ 1443.050316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1443.052227] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1443.053049] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1443.053777] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1443.054525] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1443.055267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1443.056008] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1443.056789] 03:12:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x49, 0x0, 0x4) 03:12:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x24, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:12:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4a, 0x0, 0x4) 03:12:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4d, 0x0, 0x4) [ 1443.143215] Process accounting paused 03:12:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 48) 03:12:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x210280, 0x180) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:12:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 48) [ 1443.185577] FAULT_INJECTION: forcing a failure. [ 1443.185577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1443.186840] CPU: 0 PID: 9369 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1443.187696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1443.188909] Call Trace: [ 1443.189175] [ 1443.189410] dump_stack_lvl+0x8b/0xb3 [ 1443.189835] should_fail.cold+0x5/0xa [ 1443.190237] copy_page_to_iter+0x217/0xdd0 [ 1443.190705] filemap_read+0x4ff/0xbb0 [ 1443.191125] ? filemap_get_pages+0x1c90/0x1c90 [ 1443.191616] ? lock_acquire+0x1b2/0x4d0 [ 1443.192050] generic_file_read_iter+0x3cf/0x540 [ 1443.192556] ext4_file_read_iter+0x184/0x490 [ 1443.193026] new_sync_read+0x427/0x6f0 [ 1443.193433] ? __ia32_sys_llseek+0x380/0x380 [ 1443.193915] ? security_file_permission+0xb1/0xd0 [ 1443.194425] vfs_read+0x356/0x5f0 [ 1443.194795] ksys_read+0x12d/0x250 [ 1443.195181] ? __ia32_sys_pwrite64+0x230/0x230 [ 1443.195658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1443.196222] do_syscall_64+0x3b/0x90 [ 1443.196629] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1443.197186] RIP: 0033:0x7f0ad231ab19 [ 1443.197589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1443.199587] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1443.200433] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1443.201201] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1443.201969] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1443.202730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1443.203504] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1443.204295] [ 1443.220996] FAULT_INJECTION: forcing a failure. [ 1443.220996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1443.222311] CPU: 1 PID: 9374 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1443.223178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1443.224366] Call Trace: [ 1443.224637] [ 1443.224880] dump_stack_lvl+0x8b/0xb3 [ 1443.225295] should_fail.cold+0x5/0xa [ 1443.225703] copy_page_to_iter+0x217/0xdd0 [ 1443.226163] filemap_read+0x4ff/0xbb0 [ 1443.226580] ? filemap_get_pages+0x1c90/0x1c90 [ 1443.227079] ? lock_acquire+0x1b2/0x4d0 [ 1443.227500] generic_file_read_iter+0x3cf/0x540 [ 1443.228006] ext4_file_read_iter+0x184/0x490 [ 1443.228478] new_sync_read+0x427/0x6f0 [ 1443.228901] ? __ia32_sys_llseek+0x380/0x380 [ 1443.229371] ? security_file_permission+0xb1/0xd0 [ 1443.229892] vfs_read+0x356/0x5f0 [ 1443.230263] ksys_read+0x12d/0x250 [ 1443.230651] ? __ia32_sys_pwrite64+0x230/0x230 [ 1443.231140] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1443.231683] do_syscall_64+0x3b/0x90 [ 1443.232095] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1443.232649] RIP: 0033:0x7f63a2e8eb19 [ 1443.233037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1443.234971] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1443.235757] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1443.236514] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1443.237253] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1443.237999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1443.238741] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1443.239522] 03:13:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 49) 03:13:05 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 29) 03:13:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4e, 0x0, 0x4) 03:13:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x25, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4a, 0x0, 0x4) 03:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x45, 0x0, 0x4) 03:13:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 49) 03:13:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101000, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1456.540734] FAULT_INJECTION: forcing a failure. [ 1456.540734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.543250] CPU: 0 PID: 9381 Comm: syz-executor.0 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1456.544901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1456.547233] Call Trace: [ 1456.547782] [ 1456.548326] dump_stack_lvl+0x8b/0xb3 [ 1456.549316] should_fail.cold+0x5/0xa [ 1456.550089] prepare_alloc_pages+0x17b/0x500 [ 1456.550956] __alloc_pages+0x131/0x4e0 [ 1456.551919] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1456.553115] ? __lock_acquire+0xbac/0x5b70 [ 1456.554177] ? mark_lock+0xfc/0x2e10 [ 1456.554912] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1456.556013] alloc_pages_vma+0xde/0x500 [ 1456.556854] __handle_mm_fault+0xfb3/0x3570 [ 1456.557750] ? lock_is_held_type+0xd7/0x130 [ 1456.558764] ? __pmd_alloc+0x680/0x680 [ 1456.559648] handle_mm_fault+0x2e6/0xa20 [ 1456.560580] do_user_addr_fault+0x54a/0x12a0 [ 1456.561638] exc_page_fault+0xa2/0x1a0 [ 1456.562530] asm_exc_page_fault+0x1e/0x30 [ 1456.563445] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1456.564546] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1456.568599] RSP: 0018:ffff8880449979f0 EFLAGS: 00050246 [ 1456.569832] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1456.571410] RDX: 0000000000000000 RSI: ffff88801f2e5000 RDI: 000000002000e000 [ 1456.572907] RBP: 000000002000e000 R08: 0000000000000000 R09: ffff88801f2e5fff [ 1456.574538] R10: ffffed1003e5cbff R11: 0000000000000001 R12: ffff88801f2e5000 [ 1456.576119] R13: 000000002000f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1456.577794] copyout.part.0+0xdf/0x110 [ 1456.578728] copy_page_to_iter+0x248/0xdd0 [ 1456.579688] filemap_read+0x4ff/0xbb0 [ 1456.580634] ? filemap_get_pages+0x1c90/0x1c90 [ 1456.581685] ? lock_acquire+0x1b2/0x4d0 [ 1456.582625] generic_file_read_iter+0x3cf/0x540 [ 1456.583593] ext4_file_read_iter+0x184/0x490 [ 1456.584493] new_sync_read+0x427/0x6f0 [ 1456.585289] ? __ia32_sys_llseek+0x380/0x380 [ 1456.586194] ? security_file_permission+0xb1/0xd0 [ 1456.587175] vfs_read+0x356/0x5f0 [ 1456.587537] FAULT_INJECTION: forcing a failure. [ 1456.587537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.587874] ksys_read+0x12d/0x250 [ 1456.589848] ? __ia32_sys_pwrite64+0x230/0x230 [ 1456.590789] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1456.592026] do_syscall_64+0x3b/0x90 [ 1456.592817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1456.593951] RIP: 0033:0x7fa9c71a5b19 [ 1456.594768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.598431] RSP: 002b:00007fa9c471b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1456.599955] RAX: ffffffffffffffda RBX: 00007fa9c72b8f60 RCX: 00007fa9c71a5b19 [ 1456.601387] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1456.602795] RBP: 00007fa9c471b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.604198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1456.605641] R13: 00007ffeb12f784f R14: 00007fa9c471b300 R15: 0000000000022000 [ 1456.607073] [ 1456.607530] CPU: 1 PID: 9388 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1456.608444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1456.609784] Call Trace: [ 1456.610047] [ 1456.610275] dump_stack_lvl+0x8b/0xb3 [ 1456.610682] should_fail.cold+0x5/0xa [ 1456.611094] prepare_alloc_pages+0x17b/0x500 [ 1456.611550] __alloc_pages+0x131/0x4e0 [ 1456.611957] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1456.612587] ? __lock_acquire+0xbac/0x5b70 [ 1456.613030] ? mark_lock+0xfc/0x2e10 [ 1456.613410] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1456.613975] alloc_pages_vma+0xde/0x500 [ 1456.614391] __handle_mm_fault+0xfb3/0x3570 [ 1456.614842] ? lock_is_held_type+0xd7/0x130 [ 1456.615282] ? __pmd_alloc+0x680/0x680 [ 1456.615713] handle_mm_fault+0x2e6/0xa20 [ 1456.616146] do_user_addr_fault+0x54a/0x12a0 [ 1456.616616] exc_page_fault+0xa2/0x1a0 [ 1456.617022] asm_exc_page_fault+0x1e/0x30 [ 1456.617450] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1456.618008] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1456.619891] RSP: 0018:ffff888041fff9f0 EFLAGS: 00050246 [ 1456.620436] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1456.621165] RDX: 0000000000000000 RSI: ffff88801f30d000 RDI: 0000000020018000 [ 1456.621886] RBP: 0000000020018000 R08: 0000000000000000 R09: ffff88801f30dfff [ 1456.622602] R10: ffffed1003e61bff R11: 0000000000000001 R12: ffff88801f30d000 [ 1456.623338] R13: 0000000020019000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1456.624076] copyout.part.0+0xdf/0x110 [ 1456.624483] copy_page_to_iter+0x248/0xdd0 [ 1456.624954] filemap_read+0x4ff/0xbb0 [ 1456.625361] ? filemap_get_pages+0x1c90/0x1c90 [ 1456.625432] FAULT_INJECTION: forcing a failure. [ 1456.625432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.625845] ? lock_acquire+0x1b2/0x4d0 [ 1456.625867] generic_file_read_iter+0x3cf/0x540 [ 1456.629034] ext4_file_read_iter+0x184/0x490 [ 1456.629501] new_sync_read+0x427/0x6f0 [ 1456.629914] ? __ia32_sys_llseek+0x380/0x380 [ 1456.630385] ? security_file_permission+0xb1/0xd0 [ 1456.630897] vfs_read+0x356/0x5f0 [ 1456.631261] ksys_read+0x12d/0x250 [ 1456.631647] ? __ia32_sys_pwrite64+0x230/0x230 [ 1456.632146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1456.632690] do_syscall_64+0x3b/0x90 [ 1456.633087] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1456.633627] RIP: 0033:0x7f63a2e8eb19 [ 1456.634014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.635901] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1456.636706] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1456.637434] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1456.638206] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.638986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1456.639839] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1456.640593] [ 1456.640878] CPU: 0 PID: 9396 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1456.642925] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1456.645535] Call Trace: [ 1456.646065] [ 1456.646517] dump_stack_lvl+0x8b/0xb3 [ 1456.647339] should_fail.cold+0x5/0xa [ 1456.648137] prepare_alloc_pages+0x17b/0x500 [ 1456.649058] __alloc_pages+0x131/0x4e0 [ 1456.649862] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1456.651093] ? __lock_acquire+0xbac/0x5b70 [ 1456.651962] ? mark_lock+0xfc/0x2e10 [ 1456.652725] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1456.653840] alloc_pages_vma+0xde/0x500 [ 1456.654657] __handle_mm_fault+0xfb3/0x3570 [ 1456.655547] ? lock_is_held_type+0xd7/0x130 [ 1456.656412] ? __pmd_alloc+0x680/0x680 [ 1456.657267] handle_mm_fault+0x2e6/0xa20 [ 1456.658106] do_user_addr_fault+0x54a/0x12a0 [ 1456.659013] exc_page_fault+0xa2/0x1a0 [ 1456.659794] asm_exc_page_fault+0x1e/0x30 [ 1456.660634] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1456.661731] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1456.665407] RSP: 0018:ffff8880390a79f0 EFLAGS: 00050246 [ 1456.666468] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1456.667890] RDX: 0000000000000000 RSI: ffff88801f30d000 RDI: 0000000020018000 [ 1456.669334] RBP: 0000000020018000 R08: 0000000000000000 R09: ffff88801f30dfff [ 1456.670759] R10: ffffed1003e61bff R11: 0000000000000001 R12: ffff88801f30d000 [ 1456.672182] R13: 0000000020019000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1456.673645] copyout.part.0+0xdf/0x110 [ 1456.674451] copy_page_to_iter+0x248/0xdd0 [ 1456.675338] filemap_read+0x4ff/0xbb0 [ 1456.676146] ? filemap_get_pages+0x1c90/0x1c90 [ 1456.677153] ? lock_acquire+0x1b2/0x4d0 [ 1456.677988] generic_file_read_iter+0x3cf/0x540 [ 1456.678916] ext4_file_read_iter+0x184/0x490 [ 1456.679827] new_sync_read+0x427/0x6f0 [ 1456.680613] ? __ia32_sys_llseek+0x380/0x380 [ 1456.681507] ? security_file_permission+0xb1/0xd0 [ 1456.682464] vfs_read+0x356/0x5f0 [ 1456.683166] ksys_read+0x12d/0x250 [ 1456.683875] ? __ia32_sys_pwrite64+0x230/0x230 [ 1456.684785] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1456.685787] do_syscall_64+0x3b/0x90 [ 1456.686558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1456.687576] RIP: 0033:0x7f0ad231ab19 [ 1456.688311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.692126] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1456.693646] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1456.695047] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1456.696453] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.697862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:13:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x26, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x45, 0x0, 0x4) [ 1456.699272] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1456.700806] 03:13:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 50) 03:13:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x27, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4f, 0x0, 0x4) 03:13:05 executing program 4: accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) r1 = accept4(r0, 0x0, &(0x7f00000001c0), 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) listen(r0, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000100)=""/114}) read(0xffffffffffffffff, 0x0, 0x0) 03:13:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4b, 0x0, 0x4) [ 1456.794702] FAULT_INJECTION: forcing a failure. [ 1456.794702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1456.795991] CPU: 1 PID: 9409 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1456.796787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1456.797871] Call Trace: [ 1456.798119] [ 1456.798338] dump_stack_lvl+0x8b/0xb3 [ 1456.798719] should_fail.cold+0x5/0xa [ 1456.799097] copy_page_to_iter+0x217/0xdd0 [ 1456.799524] filemap_read+0x4ff/0xbb0 [ 1456.799909] ? filemap_get_pages+0x1c90/0x1c90 [ 1456.800373] ? lock_acquire+0x1b2/0x4d0 [ 1456.800770] generic_file_read_iter+0x3cf/0x540 [ 1456.801223] ext4_file_read_iter+0x184/0x490 [ 1456.801652] new_sync_read+0x427/0x6f0 [ 1456.802031] ? __ia32_sys_llseek+0x380/0x380 [ 1456.802467] ? security_file_permission+0xb1/0xd0 [ 1456.802976] vfs_read+0x356/0x5f0 [ 1456.803319] ksys_read+0x12d/0x250 [ 1456.803665] ? __ia32_sys_pwrite64+0x230/0x230 [ 1456.804110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1456.804624] do_syscall_64+0x3b/0x90 [ 1456.804991] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1456.805485] RIP: 0033:0x7f63a2e8eb19 [ 1456.805840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1456.807580] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1456.808481] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1456.809513] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1456.810240] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.810949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1456.811740] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1456.812503] 03:13:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f00000000c0)={{r1}, "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"}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000010c0)='./file0\x00', 0x1, 0x4, &(0x7f0000001300)=[{&(0x7f0000001100)="bc790eaa6c00bb77ec2a578209a1857ea33236e8989a197c1f1f0db9cf354b2d824ed869a255e6be88482bc06bcc5529d5", 0x31, 0xd5}, {&(0x7f0000001140)="8d6595150064c4b74a", 0x9, 0x2}, {&(0x7f0000001180)="708479139d0112cd1fbd4f825022149f1fbdd2067f8c372374e7011cf1d06fafd1332a1b42fef7e12790ce0ad40c94d74370bd3bbbba73b5f4361b306daa328fcf6d9b6bc87c9c4335d1ea0139d670a5e3829c7e869144a6a11346e765441eec7233f594e09acd3e05cb16715cc33fa0", 0x70, 0x1}, {&(0x7f0000001200)="e6d5f86c67b0e525bee99e8d486b8c8821411323badb2a9c92a3b3b8bddfb07c3f13a9ddba6a7d6ce0f66d1b38beb9011a965ba485606ef8c4528b9bbaf507a479969a8704f6f1dfb1ff71487a5ada6f525fd2e6d8c72acd043a4a3d2bc164b7c55c37d247cf0173b9faa39f2138d27fc083527175172f54ec0d9d567aa939904da0deaed652dbf95ea6e6bda7e694c7a3f2ae3fd339c7e942d69374698bb6e2259b371ceb9fe60f039f7a914e8a5e3ac90991239cf9d18dab1cc37e7e047876aab5321220d5753865322e2927d6cf87e1ef0279b1169cbc1d48188c7092b353d97e761494c1cec2e280292acad8beb3927443550494e7d8", 0xf8, 0x6}], 0xc800, &(0x7f0000001380)={[{@nodots}, {@nodots}, {@dots}, {@dots}, {@nodots}, {@dots}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@obj_user={'obj_user', 0x3d, '{@\'^[[-{$\x9e@,#*!'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@euid_lt}, {@subj_type={'subj_type', 0x3d, '{]:@'}}, {@uid_gt}]}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x800000) 03:13:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x50, 0x0, 0x4) 03:13:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x28, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 51) [ 1469.728346] FAULT_INJECTION: forcing a failure. [ 1469.728346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1469.729643] CPU: 0 PID: 9433 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1469.730493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1469.731682] Call Trace: [ 1469.731960] [ 1469.732196] dump_stack_lvl+0x8b/0xb3 [ 1469.732612] should_fail.cold+0x5/0xa [ 1469.733043] prepare_alloc_pages+0x17b/0x500 [ 1469.733509] __alloc_pages+0x131/0x4e0 [ 1469.733929] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1469.734560] ? __lock_acquire+0xbac/0x5b70 [ 1469.735014] ? mark_lock+0xfc/0x2e10 [ 1469.735402] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1469.735993] alloc_pages_vma+0xde/0x500 [ 1469.736417] __handle_mm_fault+0xfb3/0x3570 [ 1469.736887] ? lock_is_held_type+0xd7/0x130 [ 1469.737336] ? __pmd_alloc+0x680/0x680 [ 1469.737773] handle_mm_fault+0x2e6/0xa20 [ 1469.738208] do_user_addr_fault+0x54a/0x12a0 [ 1469.738673] exc_page_fault+0xa2/0x1a0 [ 1469.739077] asm_exc_page_fault+0x1e/0x30 [ 1469.739506] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1469.740072] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1469.741983] RSP: 0018:ffff88804236f9f0 EFLAGS: 00050246 [ 1469.742541] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1469.743274] RDX: 0000000000000000 RSI: ffff88801f315000 RDI: 0000000020019000 [ 1469.744005] RBP: 0000000020019000 R08: 0000000000000000 R09: ffff88801f315fff [ 1469.744747] R10: ffffed1003e62bff R11: 0000000000000001 R12: ffff88801f315000 [ 1469.745496] R13: 000000002001a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1469.746249] copyout.part.0+0xdf/0x110 [ 1469.746667] copy_page_to_iter+0x248/0xdd0 [ 1469.747125] filemap_read+0x4ff/0xbb0 [ 1469.747535] ? filemap_get_pages+0x1c90/0x1c90 [ 1469.748024] ? lock_acquire+0x1b2/0x4d0 [ 1469.748446] generic_file_read_iter+0x3cf/0x540 [ 1469.748942] ext4_file_read_iter+0x184/0x490 [ 1469.749403] new_sync_read+0x427/0x6f0 [ 1469.749815] ? __ia32_sys_llseek+0x380/0x380 [ 1469.750215] FAULT_INJECTION: forcing a failure. [ 1469.750215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1469.750285] ? security_file_permission+0xb1/0xd0 [ 1469.752848] vfs_read+0x356/0x5f0 [ 1469.753218] ksys_read+0x12d/0x250 [ 1469.753590] ? __ia32_sys_pwrite64+0x230/0x230 [ 1469.754067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1469.754607] do_syscall_64+0x3b/0x90 [ 1469.755004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1469.755554] RIP: 0033:0x7f63a2e8eb19 [ 1469.755947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1469.757904] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1469.758684] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1469.759419] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1469.760147] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.760892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1469.761621] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1469.762374] [ 1469.762615] CPU: 1 PID: 9440 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1469.764111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1469.766179] Call Trace: [ 1469.766642] [ 1469.767048] dump_stack_lvl+0x8b/0xb3 [ 1469.767751] should_fail.cold+0x5/0xa 03:13:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 50) 03:13:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x29, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4c, 0x0, 0x4) 03:13:18 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 30) 03:13:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xa0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:13:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4b, 0x0, 0x4) [ 1469.768456] copy_page_to_iter+0x217/0xdd0 03:13:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x51, 0x0, 0x4) [ 1469.769465] filemap_read+0x4ff/0xbb0 [ 1469.770252] ? filemap_get_pages+0x1c90/0x1c90 [ 1469.771107] ? lock_acquire+0x1b2/0x4d0 [ 1469.771815] generic_file_read_iter+0x3cf/0x540 [ 1469.772673] ext4_file_read_iter+0x184/0x490 [ 1469.773506] new_sync_read+0x427/0x6f0 [ 1469.774233] ? __ia32_sys_llseek+0x380/0x380 [ 1469.775060] ? security_file_permission+0xb1/0xd0 [ 1469.775944] vfs_read+0x356/0x5f0 [ 1469.776585] ksys_read+0x12d/0x250 [ 1469.777234] ? __ia32_sys_pwrite64+0x230/0x230 [ 1469.778065] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1469.779011] do_syscall_64+0x3b/0x90 [ 1469.779674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1469.780609] RIP: 0033:0x7f0ad231ab19 [ 1469.781278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1469.784638] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1469.785972] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 03:13:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4d, 0x0, 0x4) [ 1469.787212] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1469.788575] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.789868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1469.791150] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1469.792449] 03:13:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 51) 03:13:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4e, 0x0, 0x4) 03:13:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:34 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:13:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x694100, 0x80) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:13:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x52, 0x0, 0x4) 03:13:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x50, 0x0, 0x4) 03:13:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 52) 03:13:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1485.134268] FAULT_INJECTION: forcing a failure. [ 1485.134268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1485.136857] CPU: 0 PID: 9479 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1485.138620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1485.141006] Call Trace: [ 1485.141550] [ 1485.142027] dump_stack_lvl+0x8b/0xb3 [ 1485.142884] should_fail.cold+0x5/0xa [ 1485.143723] prepare_alloc_pages+0x17b/0x500 [ 1485.144665] __alloc_pages+0x131/0x4e0 [ 1485.145514] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1485.146813] ? __lock_acquire+0xbac/0x5b70 [ 1485.147731] ? mark_lock+0xfc/0x2e10 [ 1485.148512] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1485.149710] alloc_pages_vma+0xde/0x500 [ 1485.150577] __handle_mm_fault+0xfb3/0x3570 [ 1485.151526] ? lock_is_held_type+0xd7/0x130 [ 1485.152444] ? __pmd_alloc+0x680/0x680 [ 1485.153332] handle_mm_fault+0x2e6/0xa20 [ 1485.154216] do_user_addr_fault+0x54a/0x12a0 [ 1485.155191] exc_page_fault+0xa2/0x1a0 [ 1485.156022] asm_exc_page_fault+0x1e/0x30 [ 1485.156900] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1485.158070] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1485.161932] RSP: 0018:ffff888041f679f0 EFLAGS: 00050246 [ 1485.163067] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1485.164559] RDX: 0000000000000000 RSI: ffff88801f315000 RDI: 0000000020019000 03:13:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x4f, 0x0, 0x4) [ 1485.166071] RBP: 0000000020019000 R08: 0000000000000000 R09: ffff88801f315fff [ 1485.167995] R10: ffffed1003e62bff R11: 0000000000000001 R12: ffff88801f315000 [ 1485.169828] R13: 000000002001a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1485.171689] copyout.part.0+0xdf/0x110 [ 1485.172703] copy_page_to_iter+0x248/0xdd0 [ 1485.173850] filemap_read+0x4ff/0xbb0 [ 1485.174856] ? filemap_get_pages+0x1c90/0x1c90 [ 1485.176056] ? lock_acquire+0x1b2/0x4d0 [ 1485.177103] generic_file_read_iter+0x3cf/0x540 [ 1485.178319] ext4_file_read_iter+0x184/0x490 [ 1485.179461] new_sync_read+0x427/0x6f0 [ 1485.180320] ? __ia32_sys_llseek+0x380/0x380 [ 1485.181494] ? security_file_permission+0xb1/0xd0 [ 1485.182553] vfs_read+0x356/0x5f0 [ 1485.183462] ksys_read+0x12d/0x250 [ 1485.184247] ? __ia32_sys_pwrite64+0x230/0x230 [ 1485.185447] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1485.186572] do_syscall_64+0x3b/0x90 03:13:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x47, 0x0, 0x4) 03:13:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1485.187536] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1485.188726] RIP: 0033:0x7f0ad231ab19 [ 1485.189686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.193695] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1485.195633] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1485.197472] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1485.199294] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.201143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1485.202970] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1485.204824] 03:13:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) [ 1485.217075] FAULT_INJECTION: forcing a failure. [ 1485.217075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1485.220031] CPU: 0 PID: 9473 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1485.221751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1485.224640] Call Trace: [ 1485.225199] [ 1485.225770] dump_stack_lvl+0x8b/0xb3 [ 1485.226597] should_fail.cold+0x5/0xa [ 1485.227594] copy_page_to_iter+0x217/0xdd0 [ 1485.228528] filemap_read+0x4ff/0xbb0 [ 1485.229555] ? filemap_get_pages+0x1c90/0x1c90 [ 1485.230540] ? lock_acquire+0x1b2/0x4d0 [ 1485.231569] generic_file_read_iter+0x3cf/0x540 [ 1485.232560] ext4_file_read_iter+0x184/0x490 [ 1485.233710] new_sync_read+0x427/0x6f0 [ 1485.234536] ? __ia32_sys_llseek+0x380/0x380 [ 1485.235693] ? security_file_permission+0xb1/0xd0 [ 1485.236722] vfs_read+0x356/0x5f0 [ 1485.237634] ksys_read+0x12d/0x250 [ 1485.238397] ? __ia32_sys_pwrite64+0x230/0x230 [ 1485.239568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1485.240661] do_syscall_64+0x3b/0x90 [ 1485.241643] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1485.242729] RIP: 0033:0x7f63a2e8eb19 03:13:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x50, 0x0, 0x4) [ 1485.243668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.247574] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1485.249157] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1485.250618] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1485.252077] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.253547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1485.255008] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1485.256491] 03:13:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x3c, 0x0, 0x4) [ 1485.334904] Process accounting resumed 03:13:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 52) 03:13:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x53, 0x0, 0x4) 03:13:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x51, 0x0, 0x4) [ 1485.403958] FAULT_INJECTION: forcing a failure. [ 1485.403958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1485.405232] CPU: 1 PID: 9503 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1485.406301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1485.407388] Call Trace: [ 1485.407726] [ 1485.408017] dump_stack_lvl+0x8b/0xb3 [ 1485.408528] should_fail.cold+0x5/0xa [ 1485.409025] copy_page_to_iter+0x217/0xdd0 [ 1485.409462] filemap_read+0x4ff/0xbb0 [ 1485.409844] ? filemap_get_pages+0x1c90/0x1c90 [ 1485.410297] ? lock_acquire+0x1b2/0x4d0 [ 1485.410686] generic_file_read_iter+0x3cf/0x540 [ 1485.411139] ext4_file_read_iter+0x184/0x490 [ 1485.411568] new_sync_read+0x427/0x6f0 [ 1485.411947] ? __ia32_sys_llseek+0x380/0x380 [ 1485.412390] ? security_file_permission+0xb1/0xd0 [ 1485.412861] vfs_read+0x356/0x5f0 [ 1485.413210] ksys_read+0x12d/0x250 [ 1485.413568] ? __ia32_sys_pwrite64+0x230/0x230 [ 1485.414022] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1485.414548] do_syscall_64+0x3b/0x90 [ 1485.414926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1485.415447] RIP: 0033:0x7f0ad231ab19 [ 1485.415813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.417649] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1485.418395] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1485.419095] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1485.419804] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.420520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1485.421246] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1485.421970] 03:13:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x52, 0x0, 0x4) 03:13:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000001180)=[{&(0x7f00000000c0)="13934ef130c921269c74cccdf65913e3c1c7be43be393f8a9f87dc54ee83c5b5a85655470fcbbacbefacf47bb971de0c434b7e87e95c56c513a6a190e2a41c580ca699e2637d58e9d5df9b65b673dfceb109dcf423a2e8c664b1a9732d39a9f88286064791a7683ff46a83222f61941f24f84f9392503f6b82fbb530065ec8722fa8ea157df7826db0e8be", 0x8b, 0x9}, {&(0x7f0000000180)="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", 0x1000, 0x3f}], 0x248000, &(0x7f00000011c0)={[{@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@utf8no}, {@fat=@sys_immutable}, {@uni_xlateno}, {@uni_xlateno}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}], [{@obj_type={'obj_type', 0x3d, 'd{('}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, '(#:)'}}, {@obj_type={'obj_type', 0x3d, '@$+}:{&{*('}}, {@pcr={'pcr', 0x3d, 0x16}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@appraise}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000001300)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) 03:13:49 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2f, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x54, 0x0, 0x4) 03:13:49 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x11ffffdef) 03:13:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x36, 0x0, 0x4) [ 1500.495653] FAULT_INJECTION: forcing a failure. [ 1500.495653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1500.497031] CPU: 1 PID: 9520 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1500.497910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1500.499090] Call Trace: [ 1500.499362] [ 1500.499596] dump_stack_lvl+0x8b/0xb3 [ 1500.500006] should_fail.cold+0x5/0xa [ 1500.500415] prepare_alloc_pages+0x17b/0x500 [ 1500.500889] __alloc_pages+0x131/0x4e0 [ 1500.501329] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1500.501960] ? __lock_acquire+0xbac/0x5b70 [ 1500.502422] ? mark_lock+0xfc/0x2e10 [ 1500.502818] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1500.503397] alloc_pages_vma+0xde/0x500 [ 1500.503820] __handle_mm_fault+0xfb3/0x3570 [ 1500.504285] ? lock_is_held_type+0xd7/0x130 [ 1500.504736] ? __pmd_alloc+0x680/0x680 [ 1500.505172] handle_mm_fault+0x2e6/0xa20 [ 1500.505611] do_user_addr_fault+0x54a/0x12a0 [ 1500.506099] exc_page_fault+0xa2/0x1a0 [ 1500.506507] asm_exc_page_fault+0x1e/0x30 [ 1500.506932] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1500.507505] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1500.509412] RSP: 0018:ffff888017cb79f0 EFLAGS: 00050246 [ 1500.509969] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1500.510700] RDX: 0000000000000000 RSI: ffff88801f314000 RDI: 000000002001a000 [ 1500.511439] RBP: 000000002001a000 R08: 0000000000000000 R09: ffff88801f314fff [ 1500.512205] R10: ffffed1003e629ff R11: 0000000000000001 R12: ffff88801f314000 [ 1500.512947] R13: 000000002001b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1500.513717] copyout.part.0+0xdf/0x110 [ 1500.514138] copy_page_to_iter+0x248/0xdd0 [ 1500.514600] filemap_read+0x4ff/0xbb0 [ 1500.515009] ? filemap_get_pages+0x1c90/0x1c90 [ 1500.515490] ? lock_acquire+0x1b2/0x4d0 [ 1500.515922] generic_file_read_iter+0x3cf/0x540 [ 1500.516689] ext4_file_read_iter+0x184/0x490 [ 1500.517182] new_sync_read+0x427/0x6f0 03:13:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 53) 03:13:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 53) [ 1500.517690] ? __ia32_sys_llseek+0x380/0x380 [ 1500.518308] ? security_file_permission+0xb1/0xd0 [ 1500.518819] vfs_read+0x356/0x5f0 [ 1500.519195] ksys_read+0x12d/0x250 [ 1500.519567] ? __ia32_sys_pwrite64+0x230/0x230 [ 1500.520052] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.520596] do_syscall_64+0x3b/0x90 [ 1500.520985] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1500.521546] RIP: 0033:0x7f0ad231ab19 [ 1500.521951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.523844] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1500.524621] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1500.525367] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1500.526101] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.526840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.527579] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1500.528346] [ 1500.531227] FAULT_INJECTION: forcing a failure. [ 1500.531227] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1500.532507] CPU: 1 PID: 9523 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1500.533379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1500.534552] Call Trace: [ 1500.534818] [ 1500.535046] dump_stack_lvl+0x8b/0xb3 [ 1500.535455] should_fail.cold+0x5/0xa [ 1500.535859] prepare_alloc_pages+0x17b/0x500 [ 1500.536321] __alloc_pages+0x131/0x4e0 [ 1500.536729] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1500.537372] ? __lock_acquire+0xbac/0x5b70 [ 1500.537826] ? mark_lock+0xfc/0x2e10 [ 1500.538216] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1500.538797] alloc_pages_vma+0xde/0x500 [ 1500.539220] __handle_mm_fault+0xfb3/0x3570 [ 1500.539677] ? lock_is_held_type+0xd7/0x130 [ 1500.540124] ? __pmd_alloc+0x680/0x680 [ 1500.540554] handle_mm_fault+0x2e6/0xa20 [ 1500.541002] do_user_addr_fault+0x54a/0x12a0 [ 1500.541486] exc_page_fault+0xa2/0x1a0 [ 1500.541899] asm_exc_page_fault+0x1e/0x30 [ 1500.542335] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1500.542901] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1500.544801] RSP: 0018:ffff88803f8af9f0 EFLAGS: 00050246 [ 1500.545367] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1500.546095] RDX: 0000000000000000 RSI: ffff88801f314000 RDI: 000000002001a000 [ 1500.546840] RBP: 000000002001a000 R08: 0000000000000000 R09: ffff88801f314fff [ 1500.547574] R10: ffffed1003e629ff R11: 0000000000000001 R12: ffff88801f314000 [ 1500.548303] R13: 000000002001b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1500.549055] copyout.part.0+0xdf/0x110 [ 1500.549494] copy_page_to_iter+0x248/0xdd0 [ 1500.549955] filemap_read+0x4ff/0xbb0 [ 1500.550376] ? filemap_get_pages+0x1c90/0x1c90 [ 1500.550865] ? lock_acquire+0x1b2/0x4d0 [ 1500.551285] generic_file_read_iter+0x3cf/0x540 [ 1500.551896] ext4_file_read_iter+0x184/0x490 [ 1500.552456] new_sync_read+0x427/0x6f0 [ 1500.552969] ? __ia32_sys_llseek+0x380/0x380 [ 1500.553465] ? security_file_permission+0xb1/0xd0 [ 1500.553992] vfs_read+0x356/0x5f0 [ 1500.554365] ksys_read+0x12d/0x250 [ 1500.554734] ? __ia32_sys_pwrite64+0x230/0x230 [ 1500.555209] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.555743] do_syscall_64+0x3b/0x90 [ 1500.556144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1500.556675] RIP: 0033:0x7f63a2e8eb19 [ 1500.557056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.558962] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1500.559753] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1500.560486] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1500.561216] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.561955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.562703] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1500.563452] 03:13:49 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8001}}, './file0\x00'}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:13:49 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x30, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x53, 0x0, 0x4) 03:13:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 03:13:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x55, 0x0, 0x4) 03:13:49 executing program 0: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)={{0x0, r0, 0xee00, r1, 0x0, 0x8, 0x7f}, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x406080, 0x18) read(r2, &(0x7f0000000000), 0xfffffdef) r3 = fsmount(r2, 0x1, 0xa) ioctl$AUTOFS_IOC_PROTOVER(r3, 0x80049363, &(0x7f0000000040)) 03:13:49 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x31, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 54) 03:13:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 54) [ 1500.833155] FAULT_INJECTION: forcing a failure. 03:13:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x56, 0x0, 0x4) 03:13:49 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x32, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1500.833155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1500.834622] CPU: 1 PID: 9553 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1500.835465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1500.836662] Call Trace: [ 1500.836938] [ 1500.837177] dump_stack_lvl+0x8b/0xb3 [ 1500.837614] should_fail.cold+0x5/0xa [ 1500.838022] copy_page_to_iter+0x217/0xdd0 [ 1500.838488] filemap_read+0x4ff/0xbb0 [ 1500.838904] ? filemap_get_pages+0x1c90/0x1c90 [ 1500.839389] ? lock_acquire+0x1b2/0x4d0 [ 1500.839804] generic_file_read_iter+0x3cf/0x540 [ 1500.840292] ext4_file_read_iter+0x184/0x490 [ 1500.840762] new_sync_read+0x427/0x6f0 [ 1500.841170] ? __ia32_sys_llseek+0x380/0x380 [ 1500.841645] ? security_file_permission+0xb1/0xd0 [ 1500.842151] vfs_read+0x356/0x5f0 [ 1500.842517] ksys_read+0x12d/0x250 [ 1500.842887] ? __ia32_sys_pwrite64+0x230/0x230 [ 1500.843370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.843923] do_syscall_64+0x3b/0x90 [ 1500.844317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1500.844854] RIP: 0033:0x7f63a2e8eb19 [ 1500.845248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.847162] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1500.847956] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1500.848696] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1500.849429] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.850159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.850881] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1500.851634] [ 1500.860958] FAULT_INJECTION: forcing a failure. [ 1500.860958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1500.863437] CPU: 0 PID: 9554 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1500.865142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1500.867502] Call Trace: [ 1500.868035] [ 1500.868500] dump_stack_lvl+0x8b/0xb3 [ 1500.869341] should_fail.cold+0x5/0xa [ 1500.870169] copy_page_to_iter+0x217/0xdd0 [ 1500.871106] filemap_read+0x4ff/0xbb0 [ 1500.871945] ? filemap_get_pages+0x1c90/0x1c90 [ 1500.872946] ? lock_acquire+0x1b2/0x4d0 [ 1500.873802] generic_file_read_iter+0x3cf/0x540 [ 1500.874805] ext4_file_read_iter+0x184/0x490 [ 1500.875746] new_sync_read+0x427/0x6f0 [ 1500.876581] ? __ia32_sys_llseek+0x380/0x380 [ 1500.877558] ? security_file_permission+0xb1/0xd0 [ 1500.878588] vfs_read+0x356/0x5f0 [ 1500.879341] ksys_read+0x12d/0x250 [ 1500.880103] ? __ia32_sys_pwrite64+0x230/0x230 [ 1500.881088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1500.882187] do_syscall_64+0x3b/0x90 [ 1500.882995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1500.884083] RIP: 0033:0x7f0ad231ab19 [ 1500.884867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1500.888726] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1500.890331] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1500.891834] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1500.893344] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1500.894839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1500.896334] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1500.897868] 03:13:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 55) 03:13:49 executing program 4: ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x383a83, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:13:49 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x33, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:13:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x54, 0x0, 0x4) 03:13:50 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/1395], 0x568) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xff, 0x80}}, './file0\x00'}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1c0000003f0000000000000000000800000000000000"], 0x40000) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000040)={0x6, 'veth1\x00', {0x3}, 0x20}) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'geneve1\x00'}) [ 1501.004262] FAULT_INJECTION: forcing a failure. [ 1501.004262] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1501.006967] CPU: 0 PID: 9570 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1501.008769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1501.011239] Call Trace: [ 1501.011808] [ 1501.012296] dump_stack_lvl+0x8b/0xb3 [ 1501.013156] should_fail.cold+0x5/0xa [ 1501.014040] prepare_alloc_pages+0x17b/0x500 [ 1501.015027] __alloc_pages+0x131/0x4e0 [ 1501.015902] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1501.017256] ? __lock_acquire+0xbac/0x5b70 [ 1501.018219] ? mark_lock+0xfc/0x2e10 [ 1501.019054] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1501.020288] alloc_pages_vma+0xde/0x500 [ 1501.021197] __handle_mm_fault+0xfb3/0x3570 [ 1501.022187] ? lock_is_held_type+0xd7/0x130 [ 1501.023149] ? __pmd_alloc+0x680/0x680 [ 1501.024081] handle_mm_fault+0x2e6/0xa20 [ 1501.024972] do_user_addr_fault+0x54a/0x12a0 [ 1501.025914] exc_page_fault+0xa2/0x1a0 [ 1501.026780] asm_exc_page_fault+0x1e/0x30 [ 1501.027713] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1501.028905] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1501.032868] RSP: 0018:ffff8880411b79f0 EFLAGS: 00050246 [ 1501.034046] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1501.035527] RDX: 0000000000000000 RSI: ffff88801f30b000 RDI: 000000002001b000 [ 1501.037097] RBP: 000000002001b000 R08: 0000000000000000 R09: ffff88801f30bfff [ 1501.038707] R10: ffffed1003e617ff R11: 0000000000000001 R12: ffff88801f30b000 [ 1501.040107] R13: 000000002001c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1501.041651] copyout.part.0+0xdf/0x110 [ 1501.042526] copy_page_to_iter+0x248/0xdd0 [ 1501.043421] filemap_read+0x4ff/0xbb0 [ 1501.044194] ? filemap_get_pages+0x1c90/0x1c90 [ 1501.045132] ? lock_acquire+0x1b2/0x4d0 [ 1501.046247] generic_file_read_iter+0x3cf/0x540 [ 1501.047284] ext4_file_read_iter+0x184/0x490 [ 1501.048218] new_sync_read+0x427/0x6f0 [ 1501.049007] ? __ia32_sys_llseek+0x380/0x380 [ 1501.049949] ? security_file_permission+0xb1/0xd0 [ 1501.051026] vfs_read+0x356/0x5f0 [ 1501.051819] ksys_read+0x12d/0x250 [ 1501.052606] ? __ia32_sys_pwrite64+0x230/0x230 [ 1501.053660] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1501.054802] do_syscall_64+0x3b/0x90 [ 1501.055655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1501.056810] RIP: 0033:0x7f63a2e8eb19 [ 1501.057642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1501.061598] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1501.063255] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1501.064830] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1501.066414] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1501.067990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1501.069592] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1501.071161] 03:13:50 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x34, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x55, 0x0, 0x4) 03:14:04 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x22102, 0x44) read(r0, &(0x7f0000000000), 0xfffffdef) 03:14:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 56) 03:14:04 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/1395], 0x568) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, {0xff, 0x80}}, './file0\x00'}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1c0000003f0000000000000000000800000000000000"], 0x40000) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000040)={0x6, 'veth1\x00', {0x3}, 0x20}) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'geneve1\x00'}) 03:14:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) pwrite64(r0, &(0x7f0000000040)="aa3d6eb445692f0a442d992b9d11", 0xe, 0xa5) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000000)='./file0\x00', 0x9e29e4d503c9460c, 0x189) 03:14:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 55) 03:14:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x35, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x57, 0x0, 0x4) [ 1515.575320] FAULT_INJECTION: forcing a failure. [ 1515.575320] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.576616] CPU: 1 PID: 9592 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1515.577518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1515.578709] Call Trace: [ 1515.578990] [ 1515.579227] dump_stack_lvl+0x8b/0xb3 [ 1515.579642] should_fail.cold+0x5/0xa [ 1515.580058] prepare_alloc_pages+0x17b/0x500 [ 1515.580537] __alloc_pages+0x131/0x4e0 [ 1515.580952] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1515.581616] ? __lock_acquire+0xbac/0x5b70 [ 1515.582073] ? mark_lock+0xfc/0x2e10 [ 1515.582476] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1515.583068] alloc_pages_vma+0xde/0x500 [ 1515.583503] __handle_mm_fault+0xfb3/0x3570 [ 1515.583969] ? lock_is_held_type+0xd7/0x130 [ 1515.584324] FAULT_INJECTION: forcing a failure. [ 1515.584324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1515.584428] ? __pmd_alloc+0x680/0x680 [ 1515.587088] handle_mm_fault+0x2e6/0xa20 [ 1515.587536] do_user_addr_fault+0x54a/0x12a0 [ 1515.588028] exc_page_fault+0xa2/0x1a0 [ 1515.588451] asm_exc_page_fault+0x1e/0x30 [ 1515.588896] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1515.589501] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1515.591481] RSP: 0018:ffff88801d23f9f0 EFLAGS: 00050246 [ 1515.592051] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1515.592825] RDX: 0000000000000000 RSI: ffff88801f30b000 RDI: 000000002001b000 [ 1515.593607] RBP: 000000002001b000 R08: 0000000000000000 R09: ffff88801f30bfff [ 1515.594360] R10: ffffed1003e617ff R11: 0000000000000001 R12: ffff88801f30b000 [ 1515.595118] R13: 000000002001c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1515.595894] copyout.part.0+0xdf/0x110 [ 1515.596331] copy_page_to_iter+0x248/0xdd0 [ 1515.596808] filemap_read+0x4ff/0xbb0 [ 1515.597224] ? filemap_get_pages+0x1c90/0x1c90 [ 1515.597730] ? lock_acquire+0x1b2/0x4d0 [ 1515.598156] generic_file_read_iter+0x3cf/0x540 [ 1515.598654] ext4_file_read_iter+0x184/0x490 [ 1515.599128] new_sync_read+0x427/0x6f0 [ 1515.599543] ? __ia32_sys_llseek+0x380/0x380 [ 1515.600043] ? security_file_permission+0xb1/0xd0 [ 1515.600563] vfs_read+0x356/0x5f0 [ 1515.600943] ksys_read+0x12d/0x250 [ 1515.601327] ? __ia32_sys_pwrite64+0x230/0x230 [ 1515.601840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.602406] do_syscall_64+0x3b/0x90 [ 1515.602825] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1515.603373] RIP: 0033:0x7f0ad231ab19 [ 1515.603774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.605750] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1515.606559] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1515.607322] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1515.608080] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.608855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.609634] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1515.610411] [ 1515.610658] CPU: 0 PID: 9594 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1515.612300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1515.614542] Call Trace: [ 1515.615046] [ 1515.615494] dump_stack_lvl+0x8b/0xb3 [ 1515.616273] should_fail.cold+0x5/0xa [ 1515.617041] copy_page_to_iter+0x217/0xdd0 [ 1515.617922] filemap_read+0x4ff/0xbb0 [ 1515.618706] ? filemap_get_pages+0x1c90/0x1c90 [ 1515.619643] ? lock_acquire+0x1b2/0x4d0 [ 1515.620424] generic_file_read_iter+0x3cf/0x540 [ 1515.621358] ext4_file_read_iter+0x184/0x490 [ 1515.622237] new_sync_read+0x427/0x6f0 [ 1515.623012] ? __ia32_sys_llseek+0x380/0x380 [ 1515.623894] ? security_file_permission+0xb1/0xd0 [ 1515.624854] vfs_read+0x356/0x5f0 [ 1515.625539] ksys_read+0x12d/0x250 [ 1515.626241] ? __ia32_sys_pwrite64+0x230/0x230 [ 1515.627139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1515.628159] do_syscall_64+0x3b/0x90 [ 1515.628894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1515.629921] RIP: 0033:0x7f63a2e8eb19 [ 1515.630637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1515.634143] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 03:14:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x36, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1515.635587] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1515.637052] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1515.638432] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1515.639782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1515.641182] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1515.642619] 03:14:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x37, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x58, 0x0, 0x4) [ 1515.758152] Process accounting paused 03:14:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x56, 0x0, 0x4) 03:14:17 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x11ffffdef) 03:14:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 57) 03:14:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 56) 03:14:17 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/152, 0x98}], 0x1}, 0x20022) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x200}}, {@msize={'msize', 0x3d, 0x1}}, {@nodevmap}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@fowner_gt={'fowner>', r1}}, {@measure}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', r2}}]}}) r3 = syz_open_pts(r0, 0x20001) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) listen(r0, 0x6) 03:14:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x59, 0x0, 0x4) 03:14:17 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, @buffer={0x0, 0xfffffffffffffe65, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0xfffffffffffffffd, 0xfffffffffffffcd3, 0x0, @buffer={0x0, 0x4b, &(0x7f0000000300)=""/75}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r0, &(0x7f0000001040)=""/102400, 0x19000) read(0xffffffffffffffff, 0x0, 0x0) 03:14:17 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x38, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1528.839466] FAULT_INJECTION: forcing a failure. [ 1528.839466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1528.840795] CPU: 0 PID: 9628 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1528.841689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1528.842902] Call Trace: [ 1528.843183] [ 1528.843415] dump_stack_lvl+0x8b/0xb3 [ 1528.843837] should_fail.cold+0x5/0xa [ 1528.844267] copy_page_to_iter+0x217/0xdd0 [ 1528.844750] filemap_read+0x4ff/0xbb0 [ 1528.844920] FAULT_INJECTION: forcing a failure. [ 1528.844920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1528.845176] ? filemap_get_pages+0x1c90/0x1c90 [ 1528.847989] ? lock_acquire+0x1b2/0x4d0 [ 1528.848409] generic_file_read_iter+0x3cf/0x540 [ 1528.848913] ext4_file_read_iter+0x184/0x490 [ 1528.849384] new_sync_read+0x427/0x6f0 [ 1528.849796] ? __ia32_sys_llseek+0x380/0x380 [ 1528.850272] ? security_file_permission+0xb1/0xd0 [ 1528.850780] vfs_read+0x356/0x5f0 [ 1528.851156] ksys_read+0x12d/0x250 [ 1528.851524] ? __ia32_sys_pwrite64+0x230/0x230 [ 1528.852007] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.852546] do_syscall_64+0x3b/0x90 [ 1528.852942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.853468] RIP: 0033:0x7f0ad231ab19 [ 1528.853874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.855761] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1528.856549] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1528.857346] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1528.858122] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.858867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.859642] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1528.860418] [ 1528.860682] CPU: 1 PID: 9632 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1528.862343] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1528.864599] Call Trace: [ 1528.865111] [ 1528.865552] dump_stack_lvl+0x8b/0xb3 [ 1528.866359] should_fail.cold+0x5/0xa [ 1528.867142] prepare_alloc_pages+0x17b/0x500 [ 1528.868032] __alloc_pages+0x131/0x4e0 [ 1528.868816] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1528.870036] ? __lock_acquire+0xbac/0x5b70 [ 1528.870905] ? mark_lock+0xfc/0x2e10 [ 1528.871645] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1528.872763] alloc_pages_vma+0xde/0x500 [ 1528.873574] __handle_mm_fault+0xfb3/0x3570 [ 1528.874470] ? lock_is_held_type+0xd7/0x130 [ 1528.875334] ? __pmd_alloc+0x680/0x680 [ 1528.876161] handle_mm_fault+0x2e6/0xa20 [ 1528.876993] do_user_addr_fault+0x54a/0x12a0 [ 1528.877900] exc_page_fault+0xa2/0x1a0 [ 1528.878682] asm_exc_page_fault+0x1e/0x30 03:14:17 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000000)) [ 1528.879514] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1528.880802] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1528.884521] RSP: 0018:ffff888017e179f0 EFLAGS: 00050246 [ 1528.885595] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1528.887031] RDX: 0000000000000000 RSI: ffff88801f33a000 RDI: 000000002001c000 [ 1528.888452] RBP: 000000002001c000 R08: 0000000000000000 R09: ffff88801f33afff [ 1528.889891] R10: ffffed1003e675ff R11: 0000000000000001 R12: ffff88801f33a000 [ 1528.891299] R13: 000000002001d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1528.892734] copyout.part.0+0xdf/0x110 [ 1528.893524] copy_page_to_iter+0x248/0xdd0 [ 1528.894440] filemap_read+0x4ff/0xbb0 [ 1528.895236] ? filemap_get_pages+0x1c90/0x1c90 [ 1528.896180] ? lock_acquire+0x1b2/0x4d0 [ 1528.896984] generic_file_read_iter+0x3cf/0x540 [ 1528.897939] ext4_file_read_iter+0x184/0x490 [ 1528.898847] new_sync_read+0x427/0x6f0 [ 1528.899778] ? __ia32_sys_llseek+0x380/0x380 [ 1528.900702] ? security_file_permission+0xb1/0xd0 [ 1528.901688] vfs_read+0x356/0x5f0 [ 1528.902390] ksys_read+0x12d/0x250 [ 1528.903102] ? __ia32_sys_pwrite64+0x230/0x230 [ 1528.904005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.905029] do_syscall_64+0x3b/0x90 [ 1528.905792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.906796] RIP: 0033:0x7f63a2e8eb19 [ 1528.907525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.911125] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1528.912608] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1528.914002] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1528.915378] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 03:14:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 57) [ 1528.916748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1528.918249] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1528.919659] 03:14:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x57, 0x0, 0x4) [ 1528.971023] FAULT_INJECTION: forcing a failure. [ 1528.971023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1528.972442] CPU: 0 PID: 9646 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1528.973315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1528.974527] Call Trace: [ 1528.974800] [ 1528.975033] dump_stack_lvl+0x8b/0xb3 [ 1528.975462] should_fail.cold+0x5/0xa [ 1528.975871] prepare_alloc_pages+0x17b/0x500 [ 1528.976347] __alloc_pages+0x131/0x4e0 [ 1528.976762] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1528.977400] ? __lock_acquire+0xbac/0x5b70 [ 1528.977863] ? mark_lock+0xfc/0x2e10 [ 1528.978260] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1528.978857] alloc_pages_vma+0xde/0x500 [ 1528.979291] __handle_mm_fault+0xfb3/0x3570 [ 1528.979758] ? lock_is_held_type+0xd7/0x130 [ 1528.980216] ? __pmd_alloc+0x680/0x680 [ 1528.980656] handle_mm_fault+0x2e6/0xa20 [ 1528.981097] do_user_addr_fault+0x54a/0x12a0 [ 1528.981574] exc_page_fault+0xa2/0x1a0 [ 1528.981994] asm_exc_page_fault+0x1e/0x30 [ 1528.982439] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1528.983021] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1528.984948] RSP: 0018:ffff88801b4c79f0 EFLAGS: 00050246 [ 1528.985509] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1528.986273] RDX: 0000000000000000 RSI: ffff88801f33a000 RDI: 000000002001c000 [ 1528.987020] RBP: 000000002001c000 R08: 0000000000000000 R09: ffff88801f33afff [ 1528.987765] R10: ffffed1003e675ff R11: 0000000000000001 R12: ffff88801f33a000 [ 1528.988514] R13: 000000002001d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1528.989275] copyout.part.0+0xdf/0x110 [ 1528.989702] copy_page_to_iter+0x248/0xdd0 [ 1528.990172] filemap_read+0x4ff/0xbb0 [ 1528.990590] ? filemap_get_pages+0x1c90/0x1c90 [ 1528.991084] ? lock_acquire+0x1b2/0x4d0 [ 1528.991512] generic_file_read_iter+0x3cf/0x540 [ 1528.992012] ext4_file_read_iter+0x184/0x490 [ 1528.992490] new_sync_read+0x427/0x6f0 [ 1528.992907] ? __ia32_sys_llseek+0x380/0x380 [ 1528.993389] ? security_file_permission+0xb1/0xd0 [ 1528.993919] vfs_read+0x356/0x5f0 [ 1528.994294] ksys_read+0x12d/0x250 [ 1528.994681] ? __ia32_sys_pwrite64+0x230/0x230 [ 1528.995168] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1528.995726] do_syscall_64+0x3b/0x90 [ 1528.996137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1528.996683] RIP: 0033:0x7f0ad231ab19 [ 1528.997075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1528.999045] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1528.999848] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1529.000605] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1529.001354] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.002131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1529.002879] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1529.003654] 03:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5a, 0x0, 0x4) 03:14:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x184) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:14:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 58) 03:14:33 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f00000000c0)={0x1, 0x0, @status={[0x7, 0x9, 0x1, 0x1, 0xfff, 0xff]}, [0x7fff, 0xa7fc, 0xb8, 0x3, 0x8, 0x7, 0x20, 0xdb3, 0x5, 0xffffffffffffffc1, 0x100000000, 0x1f, 0xc08, 0x8001, 0x0, 0x8001, 0x0, 0x4, 0xcf7, 0x100000001, 0x7, 0x577, 0x4, 0x52, 0x6, 0x6, 0x4, 0x90, 0x1f, 0x101, 0x4, 0xf02c, 0x1f, 0x0, 0xf2f5, 0x1, 0x40, 0x5, 0x6, 0x100000000, 0x3e1, 0x8, 0x5, 0x400, 0x4, 0x2000000, 0xffffffffffffffff, 0x3, 0x66fb, 0x40, 0x581, 0x401, 0x6, 0xffffffffffffffff, 0x3b462c61, 0xd8, 0x9b, 0x0, 0x8, 0x3, 0x3, 0xc29, 0x2a, 0x8e]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') read(r1, &(0x7f0000000000), 0xfffffdef) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000b80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", ""]}, 0x14}}, 0x8100) 03:14:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x39, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x58, 0x0, 0x4) 03:14:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 58) 03:14:33 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$EXT4_IOC_GETSTATE(r0, 0x40046629, &(0x7f0000000000)) [ 1543.993572] FAULT_INJECTION: forcing a failure. [ 1543.993572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1543.994878] CPU: 1 PID: 9665 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1543.995728] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1543.996917] Call Trace: [ 1543.997202] [ 1543.997439] dump_stack_lvl+0x8b/0xb3 [ 1543.997855] should_fail.cold+0x5/0xa [ 1543.998270] copy_page_to_iter+0x217/0xdd0 [ 1543.998732] filemap_read+0x4ff/0xbb0 [ 1543.999152] ? filemap_get_pages+0x1c90/0x1c90 [ 1543.999644] ? lock_acquire+0x1b2/0x4d0 [ 1544.000066] generic_file_read_iter+0x3cf/0x540 [ 1544.000560] ext4_file_read_iter+0x184/0x490 [ 1544.001027] new_sync_read+0x427/0x6f0 [ 1544.001440] ? __ia32_sys_llseek+0x380/0x380 [ 1544.001927] ? security_file_permission+0xb1/0xd0 [ 1544.002432] vfs_read+0x356/0x5f0 [ 1544.002799] ksys_read+0x12d/0x250 [ 1544.003169] ? __ia32_sys_pwrite64+0x230/0x230 [ 1544.003644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1544.004186] do_syscall_64+0x3b/0x90 [ 1544.004588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1544.005123] RIP: 0033:0x7f63a2e8eb19 [ 1544.005508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.007408] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1544.008193] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1544.008926] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1544.009665] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.010409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.011172] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1544.011918] [ 1544.041261] FAULT_INJECTION: forcing a failure. [ 1544.041261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1544.043711] CPU: 0 PID: 9676 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1544.045354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1544.047608] Call Trace: [ 1544.048129] [ 1544.048570] dump_stack_lvl+0x8b/0xb3 [ 1544.049360] should_fail.cold+0x5/0xa 03:14:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 59) [ 1544.050179] copy_page_to_iter+0x217/0xdd0 [ 1544.051203] filemap_read+0x4ff/0xbb0 [ 1544.052105] ? filemap_get_pages+0x1c90/0x1c90 [ 1544.053354] ? lock_acquire+0x1b2/0x4d0 [ 1544.054457] generic_file_read_iter+0x3cf/0x540 [ 1544.055704] ext4_file_read_iter+0x184/0x490 [ 1544.056838] new_sync_read+0x427/0x6f0 [ 1544.057698] ? __ia32_sys_llseek+0x380/0x380 03:14:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) read(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) accept4(r3, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x80, 0x40000) [ 1544.058725] ? security_file_permission+0xb1/0xd0 [ 1544.059742] vfs_read+0x356/0x5f0 [ 1544.060482] ksys_read+0x12d/0x250 [ 1544.061228] ? __ia32_sys_pwrite64+0x230/0x230 [ 1544.062194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1544.063263] do_syscall_64+0x3b/0x90 [ 1544.064024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1544.065077] RIP: 0033:0x7f0ad231ab19 [ 1544.065821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.069535] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1544.071108] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1544.072533] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1544.073978] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.075443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.076192] FAULT_INJECTION: forcing a failure. [ 1544.076192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1544.076869] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1544.076916] [ 1544.080003] CPU: 1 PID: 9679 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1544.080977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1544.082145] Call Trace: [ 1544.082416] [ 1544.082647] dump_stack_lvl+0x8b/0xb3 [ 1544.083062] should_fail.cold+0x5/0xa [ 1544.083474] prepare_alloc_pages+0x17b/0x500 [ 1544.083947] __alloc_pages+0x131/0x4e0 [ 1544.084353] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1544.084984] ? __lock_acquire+0xbac/0x5b70 [ 1544.085432] ? mark_lock+0xfc/0x2e10 [ 1544.085822] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1544.086417] alloc_pages_vma+0xde/0x500 [ 1544.086842] __handle_mm_fault+0xfb3/0x3570 [ 1544.087309] ? lock_is_held_type+0xd7/0x130 [ 1544.087773] ? __pmd_alloc+0x680/0x680 [ 1544.088203] handle_mm_fault+0x2e6/0xa20 [ 1544.088647] do_user_addr_fault+0x54a/0x12a0 [ 1544.089119] exc_page_fault+0xa2/0x1a0 [ 1544.089540] asm_exc_page_fault+0x1e/0x30 [ 1544.090006] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1544.090584] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1544.092477] RSP: 0018:ffff88804498f9f0 EFLAGS: 00050246 [ 1544.093034] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1544.093765] RDX: 0000000000000000 RSI: ffff88801f33b000 RDI: 000000002001d000 [ 1544.094504] RBP: 000000002001d000 R08: 0000000000000000 R09: ffff88801f33bfff [ 1544.095231] R10: ffffed1003e677ff R11: 0000000000000001 R12: ffff88801f33b000 [ 1544.095959] R13: 000000002001e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1544.096728] copyout.part.0+0xdf/0x110 [ 1544.097155] copy_page_to_iter+0x248/0xdd0 [ 1544.097621] filemap_read+0x4ff/0xbb0 [ 1544.098049] ? filemap_get_pages+0x1c90/0x1c90 [ 1544.098543] ? lock_acquire+0x1b2/0x4d0 [ 1544.098971] generic_file_read_iter+0x3cf/0x540 [ 1544.099465] ext4_file_read_iter+0x184/0x490 [ 1544.099940] new_sync_read+0x427/0x6f0 [ 1544.100356] ? __ia32_sys_llseek+0x380/0x380 [ 1544.100839] ? security_file_permission+0xb1/0xd0 [ 1544.101372] vfs_read+0x356/0x5f0 [ 1544.101742] ksys_read+0x12d/0x250 [ 1544.102135] ? __ia32_sys_pwrite64+0x230/0x230 [ 1544.102616] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1544.103172] do_syscall_64+0x3b/0x90 [ 1544.103588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1544.104161] RIP: 0033:0x7f63a2e8eb19 [ 1544.104565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1544.106578] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1544.107406] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1544.108154] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1544.108925] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.109663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1544.110451] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1544.111223] 03:14:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x140) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 03:14:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5b, 0x0, 0x4) 03:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xe20002}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r1, 0x800, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x2, 0x18}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x12b}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x40}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x800) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r3, &(0x7f0000000000), 0xfffffdef) 03:14:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x59, 0x0, 0x4) 03:14:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5a, 0x0, 0x4) 03:14:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:46 executing program 0: ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101740, 0x4c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r4, 0x29, 0x5, 0x0, 0x401, 0x0, @dev={0xfe, 0x80, '\x00', 0x33}, @private2, 0x80, 0x8000, 0x5, 0x2}}) 03:14:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 60) 03:14:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 59) 03:14:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5a, 0x0, 0x4) 03:14:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x653, 0x1, 0x8, 0x40, 0x7ff, 0x1000}) read(0xffffffffffffffff, 0x0, 0x0) 03:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5c, 0x0, 0x4) [ 1557.787302] FAULT_INJECTION: forcing a failure. [ 1557.787302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1557.789831] CPU: 0 PID: 9726 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1557.791566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1557.793914] Call Trace: [ 1557.794465] [ 1557.794942] dump_stack_lvl+0x8b/0xb3 [ 1557.795773] should_fail.cold+0x5/0xa [ 1557.796598] copy_page_to_iter+0x217/0xdd0 03:14:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1557.797530] filemap_read+0x4ff/0xbb0 [ 1557.798480] ? filemap_get_pages+0x1c90/0x1c90 [ 1557.799476] ? lock_acquire+0x1b2/0x4d0 [ 1557.800321] generic_file_read_iter+0x3cf/0x540 [ 1557.801310] ext4_file_read_iter+0x184/0x490 [ 1557.802266] new_sync_read+0x427/0x6f0 [ 1557.803099] ? __ia32_sys_llseek+0x380/0x380 [ 1557.804048] ? security_file_permission+0xb1/0xd0 [ 1557.805079] vfs_read+0x356/0x5f0 [ 1557.805828] ksys_read+0x12d/0x250 [ 1557.806588] ? __ia32_sys_pwrite64+0x230/0x230 [ 1557.807568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1557.808651] do_syscall_64+0x3b/0x90 [ 1557.809460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1557.810554] RIP: 0033:0x7f63a2e8eb19 [ 1557.811335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1557.815148] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1557.816736] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1557.818230] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1557.819739] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.821210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1557.822710] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1557.824212] 03:14:46 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xf2) creat(&(0x7f0000000040)='./file0/file0\x00', 0x42) read(r0, &(0x7f0000000000)=""/7, 0x7) [ 1557.845175] FAULT_INJECTION: forcing a failure. 03:14:46 executing program 2: ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101740, 0x4c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r4, 0x29, 0x5, 0x0, 0x401, 0x0, @dev={0xfe, 0x80, '\x00', 0x33}, @private2, 0x80, 0x8000, 0x5, 0x2}}) [ 1557.845175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1557.848093] CPU: 0 PID: 9725 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1557.849824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1557.852220] Call Trace: [ 1557.852763] [ 1557.853235] dump_stack_lvl+0x8b/0xb3 [ 1557.854072] should_fail.cold+0x5/0xa [ 1557.854916] prepare_alloc_pages+0x17b/0x500 [ 1557.855877] __alloc_pages+0x131/0x4e0 [ 1557.856707] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1557.858007] ? __lock_acquire+0xbac/0x5b70 [ 1557.858947] ? mark_lock+0xfc/0x2e10 [ 1557.859745] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1557.860944] alloc_pages_vma+0xde/0x500 [ 1557.861814] __handle_mm_fault+0xfb3/0x3570 [ 1557.862766] ? lock_is_held_type+0xd7/0x130 [ 1557.863689] ? __pmd_alloc+0x680/0x680 [ 1557.864586] handle_mm_fault+0x2e6/0xa20 [ 1557.865478] do_user_addr_fault+0x54a/0x12a0 [ 1557.866470] exc_page_fault+0xa2/0x1a0 [ 1557.867301] asm_exc_page_fault+0x1e/0x30 [ 1557.868181] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1557.869337] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1557.873255] RSP: 0018:ffff8880455a79f0 EFLAGS: 00050246 [ 1557.874399] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1557.875914] RDX: 0000000000000000 RSI: ffff88801f33b000 RDI: 000000002001d000 [ 1557.877415] RBP: 000000002001d000 R08: 0000000000000000 R09: ffff88801f33bfff [ 1557.878942] R10: ffffed1003e677ff R11: 0000000000000001 R12: ffff88801f33b000 [ 1557.880445] R13: 000000002001e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1557.882006] copyout.part.0+0xdf/0x110 [ 1557.882864] copy_page_to_iter+0x248/0xdd0 [ 1557.883800] filemap_read+0x4ff/0xbb0 [ 1557.884642] ? filemap_get_pages+0x1c90/0x1c90 [ 1557.885653] ? lock_acquire+0x1b2/0x4d0 [ 1557.886542] generic_file_read_iter+0x3cf/0x540 [ 1557.887549] ext4_file_read_iter+0x184/0x490 [ 1557.888509] new_sync_read+0x427/0x6f0 [ 1557.889347] ? __ia32_sys_llseek+0x380/0x380 [ 1557.890333] ? security_file_permission+0xb1/0xd0 03:14:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:46 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x543000, 0x1c0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000001040)=""/102391, 0x18ff7) [ 1557.891367] vfs_read+0x356/0x5f0 [ 1557.892179] ksys_read+0x12d/0x250 [ 1557.892937] ? __ia32_sys_pwrite64+0x230/0x230 [ 1557.893903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1557.895044] do_syscall_64+0x3b/0x90 [ 1557.895844] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1557.896916] RIP: 0033:0x7f0ad231ab19 [ 1557.897693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1557.901607] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1557.903223] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1557.904735] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1557.906249] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.907758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1557.909259] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1557.910817] 03:14:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5b, 0x0, 0x4) 03:14:47 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x101000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200, 0x20) openat(r2, &(0x7f0000000040)='./file0\x00', 0x145843, 0x0) 03:14:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5d, 0x0, 0x4) 03:14:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 61) 03:14:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x41, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1558.020552] FAULT_INJECTION: forcing a failure. [ 1558.020552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1558.021948] CPU: 1 PID: 9749 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1558.022824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1558.023979] Call Trace: [ 1558.024244] [ 1558.024474] dump_stack_lvl+0x8b/0xb3 [ 1558.024892] should_fail.cold+0x5/0xa [ 1558.025303] prepare_alloc_pages+0x17b/0x500 [ 1558.025778] __alloc_pages+0x131/0x4e0 [ 1558.026221] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1558.026846] ? __lock_acquire+0xbac/0x5b70 [ 1558.027309] ? mark_lock+0xfc/0x2e10 [ 1558.027694] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1558.028283] alloc_pages_vma+0xde/0x500 [ 1558.028710] __handle_mm_fault+0xfb3/0x3570 [ 1558.029165] ? lock_is_held_type+0xd7/0x130 [ 1558.029632] ? __pmd_alloc+0x680/0x680 [ 1558.030069] handle_mm_fault+0x2e6/0xa20 [ 1558.030523] do_user_addr_fault+0x54a/0x12a0 [ 1558.031004] exc_page_fault+0xa2/0x1a0 [ 1558.031422] asm_exc_page_fault+0x1e/0x30 [ 1558.031858] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1558.032435] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1558.034333] RSP: 0018:ffff8880400c79f0 EFLAGS: 00050246 [ 1558.034887] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1558.035641] RDX: 0000000000000000 RSI: ffff88801f33c000 RDI: 000000002001e000 [ 1558.036377] RBP: 000000002001e000 R08: 0000000000000000 R09: ffff88801f33cfff [ 1558.037104] R10: ffffed1003e679ff R11: 0000000000000001 R12: ffff88801f33c000 [ 1558.037829] R13: 000000002001f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1558.038597] copyout.part.0+0xdf/0x110 [ 1558.039008] copy_page_to_iter+0x248/0xdd0 [ 1558.039466] filemap_read+0x4ff/0xbb0 [ 1558.039875] ? filemap_get_pages+0x1c90/0x1c90 [ 1558.040372] ? lock_acquire+0x1b2/0x4d0 [ 1558.040789] generic_file_read_iter+0x3cf/0x540 [ 1558.041279] ext4_file_read_iter+0x184/0x490 [ 1558.041744] new_sync_read+0x427/0x6f0 [ 1558.042164] ? __ia32_sys_llseek+0x380/0x380 [ 1558.042630] ? security_file_permission+0xb1/0xd0 [ 1558.043138] vfs_read+0x356/0x5f0 [ 1558.043508] ksys_read+0x12d/0x250 [ 1558.043877] ? __ia32_sys_pwrite64+0x230/0x230 [ 1558.044351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1558.044894] do_syscall_64+0x3b/0x90 [ 1558.045296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1558.045833] RIP: 0033:0x7f63a2e8eb19 [ 1558.046235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.048131] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1558.048906] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1558.049643] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1558.050383] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.051115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.051840] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1558.052587] 03:14:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5e, 0x0, 0x4) 03:14:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5a, 0x0, 0x4) [ 1558.193197] Process accounting resumed 03:14:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 60) 03:14:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5c, 0x0, 0x4) 03:14:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 62) 03:14:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5a, 0x0, 0x4) 03:14:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) pwritev(r0, &(0x7f0000000200), 0x0, 0x201, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000080)=0x1af, 0x4) read(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f00000000c0)=0x7) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x24040, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000002040)=""/4096) read(r4, &(0x7f0000001040)=""/4096, 0x1000) read(r3, &(0x7f0000000000)=""/118, 0x76) 03:14:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x42, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:14:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5f, 0x0, 0x4) [ 1558.232346] FAULT_INJECTION: forcing a failure. [ 1558.232346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1558.234842] CPU: 0 PID: 9764 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1558.236506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1558.238790] Call Trace: [ 1558.239303] [ 1558.239752] dump_stack_lvl+0x8b/0xb3 [ 1558.240537] should_fail.cold+0x5/0xa [ 1558.241319] copy_page_to_iter+0x217/0xdd0 [ 1558.242220] filemap_read+0x4ff/0xbb0 [ 1558.243067] ? filemap_get_pages+0x1c90/0x1c90 [ 1558.244260] ? lock_acquire+0x1b2/0x4d0 [ 1558.245235] generic_file_read_iter+0x3cf/0x540 [ 1558.246290] ext4_file_read_iter+0x184/0x490 [ 1558.247283] new_sync_read+0x427/0x6f0 [ 1558.248155] ? __ia32_sys_llseek+0x380/0x380 [ 1558.249154] ? security_file_permission+0xb1/0xd0 [ 1558.250242] vfs_read+0x356/0x5f0 [ 1558.250973] ksys_read+0x12d/0x250 [ 1558.251681] ? __ia32_sys_pwrite64+0x230/0x230 [ 1558.252588] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1558.253606] do_syscall_64+0x3b/0x90 [ 1558.254368] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1558.255390] RIP: 0033:0x7f63a2e8eb19 [ 1558.256113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.259773] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1558.261253] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1558.262666] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1558.264062] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.265457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.266853] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1558.268265] 03:14:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x43, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1558.320607] FAULT_INJECTION: forcing a failure. [ 1558.320607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1558.321948] CPU: 1 PID: 9777 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1558.322840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1558.324016] Call Trace: [ 1558.324284] [ 1558.324515] dump_stack_lvl+0x8b/0xb3 [ 1558.324934] should_fail.cold+0x5/0xa [ 1558.325344] copy_page_to_iter+0x217/0xdd0 [ 1558.325806] filemap_read+0x4ff/0xbb0 [ 1558.326247] ? filemap_get_pages+0x1c90/0x1c90 [ 1558.326738] ? lock_acquire+0x1b2/0x4d0 [ 1558.327164] generic_file_read_iter+0x3cf/0x540 [ 1558.327658] ext4_file_read_iter+0x184/0x490 [ 1558.328119] new_sync_read+0x427/0x6f0 [ 1558.328529] ? __ia32_sys_llseek+0x380/0x380 [ 1558.329013] ? security_file_permission+0xb1/0xd0 [ 1558.329526] vfs_read+0x356/0x5f0 [ 1558.329905] ksys_read+0x12d/0x250 [ 1558.330287] ? __ia32_sys_pwrite64+0x230/0x230 [ 1558.330766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1558.331313] do_syscall_64+0x3b/0x90 [ 1558.331722] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1558.332261] RIP: 0033:0x7f0ad231ab19 [ 1558.332659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1558.334542] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1558.335321] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1558.336093] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1558.336828] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.337573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1558.338329] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1558.339079] 03:15:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/102386, 0x18ff2) read(r0, &(0x7f0000000000)=""/37, 0x25) read(0xffffffffffffffff, 0x0, 0x0) 03:15:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x44, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:02 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x6, 0x200000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x2, 0x62}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@rts={{}, {}, @device_b, @broadcast}}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x20004080) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) 03:15:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5d, 0x0, 0x4) 03:15:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x60, 0x0, 0x4) 03:15:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 61) 03:15:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) read(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r4}) accept4(r3, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x80, 0x40000) 03:15:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 63) [ 1573.190922] FAULT_INJECTION: forcing a failure. [ 1573.190922] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1573.192250] CPU: 1 PID: 9805 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1573.193118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1573.194297] Call Trace: [ 1573.194598] [ 1573.194834] dump_stack_lvl+0x8b/0xb3 [ 1573.195244] should_fail.cold+0x5/0xa [ 1573.195648] prepare_alloc_pages+0x17b/0x500 [ 1573.196125] __alloc_pages+0x131/0x4e0 [ 1573.196536] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1573.197182] ? __lock_acquire+0xbac/0x5b70 [ 1573.197640] ? mark_lock+0xfc/0x2e10 [ 1573.198032] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1573.198641] alloc_pages_vma+0xde/0x500 [ 1573.199082] __handle_mm_fault+0xfb3/0x3570 [ 1573.199548] ? lock_is_held_type+0xd7/0x130 [ 1573.200011] ? __pmd_alloc+0x680/0x680 [ 1573.200447] handle_mm_fault+0x2e6/0xa20 [ 1573.200896] do_user_addr_fault+0x54a/0x12a0 [ 1573.201386] exc_page_fault+0xa2/0x1a0 [ 1573.201811] asm_exc_page_fault+0x1e/0x30 [ 1573.202260] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1573.202859] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1573.204864] RSP: 0018:ffff8880421879f0 EFLAGS: 00050246 [ 1573.205445] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1573.206229] RDX: 0000000000000000 RSI: ffff88801f33c000 RDI: 000000002001e000 [ 1573.207025] RBP: 000000002001e000 R08: 0000000000000000 R09: ffff88801f33cfff [ 1573.207804] R10: ffffed1003e679ff R11: 0000000000000001 R12: ffff88801f33c000 [ 1573.208576] R13: 000000002001f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1573.209377] copyout.part.0+0xdf/0x110 [ 1573.209812] copy_page_to_iter+0x248/0xdd0 [ 1573.210292] filemap_read+0x4ff/0xbb0 [ 1573.210741] ? filemap_get_pages+0x1c90/0x1c90 [ 1573.211263] ? lock_acquire+0x1b2/0x4d0 [ 1573.211695] generic_file_read_iter+0x3cf/0x540 [ 1573.212206] ext4_file_read_iter+0x184/0x490 [ 1573.212702] new_sync_read+0x427/0x6f0 [ 1573.213137] ? __ia32_sys_llseek+0x380/0x380 [ 1573.213628] ? security_file_permission+0xb1/0xd0 [ 1573.214166] vfs_read+0x356/0x5f0 [ 1573.214564] ksys_read+0x12d/0x250 [ 1573.214956] ? __ia32_sys_pwrite64+0x230/0x230 [ 1573.215463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.216035] do_syscall_64+0x3b/0x90 [ 1573.216453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1573.217024] RIP: 0033:0x7f0ad231ab19 [ 1573.217426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1573.219446] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1573.220274] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1573.221049] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1573.221828] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.222605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1573.223369] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1573.224161] [ 1573.226305] FAULT_INJECTION: forcing a failure. [ 1573.226305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1573.227659] CPU: 1 PID: 9807 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1573.228548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1573.229775] Call Trace: [ 1573.230054] [ 1573.230293] dump_stack_lvl+0x8b/0xb3 [ 1573.230730] should_fail.cold+0x5/0xa [ 1573.231154] prepare_alloc_pages+0x17b/0x500 [ 1573.231643] __alloc_pages+0x131/0x4e0 [ 1573.232074] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1573.232742] ? __lock_acquire+0xbac/0x5b70 [ 1573.233224] ? mark_lock+0xfc/0x2e10 [ 1573.233638] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1573.234254] alloc_pages_vma+0xde/0x500 [ 1573.234686] __handle_mm_fault+0xfb3/0x3570 [ 1573.235167] ? lock_is_held_type+0xd7/0x130 [ 1573.235641] ? __pmd_alloc+0x680/0x680 [ 1573.236091] handle_mm_fault+0x2e6/0xa20 [ 1573.236546] do_user_addr_fault+0x54a/0x12a0 [ 1573.237044] exc_page_fault+0xa2/0x1a0 [ 1573.237474] asm_exc_page_fault+0x1e/0x30 [ 1573.237927] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1573.238537] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1573.240455] RSP: 0018:ffff888037f479f0 EFLAGS: 00050246 [ 1573.241045] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1573.241834] RDX: 0000000000000000 RSI: ffff88801f33d000 RDI: 000000002001f000 [ 1573.242617] RBP: 000000002001f000 R08: 0000000000000000 R09: ffff88801f33dfff [ 1573.243401] R10: ffffed1003e67bff R11: 0000000000000001 R12: ffff88801f33d000 [ 1573.244156] R13: 0000000020020000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1573.244907] copyout.part.0+0xdf/0x110 [ 1573.245327] copy_page_to_iter+0x248/0xdd0 [ 1573.245798] filemap_read+0x4ff/0xbb0 [ 1573.246220] ? filemap_get_pages+0x1c90/0x1c90 [ 1573.246720] ? lock_acquire+0x1b2/0x4d0 [ 1573.247150] generic_file_read_iter+0x3cf/0x540 [ 1573.247660] ext4_file_read_iter+0x184/0x490 [ 1573.248138] new_sync_read+0x427/0x6f0 [ 1573.248552] ? __ia32_sys_llseek+0x380/0x380 [ 1573.249034] ? security_file_permission+0xb1/0xd0 [ 1573.249566] vfs_read+0x356/0x5f0 [ 1573.249941] ksys_read+0x12d/0x250 [ 1573.250318] ? __ia32_sys_pwrite64+0x230/0x230 [ 1573.250831] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1573.251397] do_syscall_64+0x3b/0x90 [ 1573.251805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1573.252350] RIP: 0033:0x7f63a2e8eb19 [ 1573.252755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1573.254686] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1573.255510] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1573.256248] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1573.256979] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1573.257764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1573.258539] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1573.259326] 03:15:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x45, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x61, 0x0, 0x4) 03:15:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5e, 0x0, 0x4) 03:15:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x5f, 0x0, 0x4) 03:15:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x62, 0x0, 0x4) 03:15:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 62) 03:15:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x184) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:15:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 64) 03:15:14 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x46, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:14 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) openat(r0, &(0x7f0000000040)='./file0\x00', 0x42000, 0x102) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r1}, 0x8, 0x1ecf, 0x7}) [ 1585.911491] FAULT_INJECTION: forcing a failure. [ 1585.911491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1585.912794] CPU: 0 PID: 9832 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1585.913656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1585.914852] Call Trace: [ 1585.915123] [ 1585.915356] dump_stack_lvl+0x8b/0xb3 [ 1585.915773] should_fail.cold+0x5/0xa [ 1585.916180] copy_page_to_iter+0x217/0xdd0 [ 1585.916641] filemap_read+0x4ff/0xbb0 [ 1585.917058] ? filemap_get_pages+0x1c90/0x1c90 [ 1585.917555] ? lock_acquire+0x1b2/0x4d0 [ 1585.917982] generic_file_read_iter+0x3cf/0x540 [ 1585.918480] ext4_file_read_iter+0x184/0x490 [ 1585.918962] new_sync_read+0x427/0x6f0 [ 1585.919371] ? __ia32_sys_llseek+0x380/0x380 [ 1585.919851] ? security_file_permission+0xb1/0xd0 [ 1585.920363] vfs_read+0x356/0x5f0 [ 1585.920735] ksys_read+0x12d/0x250 [ 1585.921121] ? __ia32_sys_pwrite64+0x230/0x230 [ 1585.921624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1585.922188] do_syscall_64+0x3b/0x90 [ 1585.922608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1585.923160] RIP: 0033:0x7f0ad231ab19 [ 1585.923555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1585.925513] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1585.926344] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1585.926639] FAULT_INJECTION: forcing a failure. [ 1585.926639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1585.927109] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1585.927120] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1585.927129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1585.927138] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1585.927162] [ 1585.932802] CPU: 1 PID: 9833 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1585.934540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1585.936871] Call Trace: [ 1585.937402] [ 1585.937874] dump_stack_lvl+0x8b/0xb3 [ 1585.938702] should_fail.cold+0x5/0xa [ 1585.939514] copy_page_to_iter+0x217/0xdd0 [ 1585.940430] filemap_read+0x4ff/0xbb0 [ 1585.941251] ? filemap_get_pages+0x1c90/0x1c90 [ 1585.942410] ? lock_acquire+0x1b2/0x4d0 [ 1585.943293] generic_file_read_iter+0x3cf/0x540 [ 1585.944470] ext4_file_read_iter+0x184/0x490 [ 1585.945723] new_sync_read+0x427/0x6f0 [ 1585.946796] ? __ia32_sys_llseek+0x380/0x380 [ 1585.947917] ? security_file_permission+0xb1/0xd0 [ 1585.948959] vfs_read+0x356/0x5f0 [ 1585.949834] ksys_read+0x12d/0x250 [ 1585.950605] ? __ia32_sys_pwrite64+0x230/0x230 [ 1585.951731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1585.952831] do_syscall_64+0x3b/0x90 [ 1585.953758] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1585.954865] RIP: 0033:0x7f63a2e8eb19 [ 1585.955641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1585.960105] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1585.961655] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1585.963100] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1585.964530] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1585.965955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1585.967402] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1585.968854] 03:15:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1b) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x7ff) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r6}) setns(r1, 0x0) setsockopt$inet6_int(r5, 0x29, 0xe6, &(0x7f0000000040)=0xa26, 0x4) read(r3, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:15:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 63) 03:15:15 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x38, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x63, 0x0, 0x4) [ 1586.036736] FAULT_INJECTION: forcing a failure. [ 1586.036736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1586.038072] CPU: 0 PID: 9841 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1586.038932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1586.040019] Call Trace: [ 1586.040288] [ 1586.040521] dump_stack_lvl+0x8b/0xb3 [ 1586.040934] should_fail.cold+0x5/0xa [ 1586.041336] prepare_alloc_pages+0x17b/0x500 [ 1586.041804] __alloc_pages+0x131/0x4e0 [ 1586.042219] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1586.042865] ? __lock_acquire+0xbac/0x5b70 [ 1586.043318] ? mark_lock+0xfc/0x2e10 [ 1586.043706] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1586.044282] alloc_pages_vma+0xde/0x500 [ 1586.044702] __handle_mm_fault+0xfb3/0x3570 [ 1586.045173] ? lock_is_held_type+0xd7/0x130 [ 1586.045596] ? __pmd_alloc+0x680/0x680 [ 1586.046028] handle_mm_fault+0x2e6/0xa20 [ 1586.046466] do_user_addr_fault+0x54a/0x12a0 [ 1586.046962] exc_page_fault+0xa2/0x1a0 [ 1586.047374] asm_exc_page_fault+0x1e/0x30 [ 1586.047807] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1586.048373] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1586.050272] RSP: 0018:ffff88803ca579f0 EFLAGS: 00050246 [ 1586.050833] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1586.051584] RDX: 0000000000000000 RSI: ffff88801f33d000 RDI: 000000002001f000 [ 1586.052343] RBP: 000000002001f000 R08: 0000000000000000 R09: ffff88801f33dfff [ 1586.053092] R10: ffffed1003e67bff R11: 0000000000000001 R12: ffff88801f33d000 [ 1586.053782] R13: 0000000020020000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1586.054558] copyout.part.0+0xdf/0x110 [ 1586.054989] copy_page_to_iter+0x248/0xdd0 [ 1586.055447] filemap_read+0x4ff/0xbb0 [ 1586.055863] ? filemap_get_pages+0x1c90/0x1c90 [ 1586.056358] ? lock_acquire+0x1b2/0x4d0 [ 1586.056775] generic_file_read_iter+0x3cf/0x540 [ 1586.057276] ext4_file_read_iter+0x184/0x490 [ 1586.057739] new_sync_read+0x427/0x6f0 [ 1586.058157] ? __ia32_sys_llseek+0x380/0x380 [ 1586.058616] ? security_file_permission+0xb1/0xd0 [ 1586.059135] vfs_read+0x356/0x5f0 [ 1586.059516] ksys_read+0x12d/0x250 [ 1586.059897] ? __ia32_sys_pwrite64+0x230/0x230 [ 1586.060389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1586.060945] do_syscall_64+0x3b/0x90 [ 1586.061348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1586.061894] RIP: 0033:0x7f0ad231ab19 [ 1586.062255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1586.064182] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1586.064971] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1586.065712] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1586.066473] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1586.067248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1586.068003] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1586.068781] 03:15:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x60, 0x0, 0x4) 03:15:15 executing program 0: socketpair(0x26, 0x800, 0x3, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r1, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x9, 0x1}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x14) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x80, 0x18) read(r3, &(0x7f0000000000), 0xfffffdef) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0xa4082, 0x0) openat(r4, &(0x7f0000000080)='./file0\x00', 0x14000, 0x20) 03:15:28 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x309540, 0x0) 03:15:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/class/drm', 0x2080, 0x181) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f0000000000)="3cee4a8a4b01141219557f1d35", 0xd}, {&(0x7f0000000040)="8d73a70f3459e862621903c564552ea7aa2d96b3b1edbbf996de7dbb62c4ca6dd4b39c782a545031293e1b0929b6cde03458c8a7634bfa1c46f079f0", 0x3c}, {&(0x7f00000000c0)="98472928476368f0bd05277e685e0e6b24437416987a397c452280267c48aecc1fc2d47788cc18ae9bb92011e218b50a4081984d91688d3892330631c403aff9f2cd489c7a580f24363eed1390529b1bda18fe5b9f06c04e3536ad1e4b0833ae644731cc2572805055a0fe325537f00257a95205fcb682dfab9d65ea0075b560c3a24d95c0b35f14cedb6b8d1b8557c199a1308c920a3fb40a27f87073bb1f7218ac970aa4d11090ece0fd1dcddcb162db", 0xb1}, {&(0x7f0000000180)="7cbb9c2d378ec0412dcc8c13debd088771ee8510cc62a150036b802d3059428e3676eb484114f020d7551f6716dfc588b739f69ea274bed9ec9699e2749540483c359adaad07d0e3f8a7e53d83a4037f3a5ca2f6d50cc986d498bbf273aa66e3d545a1cc81b234ab5e09a4b5e0f73238c71591de3b992e9106a636cfdd085c94a2e40c18b0cd3106d840d8e087c208464b0aeb9d10a030be0d9ee7b27cdcb0e5fc5bec0594077ce814e0fe2e2a45003f1cc2516d726bb7695b7b0e19d2f9df12c4404169c8dfc2f20c9654d2b901a2b66801cf837336", 0xd6}, {&(0x7f0000000280)="156d2b68b441e341b252ecac2f9b5f10e5bd9b2d233aea7ae7e67ee946de382ea2c47a2d4a9d8fcd5f7e96abac180a3d5d96824cac6f21ddc267aa28139f09759b76cbdafa4ec2b88cd3c937debd627358a1388d28375baf31e89f3220ebb38c57e1e1e7b2154e4bfa1254e3d7cfbf0205463168f1f6d6ca3c767bb7a1549dc01312f27972ee8dcb3c71b4102b8be6bc8706f77fe65175182e2d032e9bb6f90fb3384b5f0e8ee5e9b5d08b751a17e9f4ca70a4a391a4d5bff7353e42efe93a2f8e0db814e08aafaa960408e4001a2084294f80faa504f749", 0xd8}, {&(0x7f0000000380)="0abb86e547234b22729f5b99b9563f968ff29233b109472ddca67067dfdcefdd23e8f1a40bc2a09454514f331ef53961b779680117870e5ff9b151bc3c50d7892a99422cb2ac0197b42c7fd9f13a361cb596652941615029c25e16c3024eb0d436a9de6e422e60ee2b9fb16cd75fa213488efea07f2afc396e28900f7617a1a1a5a36bd9e7ca1a3adabdb5ca66efe6f3c72b905f6faccafa8d7fbdb9205c8afe34e0f59d9cb46721dc71", 0xaa}], 0x6, 0x8, 0x800, 0x1a) 03:15:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 64) [ 1599.188715] FAULT_INJECTION: forcing a failure. [ 1599.188715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1599.190098] CPU: 1 PID: 9866 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1599.190996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1599.192206] Call Trace: [ 1599.192484] [ 1599.192726] dump_stack_lvl+0x8b/0xb3 [ 1599.193153] should_fail.cold+0x5/0xa [ 1599.193573] prepare_alloc_pages+0x17b/0x500 [ 1599.194064] __alloc_pages+0x131/0x4e0 [ 1599.194497] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1599.195160] ? __lock_acquire+0xbac/0x5b70 [ 1599.195630] ? mark_lock+0xfc/0x2e10 [ 1599.196032] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1599.196643] alloc_pages_vma+0xde/0x500 [ 1599.197088] __handle_mm_fault+0xfb3/0x3570 [ 1599.197570] ? lock_is_held_type+0xd7/0x130 [ 1599.198036] ? __pmd_alloc+0x680/0x680 [ 1599.198490] handle_mm_fault+0x2e6/0xa20 [ 1599.198962] do_user_addr_fault+0x54a/0x12a0 [ 1599.199453] exc_page_fault+0xa2/0x1a0 [ 1599.199881] asm_exc_page_fault+0x1e/0x30 [ 1599.200329] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1599.200921] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1599.202905] RSP: 0018:ffff88804430f9f0 EFLAGS: 00050246 [ 1599.203479] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1599.204251] RDX: 0000000000000000 RSI: ffff88801f33e000 RDI: 0000000020020000 [ 1599.205028] RBP: 0000000020020000 R08: 0000000000000000 R09: ffff88801f33efff [ 1599.205818] R10: ffffed1003e67dff R11: 0000000000000001 R12: ffff88801f33e000 [ 1599.206589] R13: 0000000020021000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1599.207385] copyout.part.0+0xdf/0x110 [ 1599.207822] copy_page_to_iter+0x248/0xdd0 [ 1599.208312] filemap_read+0x4ff/0xbb0 [ 1599.208752] ? filemap_get_pages+0x1c90/0x1c90 [ 1599.209270] ? lock_acquire+0x1b2/0x4d0 [ 1599.209711] generic_file_read_iter+0x3cf/0x540 [ 1599.210233] ext4_file_read_iter+0x184/0x490 [ 1599.210737] new_sync_read+0x427/0x6f0 [ 1599.211177] ? __ia32_sys_llseek+0x380/0x380 [ 1599.211658] ? security_file_permission+0xb1/0xd0 [ 1599.212202] vfs_read+0x356/0x5f0 [ 1599.212589] ksys_read+0x12d/0x250 [ 1599.212984] ? __ia32_sys_pwrite64+0x230/0x230 [ 1599.213491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.214067] do_syscall_64+0x3b/0x90 [ 1599.214490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1599.215065] RIP: 0033:0x7f63a2e8eb19 [ 1599.215479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.217502] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1599.218336] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1599.219145] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1599.219927] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.220709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.221496] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1599.222306] [ 1599.229273] FAULT_INJECTION: forcing a failure. [ 1599.229273] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.230542] CPU: 1 PID: 9874 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1599.231439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1599.232684] Call Trace: [ 1599.232963] [ 1599.233215] dump_stack_lvl+0x8b/0xb3 [ 1599.233635] should_fail.cold+0x5/0xa [ 1599.234051] copy_page_to_iter+0x217/0xdd0 [ 1599.234533] filemap_read+0x4ff/0xbb0 [ 1599.234984] ? filemap_get_pages+0x1c90/0x1c90 [ 1599.235498] ? lock_acquire+0x1b2/0x4d0 [ 1599.235936] generic_file_read_iter+0x3cf/0x540 [ 1599.236453] ext4_file_read_iter+0x184/0x490 [ 1599.236937] new_sync_read+0x427/0x6f0 [ 1599.237359] ? __ia32_sys_llseek+0x380/0x380 [ 1599.237859] ? security_file_permission+0xb1/0xd0 [ 1599.238388] vfs_read+0x356/0x5f0 [ 1599.238789] ksys_read+0x12d/0x250 [ 1599.239178] ? __ia32_sys_pwrite64+0x230/0x230 [ 1599.239688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.240272] do_syscall_64+0x3b/0x90 [ 1599.240697] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1599.241250] RIP: 0033:0x7f0ad231ab19 [ 1599.241641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.243660] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1599.244476] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1599.245243] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1599.246010] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.246797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.247569] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1599.248373] 03:15:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x47, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 65) 03:15:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x64, 0x0, 0x4) 03:15:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x61, 0x0, 0x4) 03:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x54, 0x0, 0x4) [ 1599.265192] Process accounting paused 03:15:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 65) 03:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0)="9411b20518964e9f3a0543432db336e0f2ba7e9b3a25efa782fd7e278420f5bc2494fd868629d41dac9346514eb4bf755bee2dfa0326d198911b655706c5a3e7ce3f7d7b861b1adf51f631679ed77852baec5d1372c87c62169b4e7521c669ca4be4f6393304b9979b5d6107a27d28094abe16eca1e67bd0b6dfaacc1da574d707518ec31d84e46857ef7b15f2cdfb7e2ded7a3e418e8bd049ced4b0c9f98e10f7c14196cb67dbb58790fd2ea13d9e41d3da8d099eddf81be99d25d96fd03170557f18948c7941f4f3956ab81d2d56fd9e1d2082d6c34b0f18c97898d1b28306d5832cfc32cedfddb1fc30e7b798069df958", 0xf2, r0}, 0x68) [ 1599.345657] FAULT_INJECTION: forcing a failure. [ 1599.345657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1599.346993] CPU: 1 PID: 9880 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1599.347872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1599.349050] Call Trace: [ 1599.349323] [ 1599.349556] dump_stack_lvl+0x8b/0xb3 [ 1599.349970] should_fail.cold+0x5/0xa [ 1599.350377] prepare_alloc_pages+0x17b/0x500 [ 1599.350865] __alloc_pages+0x131/0x4e0 [ 1599.351278] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1599.351915] ? __lock_acquire+0xbac/0x5b70 [ 1599.352381] ? mark_lock+0xfc/0x2e10 [ 1599.352778] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1599.353369] alloc_pages_vma+0xde/0x500 [ 1599.353805] __handle_mm_fault+0xfb3/0x3570 [ 1599.354265] ? lock_is_held_type+0xd7/0x130 [ 1599.354727] ? __pmd_alloc+0x680/0x680 [ 1599.355164] handle_mm_fault+0x2e6/0xa20 [ 1599.355619] do_user_addr_fault+0x54a/0x12a0 [ 1599.356120] exc_page_fault+0xa2/0x1a0 [ 1599.356540] asm_exc_page_fault+0x1e/0x30 [ 1599.357011] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1599.357602] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1599.359621] RSP: 0018:ffff88803d1479f0 EFLAGS: 00050246 [ 1599.360203] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1599.360977] RDX: 0000000000000000 RSI: ffff88801f33e000 RDI: 0000000020020000 [ 1599.361765] RBP: 0000000020020000 R08: 0000000000000000 R09: ffff88801f33efff [ 1599.362547] R10: ffffed1003e67dff R11: 0000000000000001 R12: ffff88801f33e000 [ 1599.363347] R13: 0000000020021000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1599.364142] copyout.part.0+0xdf/0x110 [ 1599.364576] copy_page_to_iter+0x248/0xdd0 [ 1599.365055] filemap_read+0x4ff/0xbb0 [ 1599.365493] ? filemap_get_pages+0x1c90/0x1c90 [ 1599.366008] ? lock_acquire+0x1b2/0x4d0 [ 1599.366447] generic_file_read_iter+0x3cf/0x540 [ 1599.366981] ext4_file_read_iter+0x184/0x490 [ 1599.367471] new_sync_read+0x427/0x6f0 [ 1599.367894] ? __ia32_sys_llseek+0x380/0x380 [ 1599.368398] ? security_file_permission+0xb1/0xd0 [ 1599.368941] vfs_read+0x356/0x5f0 [ 1599.369325] ksys_read+0x12d/0x250 [ 1599.369727] ? __ia32_sys_pwrite64+0x230/0x230 [ 1599.370245] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.370811] do_syscall_64+0x3b/0x90 [ 1599.371227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1599.371783] RIP: 0033:0x7f0ad231ab19 [ 1599.372178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.374131] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1599.374980] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1599.375748] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1599.376520] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.377295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.378078] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1599.378874] 03:15:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x48, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x62, 0x0, 0x4) 03:15:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 66) 03:15:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x65, 0x0, 0x4) 03:15:28 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x86001, 0x80) read(r0, &(0x7f0000000000), 0xfffffdef) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/136, 0x88}], 0x1, 0x7fffefff, 0x9) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000180)={@private, @local}, &(0x7f00000001c0)=0xc) close(r0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x6cc4c6d27f5ccef) syncfs(r3) [ 1599.415895] FAULT_INJECTION: forcing a failure. [ 1599.415895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.418113] CPU: 1 PID: 9890 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1599.419003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1599.420186] Call Trace: [ 1599.420455] [ 1599.420700] dump_stack_lvl+0x8b/0xb3 [ 1599.421118] should_fail.cold+0x5/0xa [ 1599.421528] copy_page_to_iter+0x217/0xdd0 [ 1599.422000] filemap_read+0x4ff/0xbb0 [ 1599.422415] ? filemap_get_pages+0x1c90/0x1c90 [ 1599.422932] ? lock_acquire+0x1b2/0x4d0 [ 1599.423365] generic_file_read_iter+0x3cf/0x540 [ 1599.423863] ext4_file_read_iter+0x184/0x490 [ 1599.424335] new_sync_read+0x427/0x6f0 [ 1599.424746] ? __ia32_sys_llseek+0x380/0x380 [ 1599.425227] ? security_file_permission+0xb1/0xd0 [ 1599.425749] vfs_read+0x356/0x5f0 [ 1599.426119] ksys_read+0x12d/0x250 [ 1599.426517] ? __ia32_sys_pwrite64+0x230/0x230 [ 1599.427017] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.427572] do_syscall_64+0x3b/0x90 [ 1599.427986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1599.428538] RIP: 0033:0x7f63a2e8eb19 [ 1599.428936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.430877] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1599.431701] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1599.432455] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1599.433222] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.433995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.434767] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1599.435556] 03:15:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0xeef, 0x100, 0x4}) close(r1) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r2, 0x100000001, 0x6, 0x5) openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 03:15:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x49, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:28 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r1, &(0x7f00000004c0)=[{&(0x7f00000000c0)="dbbf9821a374ba231e25e1fad67c900289af88b7491afe06bc8db81d2d23cb018961b503840fb1fea6b8489a670ca8f5952fe21d77d0105f99ee190bc4bbeb6531eb092380b32417f0168926958b26a52a782cc76f554de07e428fa6f4bc77f5e24513daa166caa303d87063d4a997432f904a42733abe953abc407cfc9f34fe097de18cab33c69579fd285cd3d6367afc90f67bce697d5d1fd49b1c7b5e426784f4f84d3e552b0f8faafff8367ed106452da0e559d3566bc479f4a1ff7a1bd5d62e397baacdc7721fbd4f04274fd3de9aa80835165c421cac1e833a995262a909c3f2433ab384d1d0d8a3c8f6c493e232078e70002c", 0xf6}, {&(0x7f0000000000)="d9402f4379429c2ec736dd880eff3b8a6bda41e7faeb749450ef170f523aeeb0f475fa0dc9b187df136dcdd16bd56b43b4c4824c932a38fe42555287c30fc8861e9994c0ca04bd3d10e9fb4f9607fb409aba932a1f396ce6a4", 0x59}, {&(0x7f00000001c0)="413001b6eded36610bd4c798fffb35d87f6b0dcabd848abdab49172f4a40b478e4", 0x21}, {&(0x7f0000000200)="7fb48b067613af222f097f18d1a63c515924ce4eccdcd9d793c91b8be91b3366784d9058847f56e02108b4e8ff5989248162e291f861ff7d4dbf01506e16070a70975f49af8071099ab5d61e4eacb0adb0bd2461ea5f4b90fb150bce9f73a6fa02087cc088920b975eeb67f9ad8c50e2cbdd47667e6a8099800a82e774db170a3aac581b601938f316a6aa2531ea31b540cf62f6804c5a339ca762d07f7768536332b70b802703c90627fba180d1265fa8fca411a0b494d9a739d83ac2152a7404bf7db22e3b8f6f0857214704f2194151", 0xd1}, {&(0x7f0000000300)="645d60bc898a6ddddf02a07c031c02b6cd16152c7ec52233db65", 0x1a}, {&(0x7f0000000340)="e8c4b3f10e5d7620b74550d685279b82dbb2ae89acd279e44ec5c429e3dea919191b97af6ca9df054c805029313f2b6b64e88a3a320dc5e1b749ceb0010b4aef9fe31c7e29a9cf0ce9780a35dfd8cbb427569f08ee4344902761671b111ae07bd46b09e1f2b00253dd2911dde4e66dee2cbac395e869c97287c13f9435eda4225edb52f6028e9b8dd9b9d0760bab257de758a6a9e5ee75", 0x97}, {&(0x7f0000000400)="d713846ac10932e3d7ec675e6694fbff7e7b9caeaba9e2cfdc125522896c17523097f29725a3675a07de5ec2abd23b3d58e49d7d44e2e395f7734abd58cceb748cbf93e60218ccb6", 0x48}, {&(0x7f0000000480)="6d97fe78574eb1674cf28280570a5d008c", 0x11}], 0x8, 0x80, 0xfffffffb) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/kernel/boot_params', 0x80400, 0x9) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000a00)={0x0, 0xffffffffffffffff, 0x46, 0x9, @scatter={0x3, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f0000000780)=""/32, 0x20}, {&(0x7f00000007c0)=""/133, 0x85}]}, &(0x7f00000008c0)="9f0ce2999407dbe21c9015df0bd2f6fab71a364091bc7b86a06fc0fd938e12aa5ac89b66f1b2b75fd14de2b0a442c2b929ff302d8760785107a8623c35921fb6ee1a8fda5969", &(0x7f0000000940)=""/88, 0x3, 0x1, 0x1, &(0x7f00000009c0)}) syz_open_dev$sg(&(0x7f0000000540), 0x3, 0x240000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580), 0x40080, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 03:15:28 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 67) 03:15:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x64, 0x0, 0x4) 03:15:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x63, 0x0, 0x4) [ 1599.555648] FAULT_INJECTION: forcing a failure. [ 1599.555648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1599.557047] CPU: 1 PID: 9905 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1599.557931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1599.559109] Call Trace: [ 1599.559379] [ 1599.559620] dump_stack_lvl+0x8b/0xb3 [ 1599.560043] should_fail.cold+0x5/0xa [ 1599.560457] prepare_alloc_pages+0x17b/0x500 [ 1599.560935] __alloc_pages+0x131/0x4e0 [ 1599.561347] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1599.561993] ? __lock_acquire+0xbac/0x5b70 [ 1599.562453] ? mark_lock+0xfc/0x2e10 [ 1599.562855] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1599.563432] alloc_pages_vma+0xde/0x500 [ 1599.563859] __handle_mm_fault+0xfb3/0x3570 [ 1599.564523] ? lock_is_held_type+0xd7/0x130 [ 1599.565096] ? __pmd_alloc+0x680/0x680 [ 1599.565678] handle_mm_fault+0x2e6/0xa20 [ 1599.566127] do_user_addr_fault+0x54a/0x12a0 [ 1599.566615] exc_page_fault+0xa2/0x1a0 [ 1599.567045] asm_exc_page_fault+0x1e/0x30 [ 1599.567484] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1599.568078] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1599.570023] RSP: 0018:ffff8880381df9f0 EFLAGS: 00050246 [ 1599.570589] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1599.571363] RDX: 0000000000000000 RSI: ffff88801f33f000 RDI: 0000000020021000 [ 1599.572133] RBP: 0000000020021000 R08: 0000000000000000 R09: ffff88801f33ffff [ 1599.572901] R10: ffffed1003e67fff R11: 0000000000000001 R12: ffff88801f33f000 [ 1599.573665] R13: 0000000020022000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1599.574456] copyout.part.0+0xdf/0x110 [ 1599.574906] copy_page_to_iter+0x248/0xdd0 [ 1599.575380] filemap_read+0x4ff/0xbb0 [ 1599.575808] ? filemap_get_pages+0x1c90/0x1c90 [ 1599.576338] ? lock_acquire+0x1b2/0x4d0 [ 1599.576774] generic_file_read_iter+0x3cf/0x540 [ 1599.577276] ext4_file_read_iter+0x184/0x490 [ 1599.577765] new_sync_read+0x427/0x6f0 [ 1599.578200] ? __ia32_sys_llseek+0x380/0x380 [ 1599.578694] ? security_file_permission+0xb1/0xd0 [ 1599.579243] vfs_read+0x356/0x5f0 [ 1599.579624] ksys_read+0x12d/0x250 [ 1599.580015] ? __ia32_sys_pwrite64+0x230/0x230 [ 1599.580515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1599.581087] do_syscall_64+0x3b/0x90 [ 1599.581495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1599.582064] RIP: 0033:0x7f63a2e8eb19 [ 1599.582459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1599.584458] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1599.585277] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1599.586045] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1599.586810] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1599.587575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1599.588340] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1599.589134] 03:15:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x66, 0x0, 0x4) 03:15:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x140, 0x0, 0xf4a, 0x70bd2d, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0x140}, 0x1, 0x0, 0x0, 0x81}, 0x8004) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) 03:15:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 66) 03:15:40 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x67, 0x0, 0x4) 03:15:40 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:15:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 68) 03:15:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000002b80)=""/102399, 0x18fff) clock_gettime(0x0, &(0x7f0000001680)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/162, 0xa2}], 0x1, &(0x7f000001bb80)=ANY=[@ANYBLOB="1c000000000000000100000002000000c03e98eb62372907d390df3b7b039e6a90f6e520fea84a792e7cfa962ed01f23a7080d4cea533651d35d5f1ae458afaf9f230793d0a2f9f195163025cffa9247099fb445220078e57c570f8d5b0d16d32c674cbf3f40d9ab9a6273c0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0031036370e6dce9be62e4558b0994480081006a804d8408cd7212d93d1f892d5d85f0af0052cd4a7ecc998f4bc59f9cf63fe83a73ac8b2348b180c81306ba8cf2820213c217c7cf8c45a35c0dc2df542d62196fd02adb1b95a130a162e58dc3484ae8e61f40d7345580690189"], 0x68}}, {{&(0x7f0000000200), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000340)=""/228, 0xe4}], 0x3}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/120, 0x78}], 0x2, &(0x7f0000001700)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x3, 0x2000, &(0x7f00000016c0)={r2, r3+60000000}) openat(r4, &(0x7f0000001540)='./file0\x00', 0x800, 0x74) clock_gettime(0x0, &(0x7f0000000180)) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r5, &(0x7f0000002a00)=[{&(0x7f0000001780)="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", 0xff}, {&(0x7f0000001880)="6be0639ca1d66639c4a85ed00069b9e6e7b92e30a0e12bbcff234364b9c75883c48747b1c7756b1b675856b5a42377308c5e2da3f80cc8192d69759712523a2f0cae16c44618df3439c188fa57567b64e91e63a5cc65c71cf85987fe34b92143a7f47e398da6837da48d085fd3ea08a682327f855e2e8da8939022dd267d7c82", 0x80}, {&(0x7f0000001900)="d12551518f916576da7b481a7a852c0f9bbd41e430563e624085e38feb536af820985bd52a8a875dd36b8e0b59a8a4946dd286e48fc5d71bfc77aa26ab827b9d53941b5a3007e2fb806c36ad7f925eac7474072dcf247f21fa0ae961089b174ad6d73258a8a005f04b7be45ae3d01e7c7deb3b3f5d9ff6add4ab7096ca6acc32ed5bf3b6f78ad4267d0f9620c1169a8078c0b70827a388765b01724e2f52ec14686100e6be44ff5237efc297eb4126accfbdb44a3d1512cf9a31389572fe48d006802bb8f97c33d165df79b76910935a6892c76a14e505e4ccfa", 0xda}, {&(0x7f0000001580)="0703c7f3", 0x4}, {&(0x7f0000001a00)="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", 0x1000}, {0xfffffffffffffffd}], 0x6, 0xb504, 0x3f4d) 03:15:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x64, 0x0, 0x4) 03:15:40 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1611.893788] FAULT_INJECTION: forcing a failure. [ 1611.893788] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1611.895493] CPU: 0 PID: 9938 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1611.896492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1611.897794] Call Trace: [ 1611.898084] [ 1611.898098] FAULT_INJECTION: forcing a failure. [ 1611.898098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1611.898357] dump_stack_lvl+0x8b/0xb3 [ 1611.898390] should_fail.cold+0x5/0xa [ 1611.901518] copy_page_to_iter+0x217/0xdd0 [ 1611.902047] filemap_read+0x4ff/0xbb0 [ 1611.902531] ? filemap_get_pages+0x1c90/0x1c90 [ 1611.903123] ? lock_acquire+0x1b2/0x4d0 [ 1611.903632] generic_file_read_iter+0x3cf/0x540 [ 1611.904234] ext4_file_read_iter+0x184/0x490 [ 1611.904793] new_sync_read+0x427/0x6f0 [ 1611.905287] ? __ia32_sys_llseek+0x380/0x380 [ 1611.905869] ? security_file_permission+0xb1/0xd0 [ 1611.906469] vfs_read+0x356/0x5f0 [ 1611.906903] ksys_read+0x12d/0x250 [ 1611.907362] ? __ia32_sys_pwrite64+0x230/0x230 [ 1611.907941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.908606] do_syscall_64+0x3b/0x90 [ 1611.909090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1611.909724] RIP: 0033:0x7f63a2e8eb19 [ 1611.910188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.912541] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1611.913501] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1611.914338] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1611.915249] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.916137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.917021] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1611.917946] [ 1611.918238] CPU: 1 PID: 9943 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1611.919904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1611.922144] Call Trace: [ 1611.922654] [ 1611.923120] dump_stack_lvl+0x8b/0xb3 [ 1611.923897] should_fail.cold+0x5/0xa [ 1611.924673] copy_page_to_iter+0x217/0xdd0 [ 1611.925553] filemap_read+0x4ff/0xbb0 [ 1611.926340] ? filemap_get_pages+0x1c90/0x1c90 [ 1611.927289] ? lock_acquire+0x1b2/0x4d0 [ 1611.928092] generic_file_read_iter+0x3cf/0x540 [ 1611.929025] ext4_file_read_iter+0x184/0x490 [ 1611.929909] new_sync_read+0x427/0x6f0 [ 1611.930683] ? __ia32_sys_llseek+0x380/0x380 [ 1611.931597] ? security_file_permission+0xb1/0xd0 [ 1611.932567] vfs_read+0x356/0x5f0 [ 1611.933268] ksys_read+0x12d/0x250 [ 1611.933978] ? __ia32_sys_pwrite64+0x230/0x230 [ 1611.934892] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1611.935955] do_syscall_64+0x3b/0x90 [ 1611.936709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1611.937729] RIP: 0033:0x7f0ad231ab19 [ 1611.938463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1611.942091] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1611.943603] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1611.945008] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1611.946416] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1611.947828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1611.949229] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1611.950649] [ 1611.974314] loop2: detected capacity change from 0 to 256 03:15:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x68, 0x0, 0x4) 03:15:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 69) 03:15:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x69, 0x0, 0x4) [ 1612.055196] FAULT_INJECTION: forcing a failure. [ 1612.055196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1612.056564] CPU: 0 PID: 9951 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1612.057420] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1612.058601] Call Trace: [ 1612.058870] [ 1612.059111] dump_stack_lvl+0x8b/0xb3 [ 1612.059526] should_fail.cold+0x5/0xa [ 1612.059938] prepare_alloc_pages+0x17b/0x500 [ 1612.060406] __alloc_pages+0x131/0x4e0 [ 1612.060822] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1612.061456] ? __lock_acquire+0xbac/0x5b70 [ 1612.061914] ? mark_lock+0xfc/0x2e10 [ 1612.062307] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1612.062891] alloc_pages_vma+0xde/0x500 [ 1612.063329] __handle_mm_fault+0xfb3/0x3570 [ 1612.063799] ? lock_is_held_type+0xd7/0x130 [ 1612.064260] ? __pmd_alloc+0x680/0x680 [ 1612.064695] handle_mm_fault+0x2e6/0xa20 [ 1612.065131] do_user_addr_fault+0x54a/0x12a0 [ 1612.065669] exc_page_fault+0xa2/0x1a0 [ 1612.066077] asm_exc_page_fault+0x1e/0x30 [ 1612.066572] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1612.067151] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1612.069519] RSP: 0018:ffff8880421479f0 EFLAGS: 00050246 [ 1612.070116] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1612.070903] RDX: 0000000000000000 RSI: ffff88801f340000 RDI: 0000000020022000 [ 1612.071716] RBP: 0000000020022000 R08: 0000000000000000 R09: ffff88801f340fff [ 1612.072557] R10: ffffed1003e681ff R11: 0000000000000001 R12: ffff88801f340000 [ 1612.073410] R13: 0000000020023000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1612.074271] copyout.part.0+0xdf/0x110 [ 1612.074743] copy_page_to_iter+0x248/0xdd0 [ 1612.075277] filemap_read+0x4ff/0xbb0 [ 1612.075746] ? filemap_get_pages+0x1c90/0x1c90 [ 1612.076275] ? lock_acquire+0x1b2/0x4d0 [ 1612.076712] generic_file_read_iter+0x3cf/0x540 [ 1612.077239] ext4_file_read_iter+0x184/0x490 [ 1612.077734] new_sync_read+0x427/0x6f0 [ 1612.078180] ? __ia32_sys_llseek+0x380/0x380 [ 1612.078682] ? security_file_permission+0xb1/0xd0 [ 1612.079207] vfs_read+0x356/0x5f0 [ 1612.079627] ksys_read+0x12d/0x250 [ 1612.080058] ? __ia32_sys_pwrite64+0x230/0x230 [ 1612.080612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1612.081234] do_syscall_64+0x3b/0x90 [ 1612.081692] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1612.082307] RIP: 0033:0x7f63a2e8eb19 [ 1612.082736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1612.084606] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1612.085437] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1612.086220] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1612.087007] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1612.087853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1612.088699] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1612.089558] 03:15:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 67) 03:15:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 70) 03:15:54 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000040)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:15:54 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:15:54 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000100)=0x6, 0x4) r1 = syz_open_dev$sg(&(0x7f0000001000), 0xfffffffffffff801, 0x4842) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="037fea13008936bffe77e2935765756bfb9c5d9c51403d740d3ec561f68c71695e87b63b0475369236ae3b9f85c09942fabd0e89ef87e2cb5a33f1e9a228c759b2c5dd5eba5362de09ac1715c9277544587cd35a5e47056bbce0a488ab8ea9b025bbd6b1b6017ea47d995d0391caaff3b0764c71f3055b499041a7bd70c8e99689ad190f3d872841594ef61f9f9e2fffd8f60c9a2f50557ac76a94ba6a4a9346a565cf4b85a5001b34fe34dd460c5f0a2606e4af1268ad98fc850e678b3fd15da2e5cebd143862f882404f01", 0xcc}, {&(0x7f0000000200)="9699d45ed0f106416defad836b7c9f4629a1957c0c75b13a9f6935d3af19df4bf08f115b000000338da6ade633a4a2a0df14b6261f5f", 0x36}], 0x2, 0x20, 0x7) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="000000fcffffffffffffff007d8b7e9ade121ff2895f7f5c82413e661198a29f99af47ab3a7b4ccf77d08fa9d4242e76a63d0915b602efe88081768e4d2c0f752db20ce17682c036d6b645ffe905c39a4d4103ddddc4b68573b05188cc1ad1c9258c8c64571b2a9f6ed7730648b097da56d0cbd8", @ANYRES32=0xffffffffffffffff, @ANYBLOB="02000000000000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYRES32]) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32=r4, @ANYBLOB="0a0018"], 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r3, 0x20, 0x70bd25, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1f}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x2000000c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000000)) 03:15:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x65, 0x0, 0x4) 03:15:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x35, 0x0, 0x4) 03:15:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6a, 0x0, 0x4) [ 1625.888292] FAULT_INJECTION: forcing a failure. [ 1625.888292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1625.890918] CPU: 0 PID: 9969 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1625.892609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1625.894865] Call Trace: [ 1625.895392] [ 1625.895841] dump_stack_lvl+0x8b/0xb3 [ 1625.896623] should_fail.cold+0x5/0xa [ 1625.897400] prepare_alloc_pages+0x17b/0x500 [ 1625.898301] __alloc_pages+0x131/0x4e0 [ 1625.899152] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1625.900430] ? __lock_acquire+0xbac/0x5b70 [ 1625.901309] ? mark_lock+0xfc/0x2e10 [ 1625.902068] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1625.903191] alloc_pages_vma+0xde/0x500 [ 1625.904021] __handle_mm_fault+0xfb3/0x3570 [ 1625.904910] ? lock_is_held_type+0xd7/0x130 [ 1625.905763] ? __pmd_alloc+0x680/0x680 [ 1625.906605] handle_mm_fault+0x2e6/0xa20 [ 1625.907457] do_user_addr_fault+0x54a/0x12a0 [ 1625.908375] exc_page_fault+0xa2/0x1a0 [ 1625.909179] asm_exc_page_fault+0x1e/0x30 [ 1625.910015] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1625.910965] FAULT_INJECTION: forcing a failure. [ 1625.910965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1625.911101] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1625.917092] RSP: 0018:ffff8880442af9f0 EFLAGS: 00050246 [ 1625.918161] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1625.919614] RDX: 0000000000000000 RSI: ffff88801f33f000 RDI: 0000000020021000 [ 1625.921044] RBP: 0000000020021000 R08: 0000000000000000 R09: ffff88801f33ffff [ 1625.922486] R10: ffffed1003e67fff R11: 0000000000000001 R12: ffff88801f33f000 [ 1625.924008] R13: 0000000020022000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1625.925457] copyout.part.0+0xdf/0x110 [ 1625.926274] copy_page_to_iter+0x248/0xdd0 [ 1625.927170] filemap_read+0x4ff/0xbb0 [ 1625.927969] ? filemap_get_pages+0x1c90/0x1c90 [ 1625.928919] ? lock_acquire+0x1b2/0x4d0 [ 1625.929718] generic_file_read_iter+0x3cf/0x540 [ 1625.930679] ext4_file_read_iter+0x184/0x490 [ 1625.931595] new_sync_read+0x427/0x6f0 [ 1625.932388] ? __ia32_sys_llseek+0x380/0x380 [ 1625.933302] ? security_file_permission+0xb1/0xd0 [ 1625.934298] vfs_read+0x356/0x5f0 [ 1625.935017] ksys_read+0x12d/0x250 [ 1625.935754] ? __ia32_sys_pwrite64+0x230/0x230 [ 1625.936683] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.937724] do_syscall_64+0x3b/0x90 [ 1625.938508] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1625.939556] RIP: 0033:0x7f0ad231ab19 [ 1625.940299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.943987] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1625.945497] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1625.946936] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1625.948362] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.949782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.951237] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1625.952687] [ 1625.953159] CPU: 1 PID: 9975 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1625.954782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1625.957001] Call Trace: [ 1625.957505] [ 1625.957947] dump_stack_lvl+0x8b/0xb3 [ 1625.958853] should_fail.cold+0x5/0xa [ 1625.959727] copy_page_to_iter+0x217/0xdd0 [ 1625.960594] filemap_read+0x4ff/0xbb0 [ 1625.961367] ? filemap_get_pages+0x1c90/0x1c90 [ 1625.961803] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1625.962292] ? lock_acquire+0x1b2/0x4d0 [ 1625.964784] generic_file_read_iter+0x3cf/0x540 [ 1625.965712] ext4_file_read_iter+0x184/0x490 [ 1625.966593] new_sync_read+0x427/0x6f0 [ 1625.967379] ? __ia32_sys_llseek+0x380/0x380 [ 1625.968270] ? security_file_permission+0xb1/0xd0 [ 1625.969232] vfs_read+0x356/0x5f0 [ 1625.969928] ksys_read+0x12d/0x250 [ 1625.970632] ? __ia32_sys_pwrite64+0x230/0x230 [ 1625.971560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1625.972582] do_syscall_64+0x3b/0x90 [ 1625.973327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1625.974338] RIP: 0033:0x7f63a2e8eb19 [ 1625.975062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1625.978657] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1625.980151] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1625.981546] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1625.982939] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1625.984376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1625.985793] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1625.987361] [ 1626.074508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:16:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x4c0882, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat$incfs(r0, &(0x7f0000000040)='.log\x00', 0x0, 0x20) write$hidraw(r1, &(0x7f00000000c0)="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", 0xff) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f00000001c0)={0x0, 0x0, 0x3}) 03:16:08 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x400040, 0x0) close(r0) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)=0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x7791d0530d6e9deb, 0x94) read(r2, &(0x7f00000190c0)=""/102394, 0x18ffa) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400200, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r5, 0xf502, 0x0) writev(r4, &(0x7f0000000840)=[{&(0x7f0000000280)="335659724c46f18bc630d836d9726f869bdc", 0x12}, {&(0x7f0000001040)="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", 0x1000}, {&(0x7f00000002c0)="9a4b6c7ee8de3b18510dc9923bb428d51bb3a4707a16b91033b6da7484334fb6d8a37b204b70b22155a18f63ca1d7c189428ae1d958926606cd57f40ce612faca26ee820be14a359564e65cc8fb44557453ebcf509b49e30d84e3bed1ce602e6394b", 0x62}, {&(0x7f0000000340)="e9ae5c4e091d9baee489161ffd53b96a91bee07405c21a5978f0bc4684cfc371511ab493fe2713092bf3079b210e1eff547dde52c9f04018caabe191513c6cb55ed6c8", 0x43}, {&(0x7f00000003c0)="171a692e52f6246ea60a233ae0bddc4763db706e9e23a6e7312697a1c5abb06a172e56dccc5e6f670c166c94576a37ac1463c0993ede22b9c9e3ab0593d4484e85ba4912d6e3f0454520cff2af467468918499ff43cdd3", 0x57}, {&(0x7f0000000440)="44e5042038ad547a12c50d258f548326ecf3093744c8101d2f690d2911f46959e0a0e6a5530d268ec1bcdcd1585092698f0b3f4cfffce8941b48c9b6f1dc8aa84dcd916526acb2f34c272e220baafe8fd337726bc17b3762b07ada0bd06c9bbf213524008b90ceb900e323885ac6f8263e42e8ebce47c543f256bf4fe734940509e84e27e47f53d0138d970abc23cc936ab3a7ee03f5fb796d9a946b60bc94236a88f04f83eef4bf99de9f70", 0xac}, {&(0x7f0000000500)="d53f6c6b54888d5d3a1f260d9946edaa4aa79ebe53c6a9dcb70b6c9b3068740592d3a65a0c5d867c79b9bd75e2ac7cab489ebab4cc64d268837a7ceb2125ab8930b52d00b86126e07772a0a5d8826ab41aa5bfa77f6a2ccc1374bf5f513094fe27af3e0d2d58b64b501ed690ee512c11eba13acfe07589e7af32161ed2893e1a3366654276b52bca7059741cefdf91419e70af919da38f7d45ad21c3915d44d61672c574c613cdf69064afc1", 0xac}, {&(0x7f00000005c0)="93ddcbeb89803453b7eb8a85968eaf41e7b1783269dbda00140109b7bcc6047b1269d960978a7b3111e3c00aebe8fe04ca1d2c6a5423a6244eb400bf2f05f2dde1e037c30af554d084b0bfc4dfd32856c549c29a613e8a700bdbc17f17ebd1cd9695839bbb7572243b42c435450aed00583c088713c315e00354a8c8b220002be556ac87395933718f", 0x89}, {&(0x7f0000000780)="5997f0cb7c00c57c0c7dbca5ea332e5c0d3d5d9160e7077eba2110794049a5c597ca472875d855857d84c7cd073d8212e2063961ba96c975eabe986fe5a22deb3500565e437d80f9a4068c89eda74871f5418c5321c539f93a8ac43be6138330580c3525b1109020f6050635141745f1ef96d507f11afc77e6ad746847085572d551ce12b07fd0d422ce494571e75598aea883199ac7515ed8bde8018ed5bde589141796e5a27519ad968664c62d2b89c0dcc488ad17ebbdcf7bcf59189bdc2e", 0xc0}], 0x9) ioctl$SG_IO(r4, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0xfff, r4, &(0x7f0000000180)="b6a78ab7b8417a567acd5f3b611b6ecb8507f98184f4552396310d6b6fa35bc34bb1a03566ffcb89fa1d00fd43dd5cb4647767d7cbb1e81934eb3ae97d1c1308bbed3da70dd3", 0x46, 0x2, 0x0, 0x2}, &(0x7f0000000240)) r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000680)=0x3cc) fcntl$setstatus(r6, 0x4, 0x42000) open(&(0x7f0000000040)='./file0\x00', 0x9c303, 0x102) 03:16:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000002b80)=""/102399, 0x18fff) clock_gettime(0x0, &(0x7f0000001680)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/162, 0xa2}], 0x1, &(0x7f000001bb80)=ANY=[@ANYBLOB="1c000000000000000100000002000000c03e98eb62372907d390df3b7b039e6a90f6e520fea84a792e7cfa962ed01f23a7080d4cea533651d35d5f1ae458afaf9f230793d0a2f9f195163025cffa9247099fb445220078e57c570f8d5b0d16d32c674cbf3f40d9ab9a6273c0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0031036370e6dce9be62e4558b0994480081006a804d8408cd7212d93d1f892d5d85f0af0052cd4a7ecc998f4bc59f9cf63fe83a73ac8b2348b180c81306ba8cf2820213c217c7cf8c45a35c0dc2df542d62196fd02adb1b95a130a162e58dc3484ae8e61f40d7345580690189"], 0x68}}, {{&(0x7f0000000200), 0x6e, &(0x7f0000000440)=[{&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000340)=""/228, 0xe4}], 0x3}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/120, 0x78}], 0x2, &(0x7f0000001700)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x3, 0x2000, &(0x7f00000016c0)={r2, r3+60000000}) openat(r4, &(0x7f0000001540)='./file0\x00', 0x800, 0x74) clock_gettime(0x0, &(0x7f0000000180)) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r5, &(0x7f0000002a00)=[{&(0x7f0000001780)="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", 0xff}, {&(0x7f0000001880)="6be0639ca1d66639c4a85ed00069b9e6e7b92e30a0e12bbcff234364b9c75883c48747b1c7756b1b675856b5a42377308c5e2da3f80cc8192d69759712523a2f0cae16c44618df3439c188fa57567b64e91e63a5cc65c71cf85987fe34b92143a7f47e398da6837da48d085fd3ea08a682327f855e2e8da8939022dd267d7c82", 0x80}, {&(0x7f0000001900)="d12551518f916576da7b481a7a852c0f9bbd41e430563e624085e38feb536af820985bd52a8a875dd36b8e0b59a8a4946dd286e48fc5d71bfc77aa26ab827b9d53941b5a3007e2fb806c36ad7f925eac7474072dcf247f21fa0ae961089b174ad6d73258a8a005f04b7be45ae3d01e7c7deb3b3f5d9ff6add4ab7096ca6acc32ed5bf3b6f78ad4267d0f9620c1169a8078c0b70827a388765b01724e2f52ec14686100e6be44ff5237efc297eb4126accfbdb44a3d1512cf9a31389572fe48d006802bb8f97c33d165df79b76910935a6892c76a14e505e4ccfa", 0xda}, {&(0x7f0000001580)="0703c7f3", 0x4}, {&(0x7f0000001a00)="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", 0x1000}, {0xfffffffffffffffd}], 0x6, 0xb504, 0x3f4d) 03:16:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 71) 03:16:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6b, 0x0, 0x4) 03:16:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 68) 03:16:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x66, 0x0, 0x4) 03:16:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0x80000010}) read(r1, &(0x7f0000000000), 0xfffffdef) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) read(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x3, 0x9d, 0x80, 0x8}, {0x100, 0x81, 0x9, 0x81}, {0xdc9, 0x1, 0x81, 0x3}]}) [ 1639.495685] FAULT_INJECTION: forcing a failure. [ 1639.495685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1639.498576] CPU: 1 PID: 10006 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1639.500670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.503447] Call Trace: [ 1639.504074] [ 1639.504639] dump_stack_lvl+0x8b/0xb3 [ 1639.505609] should_fail.cold+0x5/0xa [ 1639.506567] prepare_alloc_pages+0x17b/0x500 [ 1639.507680] __alloc_pages+0x131/0x4e0 [ 1639.508646] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1639.510127] ? __lock_acquire+0xbac/0x5b70 [ 1639.511191] ? mark_lock+0xfc/0x2e10 [ 1639.512141] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1639.513506] alloc_pages_vma+0xde/0x500 [ 1639.514497] __handle_mm_fault+0xfb3/0x3570 [ 1639.515598] ? lock_is_held_type+0xd7/0x130 [ 1639.516667] ? __pmd_alloc+0x680/0x680 [ 1639.517690] handle_mm_fault+0x2e6/0xa20 [ 1639.518702] do_user_addr_fault+0x54a/0x12a0 [ 1639.519826] exc_page_fault+0xa2/0x1a0 [ 1639.520783] asm_exc_page_fault+0x1e/0x30 [ 1639.521797] RIP: 0010:copy_user_generic_string+0x2c/0x40 03:16:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4f, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1639.523117] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1639.527681] RSP: 0018:ffff88803818f9f0 EFLAGS: 00050246 [ 1639.529205] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1639.530774] RDX: 0000000000000000 RSI: ffff88801f341000 RDI: 0000000020023000 [ 1639.532408] RBP: 0000000020023000 R08: 0000000000000000 R09: ffff88801f341fff [ 1639.534084] R10: ffffed1003e683ff R11: 0000000000000001 R12: ffff88801f341000 [ 1639.535767] R13: 0000000020024000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1639.537486] copyout.part.0+0xdf/0x110 [ 1639.538430] copy_page_to_iter+0x248/0xdd0 [ 1639.539538] filemap_read+0x4ff/0xbb0 [ 1639.540440] ? filemap_get_pages+0x1c90/0x1c90 [ 1639.541607] ? lock_acquire+0x1b2/0x4d0 [ 1639.542664] generic_file_read_iter+0x3cf/0x540 [ 1639.543789] ext4_file_read_iter+0x184/0x490 [ 1639.544852] new_sync_read+0x427/0x6f0 [ 1639.545778] ? __ia32_sys_llseek+0x380/0x380 [ 1639.546852] ? security_file_permission+0xb1/0xd0 [ 1639.548031] vfs_read+0x356/0x5f0 [ 1639.548879] ksys_read+0x12d/0x250 [ 1639.549729] ? __ia32_sys_pwrite64+0x230/0x230 [ 1639.550821] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.552067] do_syscall_64+0x3b/0x90 [ 1639.552961] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1639.554171] RIP: 0033:0x7f63a2e8eb19 [ 1639.555052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.559318] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1639.561079] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1639.562707] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1639.564371] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.566009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.567663] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1639.569331] [ 1639.575201] FAULT_INJECTION: forcing a failure. [ 1639.575201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.576585] CPU: 0 PID: 10004 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1639.577447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.578621] Call Trace: [ 1639.578886] [ 1639.579121] dump_stack_lvl+0x8b/0xb3 [ 1639.579547] should_fail.cold+0x5/0xa [ 1639.579959] copy_page_to_iter+0x217/0xdd0 [ 1639.580427] filemap_read+0x4ff/0xbb0 [ 1639.580848] ? filemap_get_pages+0x1c90/0x1c90 [ 1639.581365] ? lock_acquire+0x1b2/0x4d0 [ 1639.581807] generic_file_read_iter+0x3cf/0x540 [ 1639.582320] ext4_file_read_iter+0x184/0x490 [ 1639.582811] new_sync_read+0x427/0x6f0 [ 1639.583250] ? __ia32_sys_llseek+0x380/0x380 [ 1639.583768] ? security_file_permission+0xb1/0xd0 [ 1639.584295] vfs_read+0x356/0x5f0 [ 1639.584684] ksys_read+0x12d/0x250 [ 1639.585081] ? __ia32_sys_pwrite64+0x230/0x230 [ 1639.585584] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.586162] do_syscall_64+0x3b/0x90 [ 1639.586589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1639.587153] RIP: 0033:0x7f0ad231ab19 [ 1639.587563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.589572] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1639.590396] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1639.591178] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1639.591972] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.592752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.593521] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1639.594319] 03:16:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x67, 0x0, 0x4) 03:16:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x50, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000003540)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000003440)=[{&(0x7f00000000c0)=""/27, 0x1b}, {&(0x7f0000000100)=""/80, 0x50}, {&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f0000000240)=""/167, 0xa7}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/159, 0x9f}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/120, 0x78}], 0x9, &(0x7f0000003500)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000003580)={{r0}, "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"}) 03:16:08 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000000)='./file0\x00', 0x4000, 0xc9) read(r0, &(0x7f0000000000), 0xfffffdef) 03:16:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6c, 0x0, 0x4) 03:16:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x51, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1639.736668] Process accounting resumed 03:16:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x68, 0x0, 0x4) 03:16:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 69) 03:16:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x66, 0x0, 0x4) [ 1639.818796] FAULT_INJECTION: forcing a failure. [ 1639.818796] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1639.821482] CPU: 1 PID: 10039 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1639.823310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1639.825797] Call Trace: [ 1639.826364] [ 1639.826857] dump_stack_lvl+0x8b/0xb3 [ 1639.827735] should_fail.cold+0x5/0xa [ 1639.828583] prepare_alloc_pages+0x17b/0x500 [ 1639.829562] __alloc_pages+0x131/0x4e0 [ 1639.830402] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1639.831698] ? __lock_acquire+0xbac/0x5b70 [ 1639.832627] ? mark_lock+0xfc/0x2e10 [ 1639.833422] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1639.834611] alloc_pages_vma+0xde/0x500 [ 1639.835519] __handle_mm_fault+0xfb3/0x3570 [ 1639.836464] ? lock_is_held_type+0xd7/0x130 [ 1639.837415] ? __pmd_alloc+0x680/0x680 [ 1639.838314] handle_mm_fault+0x2e6/0xa20 [ 1639.839222] do_user_addr_fault+0x54a/0x12a0 [ 1639.840225] exc_page_fault+0xa2/0x1a0 [ 1639.841086] asm_exc_page_fault+0x1e/0x30 [ 1639.842001] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1639.843214] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1639.847261] RSP: 0018:ffff8880184b79f0 EFLAGS: 00050246 [ 1639.848430] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1639.849949] RDX: 0000000000000000 RSI: ffff88801f340000 RDI: 0000000020022000 [ 1639.851476] RBP: 0000000020022000 R08: 0000000000000000 R09: ffff88801f340fff [ 1639.852978] R10: ffffed1003e681ff R11: 0000000000000001 R12: ffff88801f340000 [ 1639.854484] R13: 0000000020023000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1639.856040] copyout.part.0+0xdf/0x110 [ 1639.856891] copy_page_to_iter+0x248/0xdd0 [ 1639.857829] filemap_read+0x4ff/0xbb0 [ 1639.858666] ? filemap_get_pages+0x1c90/0x1c90 [ 1639.859680] ? lock_acquire+0x1b2/0x4d0 [ 1639.860539] generic_file_read_iter+0x3cf/0x540 [ 1639.861548] ext4_file_read_iter+0x184/0x490 [ 1639.862502] new_sync_read+0x427/0x6f0 [ 1639.863364] ? __ia32_sys_llseek+0x380/0x380 [ 1639.864343] ? security_file_permission+0xb1/0xd0 [ 1639.865387] vfs_read+0x356/0x5f0 [ 1639.866150] ksys_read+0x12d/0x250 [ 1639.866911] ? __ia32_sys_pwrite64+0x230/0x230 [ 1639.867910] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1639.869014] do_syscall_64+0x3b/0x90 [ 1639.869827] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1639.870923] RIP: 0033:0x7f0ad231ab19 [ 1639.871716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1639.875623] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1639.877250] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1639.878768] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1639.880292] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1639.881810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1639.883355] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1639.884900] 03:16:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 70) 03:16:23 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000000)='./file0\x00', 0x4000, 0xc9) read(r0, &(0x7f0000000000), 0xfffffdef) 03:16:23 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x202242, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) read(r1, &(0x7f0000000000), 0xfffffdef) 03:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6d, 0x0, 0x4) 03:16:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2040082, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache}, {@nodevmap}, {}, {@version_L}, {@debug={'debug', 0x3d, 0x6}}], [{@dont_appraise}, {@euid_lt={'euid<', r1}}, {@dont_appraise}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@dont_hash}, {@permit_directio}, {@smackfsroot={'smackfsroot', 0x3d, ']#%'}}, {@obj_type={'obj_type', 0x3d, '!'}}, {@smackfsdef}]}}) 03:16:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x52, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 72) 03:16:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x69, 0x0, 0x4) [ 1654.583413] FAULT_INJECTION: forcing a failure. [ 1654.583413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1654.585882] CPU: 1 PID: 10053 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1654.587509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1654.589724] Call Trace: [ 1654.590226] [ 1654.590665] dump_stack_lvl+0x8b/0xb3 [ 1654.591431] should_fail.cold+0x5/0xa [ 1654.592207] copy_page_to_iter+0x217/0xdd0 [ 1654.593092] filemap_read+0x4ff/0xbb0 [ 1654.593869] ? filemap_get_pages+0x1c90/0x1c90 [ 1654.594795] ? lock_acquire+0x1b2/0x4d0 [ 1654.595607] generic_file_read_iter+0x3cf/0x540 [ 1654.596542] ext4_file_read_iter+0x184/0x490 [ 1654.597426] new_sync_read+0x427/0x6f0 [ 1654.598203] ? __ia32_sys_llseek+0x380/0x380 [ 1654.599103] ? security_file_permission+0xb1/0xd0 [ 1654.600073] vfs_read+0x356/0x5f0 [ 1654.600774] ksys_read+0x12d/0x250 [ 1654.601478] ? __ia32_sys_pwrite64+0x230/0x230 [ 1654.602389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1654.603418] do_syscall_64+0x3b/0x90 [ 1654.604177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1654.605179] RIP: 0033:0x7f63a2e8eb19 [ 1654.605909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1654.609490] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1654.610987] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1654.612396] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1654.613836] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1654.615697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1654.617092] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1654.618509] [ 1654.656102] FAULT_INJECTION: forcing a failure. [ 1654.656102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1654.658611] CPU: 1 PID: 10065 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1654.660281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1654.662538] Call Trace: [ 1654.663042] [ 1654.663482] dump_stack_lvl+0x8b/0xb3 [ 1654.664277] should_fail.cold+0x5/0xa [ 1654.665051] copy_page_to_iter+0x217/0xdd0 [ 1654.665929] filemap_read+0x4ff/0xbb0 [ 1654.666713] ? filemap_get_pages+0x1c90/0x1c90 03:16:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x53, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1654.667670] ? lock_acquire+0x1b2/0x4d0 [ 1654.668637] generic_file_read_iter+0x3cf/0x540 [ 1654.669573] ext4_file_read_iter+0x184/0x490 [ 1654.670460] new_sync_read+0x427/0x6f0 [ 1654.671241] ? __ia32_sys_llseek+0x380/0x380 [ 1654.672144] ? security_file_permission+0xb1/0xd0 [ 1654.673121] vfs_read+0x356/0x5f0 [ 1654.673820] ksys_read+0x12d/0x250 [ 1654.674525] ? __ia32_sys_pwrite64+0x230/0x230 [ 1654.675419] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1654.676451] do_syscall_64+0x3b/0x90 [ 1654.677201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1654.678356] RIP: 0033:0x7f0ad231ab19 [ 1654.679091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1654.682707] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1654.684211] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1654.685627] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 03:16:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6a, 0x0, 0x4) [ 1654.687045] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1654.688613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1654.689999] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1654.691428] 03:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6e, 0x0, 0x4) 03:16:23 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) 03:16:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) socketpair(0x3, 0x5, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) read(r1, 0x0, 0xffffffffffffff4c) 03:16:23 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/firmware/acpi', 0x10000, 0x24) r1 = syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="6cb2c0f39fbb701243372c3170b103f6ba1b05e994fedef46c05a1ed41e22a6a008f863bb28e07bca6bc3194c7f4f8ba5f1e572f7f7a9f4efe99eb9a56a77277706c13a28cd4db8d31c318f7090fb79f9147be6bc35a0146b04639c2a5d50b40a9db293164ee8eb484e8bf9a2061a4d3db403d007d6531554950aad7593b43c86562710776152387d36e2ec1fbccf43e34716dc4cc167679aa28052ab97862314b23c963d5106bec353113c1028fff6db9f119003f156e0fdb7cfa205e1356af27b078a50fb74bc9608d9fc2c44a1c9e69e24c7866af37b0697b62e33bd2774994336301cdccbc", 0xe7, 0x2}, {&(0x7f0000000280)="bb5133b05d232e667b1bc2fcf5f6bf71e516d408f966cc9804be59c32bd2dfbc9e9a83ca5546b8a0679da13510b456ca0020003cef03cb86da8bf9edf2ff5c6c7554397b6c6d18d64bc190273a746e3bc4637c0626b3ef078daee6fd1aa3a019b15e96a467618724c0b0889cb848f23f2ce1d6815ed3501bffb073df8a6b3f6a317bf2beace08450f67567f453523bdf41ffc4b827ca68daafdc0d30cd294c4f6cfe345dfaadeedc7c3404a292f3b6d3a60905d84d53bab5c8eb728952ef87aa94569269615871690e7884741ba1c333d4019046e10baa5f27", 0xd9, 0x100000001}], 0x2000008, &(0x7f00000003c0)={[{@map_acorn}, {@check_strict}, {@uid}, {@nojoliet}, {@uid}, {@utf8}, {@map_off}], [{@smackfsdef={'smackfsdef', 0x3d, 'net/raw\x00'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, 'net/raw\x00'}}]}) r2 = openat(r1, &(0x7f0000000480)='/proc/self/exe\x00', 0x20200, 0x46) writev(r0, &(0x7f0000000640)=[{&(0x7f00000004c0)="8da6cee4ab6f2f59298b7dacd19da1b87d8fbff1f75f489512f28a5ebadb0a4abb170539c9526ae3788534834dffe4c226393bcc47a4142ce4f505e13f0fa18e7d0749de001e105697071cf73604e8b4cd29faf536e7fddb6af2d12f106bb615cccc4d6ad5320b79fa5e6f8c0d9d3298891b473399a01e1ce8a7450829ae75f9ca23d0bec7dc6b47008782ca69aef71c999c03", 0x93}, {&(0x7f0000000040)="50c44310adbbfb7831ac4cf7c592ea3d32bb9bc646ff1d9261430f3b026807b041cd475e71dbb571aa6f865df51c126aace934c1dd440d57", 0x38}, {&(0x7f0000000580)="6a318017d35b1aa0ab2e4fce0fc950ffa04f10558fdb42b1caca452e29a13aff56823b09db4487952561fadce2086ed4cd5fa18dffb56143257e4b8e2d46985552f1ea8315527cd1903bb55c3b19049bb962373b8c93ac97e0bf47f54b37eac1fcf1c18afd02c807a7ecaf9e0ffcd9b8e6ab21e21cad0e92b18e0a9f99d3cd615dc4e77984e8659d", 0x88}], 0x3) read(r2, &(0x7f0000000000), 0xfffffdef) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') 03:16:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 71) 03:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 73) 03:16:23 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000100)=0x6, 0x4) r1 = syz_open_dev$sg(&(0x7f0000001000), 0xfffffffffffff801, 0x4842) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="037fea13008936bffe77e2935765756bfb9c5d9c51403d740d3ec561f68c71695e87b63b0475369236ae3b9f85c09942fabd0e89ef87e2cb5a33f1e9a228c759b2c5dd5eba5362de09ac1715c9277544587cd35a5e47056bbce0a488ab8ea9b025bbd6b1b6017ea47d995d0391caaff3b0764c71f3055b499041a7bd70c8e99689ad190f3d872841594ef61f9f9e2fffd8f60c9a2f50557ac76a94ba6a4a9346a565cf4b85a5001b34fe34dd460c5f0a2606e4af1268ad98fc850e678b3fd15da2e5cebd143862f882404f01", 0xcc}, {&(0x7f0000000200)="9699d45ed0f106416defad836b7c9f4629a1957c0c75b13a9f6935d3af19df4bf08f115b000000338da6ade633a4a2a0df14b6261f5f", 0x36}], 0x2, 0x20, 0x7) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="000000fcffffffffffffff007d8b7e9ade121ff2895f7f5c82413e661198a29f99af47ab3a7b4ccf77d08fa9d4242e76a63d0915b602efe88081768e4d2c0f752db20ce17682c036d6b645ffe905c39a4d4103ddddc4b68573b05188cc1ad1c9258c8c64571b2a9f6ed7730648b097da56d0cbd8", @ANYRES32=0xffffffffffffffff, @ANYBLOB="02000000000000002e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYRES32]) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32=r4, @ANYBLOB="0a0018"], 0x30}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r3, 0x20, 0x70bd25, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1f}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x2000000c) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r7, 0x80049363, &(0x7f0000000000)) 03:16:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x54, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1654.942983] FAULT_INJECTION: forcing a failure. [ 1654.942983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1654.945417] CPU: 1 PID: 10085 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1654.947055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1654.949371] Call Trace: [ 1654.949881] [ 1654.950339] dump_stack_lvl+0x8b/0xb3 [ 1654.951120] should_fail.cold+0x5/0xa [ 1654.951893] prepare_alloc_pages+0x17b/0x500 [ 1654.952780] __alloc_pages+0x131/0x4e0 [ 1654.953549] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1654.954738] ? __lock_acquire+0xbac/0x5b70 [ 1654.955611] ? mark_lock+0xfc/0x2e10 [ 1654.956356] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1654.957444] alloc_pages_vma+0xde/0x500 [ 1654.958255] __handle_mm_fault+0xfb3/0x3570 [ 1654.959060] FAULT_INJECTION: forcing a failure. [ 1654.959060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1654.959122] ? lock_is_held_type+0xd7/0x130 [ 1654.962573] ? __pmd_alloc+0x680/0x680 [ 1654.963393] handle_mm_fault+0x2e6/0xa20 [ 1654.964234] do_user_addr_fault+0x54a/0x12a0 [ 1654.965119] exc_page_fault+0xa2/0x1a0 [ 1654.965888] asm_exc_page_fault+0x1e/0x30 [ 1654.966713] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1654.967808] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1654.971414] RSP: 0018:ffff8880415e79f0 EFLAGS: 00050246 [ 1654.972489] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1654.973915] RDX: 0000000000000000 RSI: ffff88801f341000 RDI: 0000000020023000 [ 1654.975344] RBP: 0000000020023000 R08: 0000000000000000 R09: ffff88801f341fff [ 1654.976785] R10: ffffed1003e683ff R11: 0000000000000001 R12: ffff88801f341000 [ 1654.978211] R13: 0000000020024000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1654.979675] copyout.part.0+0xdf/0x110 [ 1654.980510] copy_page_to_iter+0x248/0xdd0 [ 1654.981404] filemap_read+0x4ff/0xbb0 [ 1654.982178] ? filemap_get_pages+0x1c90/0x1c90 [ 1654.983108] ? lock_acquire+0x1b2/0x4d0 [ 1654.983908] generic_file_read_iter+0x3cf/0x540 [ 1654.984845] ext4_file_read_iter+0x184/0x490 [ 1654.985728] new_sync_read+0x427/0x6f0 [ 1654.986502] ? __ia32_sys_llseek+0x380/0x380 [ 1654.987401] ? security_file_permission+0xb1/0xd0 [ 1654.988464] vfs_read+0x356/0x5f0 [ 1654.989152] ksys_read+0x12d/0x250 [ 1654.989865] ? __ia32_sys_pwrite64+0x230/0x230 [ 1654.990772] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1654.991815] do_syscall_64+0x3b/0x90 [ 1654.992556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1654.993573] RIP: 0033:0x7f0ad231ab19 [ 1654.994293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1654.997997] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1654.999481] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1655.000889] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1655.002275] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1655.003672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1655.005059] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1655.006436] [ 1655.006894] CPU: 0 PID: 10090 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1655.008577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1655.010837] Call Trace: [ 1655.011340] [ 1655.011825] dump_stack_lvl+0x8b/0xb3 [ 1655.012606] should_fail.cold+0x5/0xa [ 1655.013387] prepare_alloc_pages+0x17b/0x500 [ 1655.014285] __alloc_pages+0x131/0x4e0 [ 1655.015091] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1655.016314] ? __lock_acquire+0xbac/0x5b70 [ 1655.017183] ? mark_lock+0xfc/0x2e10 [ 1655.017937] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1655.019048] alloc_pages_vma+0xde/0x500 [ 1655.019887] __handle_mm_fault+0xfb3/0x3570 [ 1655.020767] ? lock_is_held_type+0xd7/0x130 [ 1655.021645] ? __pmd_alloc+0x680/0x680 [ 1655.022461] handle_mm_fault+0x2e6/0xa20 [ 1655.023316] do_user_addr_fault+0x54a/0x12a0 [ 1655.024254] exc_page_fault+0xa2/0x1a0 [ 1655.025040] asm_exc_page_fault+0x1e/0x30 [ 1655.025972] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1655.027187] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1655.029954] loop0: detected capacity change from 0 to 264192 [ 1655.030878] RSP: 0018:ffff88803babf9f0 EFLAGS: 00050246 [ 1655.030905] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1655.030924] RDX: 0000000000000000 RSI: ffff88801f342000 RDI: 0000000020024000 [ 1655.036008] RBP: 0000000020024000 R08: 0000000000000000 R09: ffff88801f342fff [ 1655.037464] R10: ffffed1003e685ff R11: 0000000000000001 R12: ffff88801f342000 [ 1655.038887] R13: 0000000020025000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1655.040338] copyout.part.0+0xdf/0x110 [ 1655.041164] copy_page_to_iter+0x248/0xdd0 [ 1655.042072] filemap_read+0x4ff/0xbb0 [ 1655.042902] ? filemap_get_pages+0x1c90/0x1c90 [ 1655.043932] ? lock_acquire+0x1b2/0x4d0 [ 1655.044785] generic_file_read_iter+0x3cf/0x540 [ 1655.045734] ext4_file_read_iter+0x184/0x490 [ 1655.046648] new_sync_read+0x427/0x6f0 [ 1655.047421] ? __ia32_sys_llseek+0x380/0x380 [ 1655.048376] ? security_file_permission+0xb1/0xd0 [ 1655.049366] vfs_read+0x356/0x5f0 [ 1655.050095] ksys_read+0x12d/0x250 [ 1655.050827] ? __ia32_sys_pwrite64+0x230/0x230 [ 1655.051778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1655.052841] do_syscall_64+0x3b/0x90 [ 1655.053604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1655.054638] RIP: 0033:0x7f63a2e8eb19 [ 1655.055385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1655.059072] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1655.060637] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1655.062136] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1655.063733] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1655.065173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1655.066591] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1655.066969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1655.068075] [ 1655.113500] loop0: detected capacity change from 0 to 264192 03:16:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6b, 0x0, 0x4) 03:16:37 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/firmware/acpi', 0x10000, 0x24) r1 = syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x5, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="6cb2c0f39fbb701243372c3170b103f6ba1b05e994fedef46c05a1ed41e22a6a008f863bb28e07bca6bc3194c7f4f8ba5f1e572f7f7a9f4efe99eb9a56a77277706c13a28cd4db8d31c318f7090fb79f9147be6bc35a0146b04639c2a5d50b40a9db293164ee8eb484e8bf9a2061a4d3db403d007d6531554950aad7593b43c86562710776152387d36e2ec1fbccf43e34716dc4cc167679aa28052ab97862314b23c963d5106bec353113c1028fff6db9f119003f156e0fdb7cfa205e1356af27b078a50fb74bc9608d9fc2c44a1c9e69e24c7866af37b0697b62e33bd2774994336301cdccbc", 0xe7, 0x2}, {&(0x7f0000000280)="bb5133b05d232e667b1bc2fcf5f6bf71e516d408f966cc9804be59c32bd2dfbc9e9a83ca5546b8a0679da13510b456ca0020003cef03cb86da8bf9edf2ff5c6c7554397b6c6d18d64bc190273a746e3bc4637c0626b3ef078daee6fd1aa3a019b15e96a467618724c0b0889cb848f23f2ce1d6815ed3501bffb073df8a6b3f6a317bf2beace08450f67567f453523bdf41ffc4b827ca68daafdc0d30cd294c4f6cfe345dfaadeedc7c3404a292f3b6d3a60905d84d53bab5c8eb728952ef87aa94569269615871690e7884741ba1c333d4019046e10baa5f27", 0xd9, 0x100000001}], 0x2000008, &(0x7f00000003c0)={[{@map_acorn}, {@check_strict}, {@uid}, {@nojoliet}, {@uid}, {@utf8}, {@map_off}], [{@smackfsdef={'smackfsdef', 0x3d, 'net/raw\x00'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, 'net/raw\x00'}}]}) r2 = openat(r1, &(0x7f0000000480)='/proc/self/exe\x00', 0x20200, 0x46) writev(r0, &(0x7f0000000640)=[{&(0x7f00000004c0)="8da6cee4ab6f2f59298b7dacd19da1b87d8fbff1f75f489512f28a5ebadb0a4abb170539c9526ae3788534834dffe4c226393bcc47a4142ce4f505e13f0fa18e7d0749de001e105697071cf73604e8b4cd29faf536e7fddb6af2d12f106bb615cccc4d6ad5320b79fa5e6f8c0d9d3298891b473399a01e1ce8a7450829ae75f9ca23d0bec7dc6b47008782ca69aef71c999c03", 0x93}, {&(0x7f0000000040)="50c44310adbbfb7831ac4cf7c592ea3d32bb9bc646ff1d9261430f3b026807b041cd475e71dbb571aa6f865df51c126aace934c1dd440d57", 0x38}, {&(0x7f0000000580)="6a318017d35b1aa0ab2e4fce0fc950ffa04f10558fdb42b1caca452e29a13aff56823b09db4487952561fadce2086ed4cd5fa18dffb56143257e4b8e2d46985552f1ea8315527cd1903bb55c3b19049bb962373b8c93ac97e0bf47f54b37eac1fcf1c18afd02c807a7ecaf9e0ffcd9b8e6ab21e21cad0e92b18e0a9f99d3cd615dc4e77984e8659d", 0x88}], 0x3) read(r2, &(0x7f0000000000), 0xfffffdef) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') 03:16:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 74) 03:16:37 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x42) read(r0, &(0x7f0000000000), 0xfffffdef) 03:16:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6f, 0x0, 0x4) 03:16:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x55, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 72) 03:16:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400000, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1668.670449] FAULT_INJECTION: forcing a failure. [ 1668.670449] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1668.672902] CPU: 0 PID: 10117 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1668.674577] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1668.676869] Call Trace: [ 1668.677408] [ 1668.677859] dump_stack_lvl+0x8b/0xb3 [ 1668.678650] should_fail.cold+0x5/0xa [ 1668.679448] copy_page_to_iter+0x217/0xdd0 [ 1668.680358] filemap_read+0x4ff/0xbb0 [ 1668.681180] ? filemap_get_pages+0x1c90/0x1c90 [ 1668.682149] ? lock_acquire+0x1b2/0x4d0 [ 1668.682971] generic_file_read_iter+0x3cf/0x540 [ 1668.683948] ext4_file_read_iter+0x184/0x490 [ 1668.684853] new_sync_read+0x427/0x6f0 [ 1668.685670] ? __ia32_sys_llseek+0x380/0x380 [ 1668.686594] ? security_file_permission+0xb1/0xd0 [ 1668.687576] vfs_read+0x356/0x5f0 [ 1668.688320] ksys_read+0x12d/0x250 [ 1668.689041] ? __ia32_sys_pwrite64+0x230/0x230 [ 1668.689987] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1668.691041] do_syscall_64+0x3b/0x90 [ 1668.691842] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1668.693026] RIP: 0033:0x7f63a2e8eb19 [ 1668.693961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.698632] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1668.700773] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1668.701728] loop2: detected capacity change from 0 to 264192 [ 1668.702591] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1668.705032] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1668.706816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1668.708618] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1668.710462] 03:16:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x56, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:37 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) close(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1668.739140] FAULT_INJECTION: forcing a failure. [ 1668.739140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1668.741559] CPU: 0 PID: 10129 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1668.743221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1668.745468] Call Trace: [ 1668.745980] [ 1668.746421] dump_stack_lvl+0x8b/0xb3 [ 1668.747196] should_fail.cold+0x5/0xa [ 1668.747997] copy_page_to_iter+0x217/0xdd0 [ 1668.748881] filemap_read+0x4ff/0xbb0 [ 1668.749668] ? filemap_get_pages+0x1c90/0x1c90 [ 1668.750598] ? lock_acquire+0x1b2/0x4d0 [ 1668.751404] generic_file_read_iter+0x3cf/0x540 [ 1668.752363] ext4_file_read_iter+0x184/0x490 [ 1668.753259] new_sync_read+0x427/0x6f0 [ 1668.754044] ? __ia32_sys_llseek+0x380/0x380 [ 1668.754949] ? security_file_permission+0xb1/0xd0 [ 1668.755944] vfs_read+0x356/0x5f0 [ 1668.756650] ksys_read+0x12d/0x250 [ 1668.757359] ? __ia32_sys_pwrite64+0x230/0x230 [ 1668.758286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1668.759320] do_syscall_64+0x3b/0x90 [ 1668.760079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1668.761099] RIP: 0033:0x7f0ad231ab19 [ 1668.761838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1668.765511] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1668.767021] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1668.768453] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1668.769852] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1668.771256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1668.772674] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1668.774107] 03:16:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x70, 0x0, 0x4) 03:16:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x57, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:37 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x208800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x210000, 0x0) tee(r2, 0xffffffffffffffff, 0x1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x12000, 0xc0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32=r7, @ANYBLOB="0a0018"], 0x30}}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16f8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x12}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) read(r3, &(0x7f0000000000), 0xfffffdef) [ 1668.864608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:16:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x58, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001100)='net/fib_triestat\x00') ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$sg(&(0x7f0000000000), 0xf5, 0x800) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f00000000c0)={{r2}, "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"}) fsetxattr(r1, &(0x7f0000000040)=@random={'os2.', '/dev/sg#\x00'}, &(0x7f0000001140)=',,\'\x00', 0x4, 0x0) open_by_handle_at(r2, &(0x7f0000001180)=@OVL_FILEID_V1={0xf2, 0xf8, {'\x00', {0x0, 0xfb, 0xef, 0x3, 0x5, "6601858e35f014ac3caa230a7256ffcb", "52a3cb3db6e6cca7b184ba195f8ffb8b3f381f498065b6949cb1ea99b4cdfd627fcb66ab198b5b0a90edc2bd8049009119bf5492d2ae815935d476e31fddca6f7f7cd1898b5df00577c6b32adc2afb7ab4f70898a882e606ac54cd967cb887b0f1fd8f26ae40f2e2ce2d34e1490e856b662020127b36fa8eddda7d138a105ef03323211d7c52f47fd527783a12be307ba97a20fe9b44ea041867d451b565c944c3cb78e3115124cf74d293a0ec6a43eb709519fd32cbc28d484b3506c999750d32b02f5ea3aee953feaa18935c220d4c23e3459b0fe0eb6b9501"}}}, 0x204a00) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f00000010c0)) [ 1683.200611] FAULT_INJECTION: forcing a failure. [ 1683.200611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1683.203011] CPU: 1 PID: 10150 Comm: syz-executor.6 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1683.204669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1683.206910] Call Trace: [ 1683.207421] [ 1683.207867] dump_stack_lvl+0x8b/0xb3 03:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 75) 03:16:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6c, 0x0, 0x4) 03:16:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6a, 0x0, 0x4) 03:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x71, 0x0, 0x4) 03:16:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 73) 03:16:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 1683.208669] should_fail.cold+0x5/0xa [ 1683.209620] prepare_alloc_pages+0x17b/0x500 [ 1683.210504] __alloc_pages+0x131/0x4e0 [ 1683.211278] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1683.212480] ? __lock_acquire+0xbac/0x5b70 [ 1683.213333] ? mark_lock+0xfc/0x2e10 [ 1683.214068] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1683.215161] alloc_pages_vma+0xde/0x500 [ 1683.215961] __handle_mm_fault+0xfb3/0x3570 [ 1683.216854] ? lock_is_held_type+0xd7/0x130 [ 1683.217705] ? __pmd_alloc+0x680/0x680 [ 1683.218523] handle_mm_fault+0x2e6/0xa20 [ 1683.219347] do_user_addr_fault+0x54a/0x12a0 [ 1683.220250] exc_page_fault+0xa2/0x1a0 [ 1683.221027] asm_exc_page_fault+0x1e/0x30 03:16:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000001340)=[{&(0x7f00000000c0)="48187fe7f0c7e1512fab750c9abcd428b54ffbd2662103d4a04589449e2bb8a9f269fd29468d605ee8afb8f81cbdff4914730fbf5cd390d0e258a9b60c389edaef2f7c3d176ff9985a6314dab8b5214dbd1d3d9f83721cd1a365ef91eebaef01746e5c7c79f064d62c1f246d1445b9aaea8f5f22e46f78b57d59318c8d677f6e69742b3f9b11d3de0daddb50ce3c3b3d8d52e6216ad2b8c5669b13c6954c47edd45c8322", 0xa4}, {&(0x7f0000000000)="b0c816152599807f8db906f14183", 0xe}, {&(0x7f0000000180)="057ad912d02973cf746a3f0b8e0a313f2ff89a01745e536591fec0a2e7225e1aac093ef2cb5f120451b561b53f6071fd23d3510ade1e55f6597c3615dd7ab1c1078b61ca087def0d", 0x48}, {&(0x7f0000000040)="2b3ab3e0d38480bc5fce8ab535824fe46396215abcc176457d53308e834742bdf992da030a83ea3b", 0x28}, {&(0x7f0000000200)="468e48d568ddbd2cd7513ec6e779991b9cb158d10ab7ed6472c051de5de82579e981fb171e6ba319f588cd4b77c01662", 0x30}, {&(0x7f0000000240)="141d096d5dc4c09ce01bd55e956b74bb8dceeb7805309df676a08924a9e26a9584442d2047ef431b2873bce798f86d3126f475402c2b9233a07f8ad1287210b37071c3ebd9523496ef2771b79bc30ea1ff38ad1d855306b860be980b9f2dd45b4f83aac834c02ed82c281904b2f7a00455b44d90fa7052604274d1fc033b2ee3a589d001d855823bc98590e64a34397c8bc720e5ba0aeb1d226e95f5e236bccbab329cde213e7c39eb9cb3eed8f1c1a0cd9a926f252475ed82b388225cd300", 0xbf}, {&(0x7f0000000300)="7dd8a3540aeb1f1af467a72f389bda9edf06defee64f1ff9", 0x18}, {&(0x7f0000000340)="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", 0x1000}], 0x8, 0x7, 0x8) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1683.221844] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1683.223101] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1683.226726] RSP: 0018:ffff8880363f79f0 EFLAGS: 00050246 [ 1683.227781] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1683.229190] RDX: 0000000000000000 RSI: ffff88801f342000 RDI: 0000000020024000 [ 1683.230591] RBP: 0000000020024000 R08: 0000000000000000 R09: ffff88801f342fff [ 1683.231998] R10: ffffed1003e685ff R11: 0000000000000001 R12: ffff88801f342000 [ 1683.233398] R13: 0000000020025000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1683.234824] copyout.part.0+0xdf/0x110 [ 1683.235611] copy_page_to_iter+0x248/0xdd0 [ 1683.236503] filemap_read+0x4ff/0xbb0 [ 1683.237287] ? filemap_get_pages+0x1c90/0x1c90 [ 1683.238220] ? lock_acquire+0x1b2/0x4d0 [ 1683.239021] generic_file_read_iter+0x3cf/0x540 [ 1683.239953] ext4_file_read_iter+0x184/0x490 [ 1683.240847] new_sync_read+0x427/0x6f0 [ 1683.241623] ? __ia32_sys_llseek+0x380/0x380 [ 1683.242522] ? security_file_permission+0xb1/0xd0 03:16:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x59, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1683.243492] vfs_read+0x356/0x5f0 [ 1683.244312] ksys_read+0x12d/0x250 [ 1683.245029] ? __ia32_sys_pwrite64+0x230/0x230 [ 1683.245944] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1683.246971] do_syscall_64+0x3b/0x90 [ 1683.247723] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.248756] RIP: 0033:0x7f0ad231ab19 [ 1683.249490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.253097] RSP: 002b:00007f0acf890188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1683.254590] RAX: ffffffffffffffda RBX: 00007f0ad242df60 RCX: 00007f0ad231ab19 [ 1683.256211] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1683.257614] RBP: 00007f0acf8901d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.259016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.260422] R13: 00007ffea8f7559f R14: 00007f0acf890300 R15: 0000000000022000 [ 1683.261853] [ 1683.278970] FAULT_INJECTION: forcing a failure. [ 1683.278970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1683.281458] CPU: 1 PID: 10157 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1683.283104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1683.285350] Call Trace: [ 1683.285854] [ 1683.286296] dump_stack_lvl+0x8b/0xb3 [ 1683.287073] should_fail.cold+0x5/0xa [ 1683.287851] prepare_alloc_pages+0x17b/0x500 [ 1683.288751] __alloc_pages+0x131/0x4e0 [ 1683.289521] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1683.290704] ? __lock_acquire+0xbac/0x5b70 [ 1683.291553] ? mark_lock+0xfc/0x2e10 [ 1683.292299] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1683.293391] alloc_pages_vma+0xde/0x500 [ 1683.294190] __handle_mm_fault+0xfb3/0x3570 [ 1683.295053] ? lock_is_held_type+0xd7/0x130 [ 1683.295901] ? __pmd_alloc+0x680/0x680 [ 1683.296735] handle_mm_fault+0x2e6/0xa20 [ 1683.297558] do_user_addr_fault+0x54a/0x12a0 [ 1683.298444] exc_page_fault+0xa2/0x1a0 03:16:52 executing program 4: exit(0x87) exit(0x7) exit(0x8001) read(0xffffffffffffffff, &(0x7f0000000000), 0x0) [ 1683.299204] asm_exc_page_fault+0x1e/0x30 [ 1683.300170] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1683.301219] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1683.304808] RSP: 0018:ffff8880414879f0 EFLAGS: 00050246 [ 1683.305865] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1683.307252] RDX: 0000000000000000 RSI: ffff88801f343000 RDI: 0000000020025000 [ 1683.308642] RBP: 0000000020025000 R08: 0000000000000000 R09: ffff88801f343fff [ 1683.310028] R10: ffffed1003e687ff R11: 0000000000000001 R12: ffff88801f343000 [ 1683.311408] R13: 0000000020026000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1683.312827] copyout.part.0+0xdf/0x110 [ 1683.313609] copy_page_to_iter+0x248/0xdd0 [ 1683.314469] filemap_read+0x4ff/0xbb0 [ 1683.315240] ? filemap_get_pages+0x1c90/0x1c90 [ 1683.316186] ? lock_acquire+0x1b2/0x4d0 [ 1683.316977] generic_file_read_iter+0x3cf/0x540 [ 1683.317904] ext4_file_read_iter+0x184/0x490 [ 1683.318778] new_sync_read+0x427/0x6f0 [ 1683.319547] ? __ia32_sys_llseek+0x380/0x380 [ 1683.320443] ? security_file_permission+0xb1/0xd0 [ 1683.321414] vfs_read+0x356/0x5f0 [ 1683.322113] ksys_read+0x12d/0x250 [ 1683.322815] ? __ia32_sys_pwrite64+0x230/0x230 [ 1683.323719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1683.324753] do_syscall_64+0x3b/0x90 [ 1683.325499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.326503] RIP: 0033:0x7f63a2e8eb19 [ 1683.327223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.330798] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1683.332288] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1683.333678] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1683.335063] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.336455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:16:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1683.337982] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1683.339399] [ 1683.372403] Process accounting paused 03:16:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 74) 03:16:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x1f8) read(r0, &(0x7f0000000000)=""/2, 0x5) 03:16:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6d, 0x0, 0x4) 03:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x72, 0x0, 0x4) 03:16:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6a, 0x0, 0x4) 03:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 76) 03:16:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$setsig(r0, 0xa, 0x17) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) clone3(&(0x7f0000000240)={0x21082000, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0), {0x1b}, &(0x7f0000000100)=""/102, 0x66, &(0x7f0000000180)=""/108, &(0x7f0000000200)=[0xffffffffffffffff], 0x1, {r1}}, 0x58) read(r2, &(0x7f00000002c0)=""/110, 0x6e) 03:16:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:16:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6e, 0x0, 0x4) 03:16:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:16:52 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x73, 0x0, 0x4) [ 1683.685225] FAULT_INJECTION: forcing a failure. [ 1683.685225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1683.687573] CPU: 0 PID: 10211 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1683.689235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1683.691459] Call Trace: [ 1683.691967] [ 1683.692417] dump_stack_lvl+0x8b/0xb3 [ 1683.693202] should_fail.cold+0x5/0xa [ 1683.693975] copy_page_to_iter+0x217/0xdd0 [ 1683.694872] filemap_read+0x4ff/0xbb0 [ 1683.695643] ? filemap_get_pages+0x1c90/0x1c90 [ 1683.696575] ? lock_acquire+0x1b2/0x4d0 [ 1683.697374] generic_file_read_iter+0x3cf/0x540 [ 1683.698307] ext4_file_read_iter+0x184/0x490 [ 1683.699193] new_sync_read+0x427/0x6f0 [ 1683.699968] ? __ia32_sys_llseek+0x380/0x380 [ 1683.701182] ? security_file_permission+0xb1/0xd0 [ 1683.702158] vfs_read+0x356/0x5f0 [ 1683.702861] ksys_read+0x12d/0x250 [ 1683.703566] ? __ia32_sys_pwrite64+0x230/0x230 [ 1683.704487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1683.705523] do_syscall_64+0x3b/0x90 [ 1683.706276] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1683.707269] RIP: 0033:0x7f63a2e8eb19 [ 1683.708009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1683.711642] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1683.713163] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1683.714575] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1683.715984] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.717403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1683.718826] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1683.720293] 03:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x74, 0x0, 0x4) [ 1683.754089] loop2: detected capacity change from 0 to 256 03:17:06 executing program 4: ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000000), 0x10) 03:17:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6f, 0x0, 0x4) 03:17:06 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x33, 0x0, 0x4) 03:17:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0x11ffffdef) 03:17:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 77) 03:17:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x75, 0x0, 0x4) 03:17:06 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$HIDIOCGDEVINFO(0xffffffffffffffff, 0x801c4803, &(0x7f00000000c0)=""/253) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01008e057000fcdbdf250100000f00"/31], 0x34}, 0x1, 0x0, 0x0, 0x20008000}, 0x50) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1697.194085] FAULT_INJECTION: forcing a failure. [ 1697.194085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1697.196741] CPU: 0 PID: 10245 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1697.198486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1697.201015] Call Trace: [ 1697.201563] [ 1697.202036] dump_stack_lvl+0x8b/0xb3 [ 1697.202861] should_fail.cold+0x5/0xa [ 1697.203683] prepare_alloc_pages+0x17b/0x500 [ 1697.204635] __alloc_pages+0x131/0x4e0 [ 1697.205464] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1697.206730] ? __lock_acquire+0xbac/0x5b70 [ 1697.207633] ? mark_lock+0xfc/0x2e10 [ 1697.208443] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1697.209601] alloc_pages_vma+0xde/0x500 [ 1697.210453] __handle_mm_fault+0xfb3/0x3570 [ 1697.211379] ? lock_is_held_type+0xd7/0x130 [ 1697.212291] ? __pmd_alloc+0x680/0x680 [ 1697.213177] handle_mm_fault+0x2e6/0xa20 [ 1697.214061] do_user_addr_fault+0x54a/0x12a0 [ 1697.215030] exc_page_fault+0xa2/0x1a0 [ 1697.215864] asm_exc_page_fault+0x1e/0x30 [ 1697.216769] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1697.217913] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1697.221787] RSP: 0018:ffff8880381c79f0 EFLAGS: 00050246 [ 1697.222910] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1697.224429] RDX: 0000000000000000 RSI: ffff88801f344000 RDI: 0000000020026000 [ 1697.225944] RBP: 0000000020026000 R08: 0000000000000000 R09: ffff88801f344fff [ 1697.227456] R10: ffffed1003e689ff R11: 0000000000000001 R12: ffff88801f344000 [ 1697.228984] R13: 0000000020027000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1697.230524] copyout.part.0+0xdf/0x110 [ 1697.231375] copy_page_to_iter+0x248/0xdd0 [ 1697.232319] filemap_read+0x4ff/0xbb0 [ 1697.233155] ? filemap_get_pages+0x1c90/0x1c90 [ 1697.234156] ? lock_acquire+0x1b2/0x4d0 [ 1697.235020] generic_file_read_iter+0x3cf/0x540 [ 1697.236022] ext4_file_read_iter+0x184/0x490 [ 1697.236974] new_sync_read+0x427/0x6f0 [ 1697.237802] ? __ia32_sys_llseek+0x380/0x380 [ 1697.238767] ? security_file_permission+0xb1/0xd0 [ 1697.239803] vfs_read+0x356/0x5f0 [ 1697.240573] ksys_read+0x12d/0x250 [ 1697.241331] ? __ia32_sys_pwrite64+0x230/0x230 [ 1697.242307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1697.243423] do_syscall_64+0x3b/0x90 [ 1697.244239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1697.245332] RIP: 0033:0x7f63a2e8eb19 [ 1697.246125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1697.250039] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1697.251665] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1697.253175] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1697.254684] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.256198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1697.257733] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1697.259274] 03:17:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x76, 0x0, 0x4) 03:17:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x74, 0x0, 0x4) 03:17:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x70, 0x0, 0x4) 03:17:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = inotify_init1(0x80000) read(r0, &(0x7f0000000000)=""/23, 0xfffffe51) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) [ 1697.336295] loop0: detected capacity change from 0 to 264192 03:17:06 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x80800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002640)=0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002740), 0x40840, 0x0) r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_mount_image$nfs4(&(0x7f0000002780), &(0x7f00000027c0)='./file0\x00', 0x200, 0x5, &(0x7f0000003a00)=[{&(0x7f0000002800)="771d3b5729f70921219648f50747a7424bd3a0e55ac593e7d5497dcf356b56a39fed5ee25ee068fbf49aa64f2db64a4f2b0b5e43263b31ed873468da20afb66a9af77ba704793fba597056e9d74634ac85e533ead84bbfed8d4f3a0c56d9896258206d3c1e5045559b744bd631818363e96e31ec814b0aea34f71fa40dde71533900072ab4eec4328a38bec4dba217f649c2805c9d53602cb7e3c89c3c1cd34ea62593b7756da1a593bf27e0c1f53ece40083ddd13d37f3b6438a370e84bb3174698c80aae604c2c56f63d6947ce0dcf221212b919813fdb0bc11641646be7309a54d55f3287ddaeccb487", 0xeb, 0x1}, {&(0x7f0000002900)="3106cc8c1e4926f25df9e1fbeddd047f6f6c6a3978189b62394286604532252b5b3d6191", 0x24, 0x6}, {&(0x7f0000002940)="bc66033bbd509c52f9d755b2cc14d9e70d20227453b9176c03b6b4599baccd304fadfb5eedf8a486a199ab78323309f6dc05d6acb2b7885cb6494657f76cda4f14f9085014835b22842a2bbaa1685df183d3", 0x52, 0x9}, {&(0x7f00000029c0)="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", 0x1000, 0x80000001}, {&(0x7f00000039c0)="2bc3e85a162c6e5a62abe230dec46103f2a6679c064b5757133775becc4fe90b66147b", 0x23, 0x3}], 0x218000, &(0x7f0000003a80)={[{}, {'\x00'}, {'/&'}, {'+.'}, {'@}]]'}], [{@obj_user={'obj_user', 0x3d, '-\x0f^$%!['}}, {@fsname={'fsname', 0x3d, ',6'}}, {@euid_gt}]}) r8 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r9, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000003b00), 0x505800, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = syz_open_dev$vcsn(&(0x7f0000003b40), 0x87, 0xa18000) sendmsg$unix(r1, &(0x7f0000003c00)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000000140)="7a74e6177aee2bc3742c296f6f3e4f59c37a3a2bfd83aca5ed04e6e456009b01b65cbdece23520a6fb77fb1a0bd87b3808ce67d5f043b9d5892db4bfa1e598c168ccd2d4d75bf6bcc7028f7b97b350da8b126c0ef119caf70c58a6d3efe6f747c3397c12a26d0c4b6565779cf3ccb308c131afb946b8cdd7d40588b84b69391caff9fa89c36229db3faebeee7d0949628a4e4a20c4ef8cae7a1b8d081256504b8812a4bdf57ff5c7", 0xa8}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="ce1117891cf483eb07b70d26ad6b8c9e486d4e4ef631adf096406a9aacc5e9972e2bff08b849e83c70899332d9f49a48d7ea17d0f87d82b2f77c6d55c24082abf03909d98e596c115818145f64558a6cd1f903295ed282846884f8f345550cfc56c0573346d6aef3fc7fcf33bde91ad96fbcba2b08821adf72fb25d8ca8668d4f6868e272292bb91848a6192b282f937b6c66ed9922072e6e8c3d913d1533d27c6ff9df373bb2e05b6d68fe998fd", 0xae}, {&(0x7f00000012c0)="9ebe64e4c8cca288e58a4a3e7c0fcfbee0b30678d49320e1fca3b1c47c420046d7ba966a27d00c7b52bacae1dbbdad609bcf9dd1f633c309a6bbc9020109fc712c477e183e8fb38bb3a11659a791ca88dc77ab970191f30b5ae51de09bed532e165dc7539ccd419054fc60d21dbae3d57d1aaafce61a4e8e3de69e43558e6ab98420ec05656b53784e2b18d20102ac5a92d93a0c3790141d06e97b34b54e05dddac6aed8ab95e2a870eb7f1c758a75bdc3140ed4668df197dc6e6e983983b71764e447", 0xc3}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000040)="35d48799d6f7995dfb", 0x9}, {&(0x7f00000023c0)="85ebfb19d4054506200cee8e1f289ecc539780f792ee052827330b36eb28cd55b4aed9f55195460015056bac6984550c802ff66bd302d177d922777ee39c812dd25d271f863d4b9c16752745dba6b453a4e4212a4916a9a7039bf5ae02a3782264aec3335d45f2bd69aa44dc22780cab2a666a", 0x73}, {&(0x7f0000002440)="91a56e59c4230132a1dbe602b0a4466396fafe317ac36184a9b9c46881d82499a3981d0c5f4b276f73b9fada6bcfb3572d2b5029689174fa3d578b383896ed2d15de88122ba24b1007e29cb5f0b573f5770da6a783fb973e14f5069249993de238dca16c654c2868be3e0044133b9ef9401df9a9ddf8a9d65e20556acbc3f4410cb04a0721ab64d30e27116ff3b2bbee627bd0ee588e2ef649b9b27daa6621360f80bef2796776ccd9", 0xa9}, {&(0x7f0000002500)="d065fd", 0x3}, {&(0x7f0000002540)="342b081824c575384e48291e2ff6ab90a8a9c17b13d29aaf43b80636a65916c60f1201541a2d489434bf0a8195a55da22296fa1eaedadda0d4", 0x39}], 0xa, &(0x7f0000003b80)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x38, 0x1, 0x1, [r5, r0, r6, r7, r8, r9, r0, r0, r0, r0]}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r10, r0, r11, r12]}}], 0x80, 0x1}, 0x4800) read(r0, &(0x7f0000000000), 0xfffffdef) 03:17:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x71, 0x0, 0x4) 03:17:06 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1697.455353] loop0: detected capacity change from 0 to 264192 03:17:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000040)=',(\b^H[(#^\']{\x00', &(0x7f00000000c0)='@*$^,}#\x00', &(0x7f0000000100)='-#-.:\'@\'},:[-$\x00', &(0x7f0000000140)='\'-.\x00'], &(0x7f0000000400)=[&(0x7f00000001c0)='\x8b-+0\x8b\\-@/#\x00', &(0x7f0000000200)='\\\x00', &(0x7f0000000240)='^-,/}\x00', &(0x7f0000000280)=']{\x00', &(0x7f00000002c0)='+%.%{\x00', &(0x7f0000000300)='\xa0+}-%\x00', &(0x7f0000000340)=':/\x00', &(0x7f0000000380)='!&#\x96$(:\x00', &(0x7f00000003c0)='\'*^\x00'], 0x1000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x200000, 0x20) read(r0, &(0x7f0000000000), 0xfffffdef) 03:17:22 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x444000, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000190c0), 0x10180, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000019100)={0x1f, 0xf78, 0x8, {0x6, 0x8}, 0x6, 0x1}) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) 03:17:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x71, 0x0, 0x4) 03:17:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x72, 0x0, 0x4) 03:17:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 78) 03:17:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x77, 0x0, 0x4) 03:17:22 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5f, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040)=0x40, 0x7192) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ioctl$HIDIOCGRAWNAME(r0, 0x80404804, &(0x7f0000000000)) fcntl$setflags(r0, 0x2, 0x0) [ 1713.374461] FAULT_INJECTION: forcing a failure. [ 1713.374461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1713.377195] CPU: 1 PID: 10296 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1713.379033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1713.381728] Call Trace: [ 1713.382277] [ 1713.382747] dump_stack_lvl+0x8b/0xb3 [ 1713.383605] should_fail.cold+0x5/0xa [ 1713.384474] copy_page_to_iter+0x217/0xdd0 [ 1713.385432] filemap_read+0x4ff/0xbb0 [ 1713.386278] ? filemap_get_pages+0x1c90/0x1c90 [ 1713.387293] ? lock_acquire+0x1b2/0x4d0 [ 1713.388160] generic_file_read_iter+0x3cf/0x540 [ 1713.389195] ext4_file_read_iter+0x184/0x490 [ 1713.390162] new_sync_read+0x427/0x6f0 [ 1713.391007] ? __ia32_sys_llseek+0x380/0x380 [ 1713.391957] ? security_file_permission+0xb1/0xd0 [ 1713.393044] vfs_read+0x356/0x5f0 [ 1713.393786] ksys_read+0x12d/0x250 [ 1713.394528] ? __ia32_sys_pwrite64+0x230/0x230 [ 1713.395526] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1713.396622] do_syscall_64+0x3b/0x90 [ 1713.397429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1713.398529] RIP: 0033:0x7f63a2e8eb19 [ 1713.399321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1713.403264] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1713.405053] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1713.406582] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1713.408106] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1713.409652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1713.411181] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1713.412753] 03:17:22 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x60, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x73, 0x0, 0x4) [ 1713.476892] Process accounting resumed 03:17:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:17:22 executing program 4: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000180)='ramfs\x00', &(0x7f00000001c0)="f9", 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x200200, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:17:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:17:36 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0004c, &(0x7f00000000c0)={[{}, {@xattr}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@seclabel}, {@uid_gt={'uid>', r1}}, {@appraise_type}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}) 03:17:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x74, 0x0, 0x4) 03:17:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 79) 03:17:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x78, 0x0, 0x4) 03:17:36 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x61, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x6f, 0x0, 0x4) 03:17:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x8, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0xfffffffffffffffc, 0x0, 0x0, @scatter={0x5, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/28, 0x1c}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000140)=""/158, 0x9e}, {&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000200)=""/48, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x20001002, 0x0}) close_range(r1, r0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1727.295100] FAULT_INJECTION: forcing a failure. [ 1727.295100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1727.297523] CPU: 0 PID: 10329 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1727.299215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1727.301636] Call Trace: [ 1727.302137] [ 1727.302574] dump_stack_lvl+0x8b/0xb3 [ 1727.303338] should_fail.cold+0x5/0xa [ 1727.304103] prepare_alloc_pages+0x17b/0x500 [ 1727.305008] __alloc_pages+0x131/0x4e0 [ 1727.305774] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1727.306954] ? __lock_acquire+0xbac/0x5b70 [ 1727.307798] ? mark_lock+0xfc/0x2e10 [ 1727.308528] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1727.309636] alloc_pages_vma+0xde/0x500 [ 1727.310434] __handle_mm_fault+0xfb3/0x3570 [ 1727.311299] ? lock_is_held_type+0xd7/0x130 [ 1727.312146] ? __pmd_alloc+0x680/0x680 [ 1727.312973] handle_mm_fault+0x2e6/0xa20 [ 1727.313795] do_user_addr_fault+0x54a/0x12a0 [ 1727.314672] exc_page_fault+0xa2/0x1a0 [ 1727.315434] asm_exc_page_fault+0x1e/0x30 [ 1727.316242] RIP: 0010:copy_user_generic_string+0x2c/0x40 03:17:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x75, 0x0, 0x4) 03:17:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x79, 0x0, 0x4) [ 1727.317332] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1727.320917] RSP: 0018:ffff8880410b79f0 EFLAGS: 00050246 [ 1727.321946] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1727.323327] RDX: 0000000000000000 RSI: ffff88801f345000 RDI: 0000000020027000 [ 1727.324722] RBP: 0000000020027000 R08: 0000000000000000 R09: ffff88801f345fff [ 1727.326100] R10: ffffed1003e68bff R11: 0000000000000001 R12: ffff88801f345000 [ 1727.327475] R13: 0000000020028000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1727.328897] copyout.part.0+0xdf/0x110 [ 1727.329676] copy_page_to_iter+0x248/0xdd0 [ 1727.330533] filemap_read+0x4ff/0xbb0 [ 1727.331301] ? filemap_get_pages+0x1c90/0x1c90 [ 1727.332219] ? lock_acquire+0x1b2/0x4d0 [ 1727.333021] generic_file_read_iter+0x3cf/0x540 [ 1727.333942] ext4_file_read_iter+0x184/0x490 [ 1727.334815] new_sync_read+0x427/0x6f0 [ 1727.335583] ? __ia32_sys_llseek+0x380/0x380 [ 1727.336470] ? security_file_permission+0xb1/0xd0 [ 1727.337439] vfs_read+0x356/0x5f0 [ 1727.338132] ksys_read+0x12d/0x250 [ 1727.338835] ? __ia32_sys_pwrite64+0x230/0x230 [ 1727.339736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1727.340759] do_syscall_64+0x3b/0x90 [ 1727.341500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1727.342501] RIP: 0033:0x7f63a2e8eb19 [ 1727.343223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1727.346786] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1727.348255] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1727.349654] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1727.351033] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1727.352417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1727.353812] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1727.355220] 03:17:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f00000190c0)=""/102393, 0x18ff9) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000000c0)={0x6, 0x6, 0x5, 0x800, 0x5, [{0xfffffffffffffffd, 0x9, 0x7, '\x00', 0x2000}, {0x4, 0x4, 0x800, '\x00', 0x2280}, {0x715, 0x7, 0x8, '\x00', 0x800}, {0x3, 0xfffffffffffffffd, 0xffffffffffffffd7, '\x00', 0x1400}, {0x240, 0x1000, 0x3, '\x00', 0x3807}]}) read(0xffffffffffffffff, 0x0, 0x0) 03:17:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x80) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r1, &(0x7f0000001040)=""/102395, 0x18ffb) read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000040)=0xbb) 03:17:36 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000400), 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) [ 1727.436061] loop2: detected capacity change from 0 to 256 03:17:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8000) 03:17:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x62, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r0, &(0x7f0000000040)=""/7, 0x7) read(0xffffffffffffffff, 0x0, 0x0) 03:17:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 80) 03:17:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7a, 0x0, 0x4) 03:17:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x31, 0x0, 0x4) 03:17:52 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="dacd620cde033df9b316dfbeb73c59ea815be95d51d96bfad54d8feb22575c339f106ff06264c1423dce48c0fa7b7eed2549571939960f632602ad2dc8006c7f581526b17b83c6a4366bf292204e04d44eb900ff1dad18e25942bf16ddf264944364b1778dce8e29c94e09368c2f3fd330b34bbeac47", 0x76, 0x1000}, {&(0x7f0000000140)="49f483476d946350de62f73c7c6023e6a14d6e597cc0919cb60293b7ba7659fd563fc8655858f0e9f6f7597d1555160d1e5827d3404dbc047c1d40ea1cfe24ee72e6929be8fc33bf14aa1ddef95967533fcd6560bdd01d008115c8f337d21bd0c38a01cb1938d6e3986cb45f92a1b67b3f2f6fbc727c62f7e6ba6b6b8ec392997bf1563b5990d43d2c9ba7a45296eb618b6ba75ab249837b0c67712d7b0271b238473801096c657d939d1175d7ee488c3bd99778782b2f06edcfb4a6d5d0cca93df7b9073b9c", 0xc6, 0x7}], 0x1000400, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c6e66732c757466383d312c6e667324756e695f787072616973651c00000000000000000000000000000008bf4e19d406c98f358726d03a617d774ca5bff1eb1d90374bd082caaec59550fdf68c652a30e21c7bbd9801ccbfa0de1fe32583ff4ac834cf5e3b6196364dfe85820dae129203769f928dd7d2c8e0fb38ac10466ab53fdf7387c8a7344fd32df39e2143380c6799b05dc04a37a69284c33e3759b7f314dfaa5abc67946a8b1a36a590e76fd6e27a8d063329d26252846c05053dcad09225a8fba1a165ca393de8769bee525e"]) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x4a0000, 0x22) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) 03:17:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x76, 0x0, 0x4) [ 1743.559411] FAULT_INJECTION: forcing a failure. [ 1743.559411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1743.561897] CPU: 0 PID: 10368 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1743.563563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1743.565851] Call Trace: [ 1743.566368] [ 1743.566816] dump_stack_lvl+0x8b/0xb3 [ 1743.567604] should_fail.cold+0x5/0xa [ 1743.568378] copy_page_to_iter+0x217/0xdd0 [ 1743.569275] filemap_read+0x4ff/0xbb0 [ 1743.570071] ? filemap_get_pages+0x1c90/0x1c90 [ 1743.571006] ? lock_acquire+0x1b2/0x4d0 [ 1743.571828] generic_file_read_iter+0x3cf/0x540 [ 1743.572764] ext4_file_read_iter+0x184/0x490 [ 1743.573679] new_sync_read+0x427/0x6f0 [ 1743.574471] ? __ia32_sys_llseek+0x380/0x380 [ 1743.575383] ? security_file_permission+0xb1/0xd0 [ 1743.576353] vfs_read+0x356/0x5f0 [ 1743.577073] ksys_read+0x12d/0x250 [ 1743.577791] ? __ia32_sys_pwrite64+0x230/0x230 [ 1743.578719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1743.579750] do_syscall_64+0x3b/0x90 [ 1743.580517] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1743.581553] RIP: 0033:0x7f63a2e8eb19 [ 1743.582295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1743.586108] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1743.587718] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1743.589176] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1743.590599] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1743.592018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1743.593447] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1743.594895] 03:17:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x63, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:17:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24000, 0x64) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1743.693574] Process accounting paused 03:17:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x77, 0x0, 0x4) 03:17:52 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:17:52 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {&(0x7f0000000400)}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:17:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7b, 0x0, 0x4) 03:17:52 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x48) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:05 executing program 0: fadvise64(0xffffffffffffffff, 0x8, 0x9, 0x2) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x501e40, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x7, 0x40}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x4040897) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r3, 0x3304) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x3) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x78, 0x0, 0x4) 03:18:05 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 81) 03:18:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fallocate(r0, 0x21, 0x17f1625c, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:18:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7c, 0x0, 0x4) 03:18:05 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8000) 03:18:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x64, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1756.573517] FAULT_INJECTION: forcing a failure. [ 1756.573517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1756.575931] CPU: 0 PID: 10418 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1756.577556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1756.579729] Call Trace: [ 1756.580224] [ 1756.580648] dump_stack_lvl+0x8b/0xb3 [ 1756.581434] should_fail.cold+0x5/0xa [ 1756.582190] prepare_alloc_pages+0x17b/0x500 [ 1756.583082] __alloc_pages+0x131/0x4e0 [ 1756.583864] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1756.585066] ? __lock_acquire+0xbac/0x5b70 [ 1756.585944] ? mark_lock+0xfc/0x2e10 [ 1756.586690] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1756.587795] alloc_pages_vma+0xde/0x500 [ 1756.588618] __handle_mm_fault+0xfb3/0x3570 [ 1756.589516] ? lock_is_held_type+0xd7/0x130 [ 1756.590379] ? __pmd_alloc+0x680/0x680 [ 1756.591210] handle_mm_fault+0x2e6/0xa20 [ 1756.592046] do_user_addr_fault+0x54a/0x12a0 [ 1756.592952] exc_page_fault+0xa2/0x1a0 [ 1756.593735] asm_exc_page_fault+0x1e/0x30 [ 1756.594558] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1756.595644] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1756.599307] RSP: 0018:ffff8880406c79f0 EFLAGS: 00050246 [ 1756.600349] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1756.601760] RDX: 0000000000000000 RSI: ffff88801f346000 RDI: 0000000020028000 [ 1756.603157] RBP: 0000000020028000 R08: 0000000000000000 R09: ffff88801f346fff [ 1756.604566] R10: ffffed1003e68dff R11: 0000000000000001 R12: ffff88801f346000 [ 1756.605985] R13: 0000000020029000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1756.607421] copyout.part.0+0xdf/0x110 [ 1756.608213] copy_page_to_iter+0x248/0xdd0 [ 1756.609085] filemap_read+0x4ff/0xbb0 [ 1756.609880] ? filemap_get_pages+0x1c90/0x1c90 [ 1756.610821] ? lock_acquire+0x1b2/0x4d0 [ 1756.611640] generic_file_read_iter+0x3cf/0x540 [ 1756.612574] ext4_file_read_iter+0x184/0x490 [ 1756.613475] new_sync_read+0x427/0x6f0 [ 1756.614261] ? __ia32_sys_llseek+0x380/0x380 [ 1756.615167] ? security_file_permission+0xb1/0xd0 [ 1756.616137] vfs_read+0x356/0x5f0 [ 1756.616841] ksys_read+0x12d/0x250 [ 1756.617561] ? __ia32_sys_pwrite64+0x230/0x230 [ 1756.618474] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.619509] do_syscall_64+0x3b/0x90 [ 1756.620263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1756.621291] RIP: 0033:0x7f63a2e8eb19 [ 1756.622015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.625625] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1756.627127] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1756.628536] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1756.629940] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.631327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1756.633005] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1756.634446] 03:18:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x65, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x79, 0x0, 0x4) 03:18:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x66, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7a, 0x0, 0x4) 03:18:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/55, 0x37) fadvise64(0xffffffffffffffff, 0xfffffffffffffffc, 0x200, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x305040, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x2, 0x2000}, 0x4) fsync(r0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000480)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r3, &(0x7f0000000000), 0xfffffdef) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="381aa238", @ANYRES16=0x0, @ANYBLOB="000125bd70000200df250400000008000300faffffff080002000000000008000200ffffffff140001000000000000000000000000120000000110007aa66d9604000180ffff01040000090000000500050003002204"], 0x58}, 0x1, 0x0, 0x0, 0x40c0}, 0x1800) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000000)={@initdev, @initdev}, &(0x7f0000000040)=0x8) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000340)={{0x10000, 0x2}, 0x100, './file0\x00'}) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x6, 0x90, 0x1, 0x800}, {0x7, 0x9, 0x3, 0x6}, {0x2, 0x1, 0x0, 0x7}]}, 0x10) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 82) 03:18:19 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x67, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000880)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}]}, 0x2c}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x20) fallocate(r3, 0x10, 0x6f18fd07, 0x7) 03:18:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7d, 0x0, 0x4) 03:18:19 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000380)="e3051886fd283eec7725028d91e4941369e0d6f358d590eacb76482884d8e29da2909b3c78b1541fd4824595efffbd0b50f78cdbd1029075a1afff01039353692c785dfc01b82b459607eb3026609862bd0ba58d72b9b8f69f01acab330fafedd93e5cb74af587194798bc8f751f4842", 0x70, 0x5}, {0x0, 0x0, 0x10001}, {0x0}], 0x121800, &(0x7f0000000640)={[{@data_err_abort}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role', 0x3d, '.\'@\\:#}&'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '#'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) pipe2$9p(&(0x7f0000000700), 0x4000) 03:18:19 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0xb5e8, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000000c0)={{r0}, "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"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='/dev/sg#\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) 03:18:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7e, 0x0, 0x4) [ 1770.896376] FAULT_INJECTION: forcing a failure. [ 1770.896376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1770.898949] CPU: 1 PID: 10452 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1770.900825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1770.903205] Call Trace: [ 1770.903743] [ 1770.904212] dump_stack_lvl+0x8b/0xb3 [ 1770.905047] should_fail.cold+0x5/0xa [ 1770.905875] copy_page_to_iter+0x217/0xdd0 [ 1770.906798] filemap_read+0x4ff/0xbb0 [ 1770.907637] ? filemap_get_pages+0x1c90/0x1c90 [ 1770.908621] ? lock_acquire+0x1b2/0x4d0 [ 1770.909490] generic_file_read_iter+0x3cf/0x540 [ 1770.910480] ext4_file_read_iter+0x184/0x490 [ 1770.911417] new_sync_read+0x427/0x6f0 [ 1770.912237] ? __ia32_sys_llseek+0x380/0x380 [ 1770.913198] ? security_file_permission+0xb1/0xd0 [ 1770.914245] vfs_read+0x356/0x5f0 [ 1770.915002] ksys_read+0x12d/0x250 [ 1770.915758] ? __ia32_sys_pwrite64+0x230/0x230 [ 1770.916745] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1770.917454] loop2: detected capacity change from 0 to 256 [ 1770.917863] do_syscall_64+0x3b/0x90 [ 1770.919225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1770.920324] RIP: 0033:0x7f63a2e8eb19 [ 1770.921098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1770.925011] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1770.926633] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1770.928144] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1770.929673] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1770.931181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1770.932702] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1770.934252] 03:18:20 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x68, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:20 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000000)="586b1d3f87c1cc604c04a01831cb9d0e8ba02b1378c1ac35f2bc1a04e72c42fdb1", 0x21, 0x1) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x82, 0x0, 0x4) 03:18:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) statx(r1, &(0x7f0000000000)='./file0\x00', 0x2000, 0x100, &(0x7f00000000c0)) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:18:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 83) 03:18:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x79, 0x0, 0x4) [ 1771.049595] FAULT_INJECTION: forcing a failure. [ 1771.049595] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1771.050955] CPU: 0 PID: 10466 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1771.051834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1771.053023] Call Trace: [ 1771.053298] [ 1771.053549] dump_stack_lvl+0x8b/0xb3 [ 1771.053975] should_fail.cold+0x5/0xa [ 1771.054390] prepare_alloc_pages+0x17b/0x500 [ 1771.054873] __alloc_pages+0x131/0x4e0 [ 1771.055283] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1771.055918] ? __lock_acquire+0xbac/0x5b70 [ 1771.056372] ? mark_lock+0xfc/0x2e10 [ 1771.056763] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1771.057357] alloc_pages_vma+0xde/0x500 [ 1771.057792] __handle_mm_fault+0xfb3/0x3570 [ 1771.058258] ? lock_is_held_type+0xd7/0x130 [ 1771.058728] ? __pmd_alloc+0x680/0x680 [ 1771.059159] handle_mm_fault+0x2e6/0xa20 [ 1771.059589] do_user_addr_fault+0x54a/0x12a0 [ 1771.060068] exc_page_fault+0xa2/0x1a0 [ 1771.060478] asm_exc_page_fault+0x1e/0x30 [ 1771.060912] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1771.061495] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1771.063398] RSP: 0018:ffff88803f8779f0 EFLAGS: 00050246 [ 1771.063943] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1771.064689] RDX: 0000000000000000 RSI: ffff88801f347000 RDI: 0000000020029000 [ 1771.065436] RBP: 0000000020029000 R08: 0000000000000000 R09: ffff88801f347fff [ 1771.066169] R10: ffffed1003e68fff R11: 0000000000000001 R12: ffff88801f347000 [ 1771.066893] R13: 000000002002a000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1771.067635] copyout.part.0+0xdf/0x110 [ 1771.068055] copy_page_to_iter+0x248/0xdd0 [ 1771.068514] filemap_read+0x4ff/0xbb0 [ 1771.068928] ? filemap_get_pages+0x1c90/0x1c90 [ 1771.069452] ? lock_acquire+0x1b2/0x4d0 [ 1771.069874] generic_file_read_iter+0x3cf/0x540 [ 1771.070368] ext4_file_read_iter+0x184/0x490 [ 1771.070837] new_sync_read+0x427/0x6f0 [ 1771.071250] ? __ia32_sys_llseek+0x380/0x380 [ 1771.071733] ? security_file_permission+0xb1/0xd0 [ 1771.072242] vfs_read+0x356/0x5f0 [ 1771.072611] ksys_read+0x12d/0x250 [ 1771.072981] ? __ia32_sys_pwrite64+0x230/0x230 [ 1771.073482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.074033] do_syscall_64+0x3b/0x90 [ 1771.074436] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1771.074976] RIP: 0033:0x7f63a2e8eb19 [ 1771.075356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.077257] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1771.078059] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1771.078784] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1771.079517] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.080245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.080974] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1771.081721] 03:18:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7b, 0x0, 0x4) 03:18:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x83, 0x0, 0x4) 03:18:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x2) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x84, 0x0, 0x4) 03:18:20 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x69, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:20 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x91, 0x81, 0x9, 0xa3, 0x2, 0x3, 0xed3c, 0x12, 0x40, 0x355, 0x1, 0x8000, 0x38, 0x2, 0xe93, 0x20, 0x8001}, [{0x3, 0x9486, 0x8, 0x8000, 0x8, 0x7abced1d, 0x90, 0x9}], "1d7e8cdc281d7153bcdb737555a12fc001fcef80e07f4e8705308284216416a1974f61da9050a3edd5589a1cff8a5ce4974ce61e8215f11b8455d184e1ed63f09f34835951218e1b7d42815a8715c1c9c1751b31fa05f416f867e84a80ec2d7e9683418eb8913064a0b8eb28a410774a494b5884b36687f8186003de", ['\x00', '\x00', '\x00', '\x00']}, 0x4f4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(r1, &(0x7f0000000000)="8238298fa347efcbb3b590b15b26908863a6ad3d3ace7396f5cab8b54ac96714d2bc0cf69a09801281d2ef205aaed4ee67fb1c73402455af66de133f628f30c5", 0x40, 0x5) read(r0, &(0x7f0000000000), 0xfffffdef) 03:18:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7c, 0x0, 0x4) 03:18:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2202, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040)=0x2, 0xffffffff80000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = dup2(r1, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f00000000c0)=0x3) 03:18:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 84) [ 1771.321909] FAULT_INJECTION: forcing a failure. [ 1771.321909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1771.323222] CPU: 0 PID: 10495 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1771.324094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1771.325258] Call Trace: [ 1771.325532] [ 1771.325764] dump_stack_lvl+0x8b/0xb3 [ 1771.326172] should_fail.cold+0x5/0xa [ 1771.326598] copy_page_to_iter+0x217/0xdd0 [ 1771.327064] filemap_read+0x4ff/0xbb0 [ 1771.327483] ? filemap_get_pages+0x1c90/0x1c90 [ 1771.327970] ? lock_acquire+0x1b2/0x4d0 [ 1771.328393] generic_file_read_iter+0x3cf/0x540 [ 1771.328899] ext4_file_read_iter+0x184/0x490 [ 1771.329374] new_sync_read+0x427/0x6f0 [ 1771.329784] ? __ia32_sys_llseek+0x380/0x380 [ 1771.330268] ? security_file_permission+0xb1/0xd0 [ 1771.330778] vfs_read+0x356/0x5f0 [ 1771.331152] ksys_read+0x12d/0x250 [ 1771.331524] ? __ia32_sys_pwrite64+0x230/0x230 [ 1771.332004] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.332544] do_syscall_64+0x3b/0x90 [ 1771.332948] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1771.333503] RIP: 0033:0x7f63a2e8eb19 [ 1771.333893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.335789] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1771.336573] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1771.337308] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1771.338044] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.338778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1771.339519] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1771.340268] 03:18:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 85) 03:18:34 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ftruncate(r0, 0x8000000000000000) 03:18:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7d, 0x0, 0x4) 03:18:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x92, 0xa, &(0x7f00000006c0)=[{&(0x7f00000000c0)="bf6cff547f95f1005e9c1b69e96a1b631dcdd2168b83ea13e91cdfaf9fe6aa3959eaa63b19969742fd9fd191fd0b79d78ff453d60dae27a235ad77adcf32af502d866b0d6cf8e7bb4af54a90a078e82011b654b38c83a78c93213a83ad5c4074855e92db20253b1164623ec4768a10a071a44101ca25c67e1a2f76adc4ad8ff9f83784fc0b5463afe988de9f795479b854f2afb9bd8daa96f3e602087bfc92", 0x9f, 0x311}, {&(0x7f0000000180)="612c066fcf12e35d0b30ea652cd73656e243ea0eb3cc5dd0cf15879bd391f6240080332ceb8f5e71f9", 0x29, 0x101}, {&(0x7f00000001c0)="104412709cb55ab8da7bdcc5b3e6dd5003a44b752fd96c8afea66e598a003625aa693ed018a7a02bb247f4e09469133215b208597efdb03c430b402280ae81ad4e13d5ecc88469dd1217ef413ef5ecfb68835d705fc50ab2e7927fc3503bc6fe835f57908a3417528ace77fb57bc02c8b7831a6201e437c385511d59b4b59eaa32ae5d8ae3d2aa4d95b9488ea2f60666706f5258c18b2fabd10450f2b0e45c47dada74d57880901d1c2c16ade7f3a9015129dc386d9fb1ba33da3678218aa025bf40e134c32954df6992ba0e27301fb9c1d9124b56456a725b703f76d40fe96d9981fb2f39c9f5326195efde7a12f6ee912978f03841c3d3", 0xf8}, {&(0x7f00000002c0)="593ae2034d8e73fece2913b8baff930e3cf235649b", 0x15, 0x4}, {&(0x7f0000000300)="4b4d1c6d33c439dc8da6cd2592811dcd12b1fbaf6dad325f6862906486a313f3ef1f7c3ce0a415becb85e6df2d1748024f2d6bcf755961518bd3471f2a49ebf53633b0e69d0e5e338cac45b046e5839649b2548dbc7e32497904c7275586456e59ee96b582acb9216de38c421a431db751d108949dcac0a7b1a5c1d819a45b77bfd5b60656198cb1ac316ac5679c92ef50b5ed45e6544b646cd3672bca54b9e3956b56d084d92c65f30abe272cc2f2c2", 0xb0, 0xdfe}, {&(0x7f00000003c0)="086bed3a46a1496ba3661d1a86d1b4d8469280ab51db374daee423929ba0dd0af7fc875c6ef8a988a4b23fb871e870c5bfdf576f66cc2caa93606ad2f336f5fc48308b79bf069fbc080e0bcf38971186c3e91d4bfaa01178538b3c45a796e8be90335269b873af559b09633a0a022f7ee92b37189938f37053a928700286", 0x7e, 0x7}, {&(0x7f0000000440)="2e62473db0e2e6f516ab44aec2fbf0fdd2d286375431133e38a017abec1f9f7084cc6f5cbecc8d97daeaa4b70e1c351bae828c0448bedc2bb6d2aa2697833cc3cb38ff1f1c69899245118fb8d9c85ae35163ba3e3a63c77951bb5f19fd442becceb54e384c9c77de7f7cbf5d36a2c6ac75e55d22d9eae6da119db69010448577a761c207df22c10cd4f0c613c1b37bdd3ca8afdb12b875dc120060a94be2735c35377e278858f80a1b31fb262413344361a1aa", 0xb3, 0x80000}, {&(0x7f0000000500)="9a16d090f16c516ad3419e951c8bd466daea99a1f026587ee12156257d0184e23428941f098a7e11d5876c7f708c1a1f262230e3ca699ee7c58253734cc50380f5e31abc652cda86ace40b734f152b127b1444606e2ef6567aa2174b9102ed747a4572a0491feef36a186befccde6e3c3d6d3c6c8235c81eca6cffecff3c7a083eb230290bcefec8e5ecd39af73cb88a54afcb3f13f9a4ce9576cada1d1858afe222b450198414a0dc48c2fb06fd001060e2c8c236810adcf4cbcfc0588444e7b2bce73505647b13a586a40847f429f9aa53613dc9796a56a4a9e369be79b29f2c660ff29c125eb6322c442688446b2511e77562acea25c30e", 0xf9, 0x9}, {&(0x7f0000000600)="f178cc18d8ccf87b5ea7bcdd191b5852255c0893a8c69d17a1fc43e40f9a93405315313bea5c", 0x26, 0x57}, {&(0x7f0000000640)="1662df7970575738633568220d5c7b8417a68291288d530d50267ef33ce31185e3d86449e6e810bf3bf17fd742694b5d5c9df4d44bff2b3605614adbae5d18c6d692c63f13b1c173", 0x48, 0x7ff}], 0xa800, &(0x7f00000007c0)={[], [{@euid_lt}]}) fspick(r1, &(0x7f0000000800)='./file0\x00', 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:18:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x85, 0x0, 0x4) 03:18:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) statx(r1, &(0x7f0000000000)='./file0\x00', 0x2000, 0x100, &(0x7f00000000c0)) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) [ 1785.004836] FAULT_INJECTION: forcing a failure. [ 1785.004836] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1785.007372] CPU: 0 PID: 10507 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1785.009110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1785.011498] Call Trace: [ 1785.012036] [ 1785.012503] dump_stack_lvl+0x8b/0xb3 [ 1785.013319] should_fail.cold+0x5/0xa [ 1785.014169] prepare_alloc_pages+0x17b/0x500 [ 1785.015121] __alloc_pages+0x131/0x4e0 [ 1785.015958] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1785.017243] ? __lock_acquire+0xbac/0x5b70 [ 1785.018200] ? mark_lock+0xfc/0x2e10 [ 1785.018993] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1785.020174] alloc_pages_vma+0xde/0x500 [ 1785.021044] __handle_mm_fault+0xfb3/0x3570 [ 1785.022008] ? lock_is_held_type+0xd7/0x130 [ 1785.022933] ? __pmd_alloc+0x680/0x680 [ 1785.023816] handle_mm_fault+0x2e6/0xa20 [ 1785.024700] do_user_addr_fault+0x54a/0x12a0 [ 1785.025703] exc_page_fault+0xa2/0x1a0 [ 1785.026542] asm_exc_page_fault+0x1e/0x30 [ 1785.027425] RIP: 0010:copy_user_generic_string+0x2c/0x40 03:18:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101a00, 0x28) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) execveat(r1, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)=')\'\x00', &(0x7f0000000100)='\xf1-&\'%\\&-\xed]*\x00', &(0x7f0000000140)='#:\x00', &(0x7f0000000180)='\x9d\xb7-#[-,!)(.{]}\\\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='/\x00', &(0x7f0000000240)='-\x00', &(0x7f0000000280)='^{[\x00', &(0x7f00000002c0)='++#[-\xfb[\x00', &(0x7f0000000300)='\\):\xa3^/@@\x00'], 0x100) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x8e040) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, &(0x7f0000000600)=""/169, 0xa9) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = open_tree(r0, &(0x7f00000006c0)='./file0\x00', 0x2000) fsconfig$FSCONFIG_SET_FD(r5, 0x5, &(0x7f0000000780)=',\x00', 0x0, r4) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(r2, &(0x7f0000000380)="03c04f24a2177c4b022019e57f7f21080e30425e87134a2d81e2455e30cdf4d1be8613e635ec110c0c81947da29ca5872edc49effc9f885688e48e9f30cba4603ef19a5fc3fec30b960b92ab9cbc074b9e869cc2d6a3c1b249e0c989b3d4b1d327401e500762dd5e74c9775d46ca1b7629e9c5f270287be29ce4570dbcafd8168a578aaff5d03a3b08a208c6962690f6139fdefe6bd9569366497519445df13636249113cf28d6feba3ec02bb0edfd6bec1ce9c02ff610be8338ace0", 0xbc, 0x7) fadvise64(0xffffffffffffffff, 0x0, 0xf54, 0x0) syz_open_dev$sg(&(0x7f00000005c0), 0x461eb4, 0x418200) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1785.028587] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1785.032667] RSP: 0018:ffff88801d3279f0 EFLAGS: 00050246 [ 1785.033829] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1785.035353] RDX: 0000000000000000 RSI: ffff88801f348000 RDI: 000000002002a000 [ 1785.036875] RBP: 000000002002a000 R08: 0000000000000000 R09: ffff88801f348fff [ 1785.038393] R10: ffffed1003e691ff R11: 0000000000000001 R12: ffff88801f348000 [ 1785.039923] R13: 000000002002b000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1785.041451] copyout.part.0+0xdf/0x110 [ 1785.042325] copy_page_to_iter+0x248/0xdd0 [ 1785.043290] filemap_read+0x4ff/0xbb0 [ 1785.044144] ? filemap_get_pages+0x1c90/0x1c90 [ 1785.045153] ? lock_acquire+0x1b2/0x4d0 [ 1785.046041] generic_file_read_iter+0x3cf/0x540 [ 1785.047060] ext4_file_read_iter+0x184/0x490 [ 1785.048023] new_sync_read+0x427/0x6f0 [ 1785.048867] ? __ia32_sys_llseek+0x380/0x380 [ 1785.049850] ? security_file_permission+0xb1/0xd0 [ 1785.051079] vfs_read+0x356/0x5f0 [ 1785.051857] ksys_read+0x12d/0x250 [ 1785.052634] ? __ia32_sys_pwrite64+0x230/0x230 [ 1785.053642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1785.054769] do_syscall_64+0x3b/0x90 [ 1785.055573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1785.056686] RIP: 0033:0x7f63a2e8eb19 [ 1785.057483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1785.061439] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1785.063093] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1785.064644] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1785.066200] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1785.067739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1785.069291] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1785.070884] 03:18:34 executing program 2: fadvise64(0xffffffffffffffff, 0x8, 0x9, 0x2) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x501e40, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x7, 0x40}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x4040897) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r3, 0x3304) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1785.221919] Process accounting resumed 03:18:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1798.736113] FAULT_INJECTION: forcing a failure. [ 1798.736113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1798.737509] CPU: 0 PID: 10546 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1798.738452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1798.739724] Call Trace: [ 1798.740005] [ 1798.740255] dump_stack_lvl+0x8b/0xb3 [ 1798.740701] should_fail.cold+0x5/0xa [ 1798.741143] copy_page_to_iter+0x217/0xdd0 [ 1798.741639] filemap_read+0x4ff/0xbb0 [ 1798.742095] ? filemap_get_pages+0x1c90/0x1c90 [ 1798.742626] ? lock_acquire+0x1b2/0x4d0 [ 1798.743080] generic_file_read_iter+0x3cf/0x540 [ 1798.743604] ext4_file_read_iter+0x184/0x490 [ 1798.744105] new_sync_read+0x427/0x6f0 [ 1798.744551] ? __ia32_sys_llseek+0x380/0x380 [ 1798.745062] ? security_file_permission+0xb1/0xd0 [ 1798.745608] vfs_read+0x356/0x5f0 [ 1798.746030] ksys_read+0x12d/0x250 [ 1798.746427] ? __ia32_sys_pwrite64+0x230/0x230 [ 1798.746948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1798.747532] do_syscall_64+0x3b/0x90 [ 1798.747959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1798.748534] RIP: 0033:0x7f63a2e8eb19 [ 1798.748944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1798.751018] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1798.751870] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1798.752671] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1798.753469] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1798.754284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1798.755094] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1798.755902] 03:18:47 executing program 4: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000019680)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0\x00'}) openat$cgroup(r0, &(0x7f00000196c0)='syz1\x00', 0x200002, 0x0) r1 = syz_usb_connect$cdc_ncm(0x2, 0x6f, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5d, 0x2, 0x1, 0x0, 0x80, 0x5, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, "81"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0x4, 0x4, 0x1, 0x2}, {0x6, 0x24, 0x1a, 0x7f, 0x28}}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x4, 0x81, 0x5}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x9, 0x1, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x6, 0x2, 0x1}}}}}}}]}}, &(0x7f0000019380)={0xa, &(0x7f00000190c0)={0xa, 0x6, 0x310, 0x9, 0x81, 0x6, 0x8, 0x1}, 0x3d, &(0x7f0000019100)={0x5, 0xf, 0x3d, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x0, 0x7, 0x0, 0x2}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0x2, 0x9, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x8, 0x8, 0x7, 0x1}, @ptm_cap={0x3}, @ssp_cap={0x20, 0x10, 0xa, 0x7, 0x5, 0x10001, 0xf, 0x8001, [0x3fcf, 0xc0cf, 0x3f00, 0x3fff, 0xc00f]}]}, 0x6, [{0x4, &(0x7f0000019140)=@lang_id={0x4, 0x3, 0x100a}}, {0x5, &(0x7f0000019180)=@string={0x5, 0x3, "4b32ff"}}, {0x37, &(0x7f0000019480)=ANY=[@ANYBLOB="37033d304613a91e1dff8bb0ee29a6794894590b4dc9c1a5c955bcf8e89d295ec172261eccc7928876db48b24f7103eb83b94ce86bdf6bbb02c1908042506a08bc383317273f13209750382462e8e361ff98f8dc1958188e56ed8950b33008cf6d8c7f98d84a"]}, {0x4, &(0x7f0000019200)=@lang_id={0x4, 0x3, 0x2001}}, {0x60, &(0x7f0000019240)=ANY=[@ANYBLOB="60039d618ce92dd77d9320f7f39ebfc3b48d839c7bbd1f2f61307c033b9d01f0521c8fc074248d617e057d14f65e614d78727f203b164514cee049aff9f75ddb78973da1d63e00b124a98bad130a501755e71743270be51547125cd44c03d77f"]}, {0xbe, &(0x7f00000192c0)=@string={0xbe, 0x3, "3289ccd9ba578c4a5cfb5f9d12fbd2772416aa4a6807a031252a198bc5d64240b7dc48abe98c7f1b89ad532946adabaa8ae00ccc45d1519d2e5f855e4ba49efe6eb38037376cd342c8855e6e48aa686d8fbb07efa7e8cea2fa049fd3ca1c67d791ca3ccf27bd9e7f8fafa2ec81989fd9f110e57121e86446a6bb0f3d1a150b6728bbdc66453dd4255e66c2e582a062464714c414de62046217e7d1da6a65ae521b495cfdca4e4eb251e4bb3ffa12588566207aa6464b4439f1d4af95"}}]}) syz_usb_connect$cdc_ncm(0x2, 0x10a, &(0x7f0000019500)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xf8, 0x2, 0x1, 0x3, 0xa0, 0x87, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0xba8, 0x0, 0x400, 0x6}, {0x6, 0x24, 0x1a, 0xfc, 0xa}, [@call_mgmt={0x5, 0x24, 0x1, 0x2, 0x74}, @mdlm={0x15, 0x24, 0x12, 0x101}, @mdlm_detail={0x7c, 0x24, 0x13, 0x32, "47ab5c155eedbe31b4febc384cd78d63fe4c78fdf1e10da9bc871a11d9c2fb3a684782dffebb465a5be6fe421a48fd4e597874bcd27c2a586c2e853d7932f73a6ddf6a1d43ee2620cd2a9c562155f0c4eddd8ec94194aa4c606ad27017727494d166986ac3214b8f4f889ee4bf07606cffc10cacae34b1c4"}, @country_functional={0x6, 0x24, 0x7, 0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x1, 0xf7, 0x32}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400, 0xf3, 0x1, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x8b, 0x6, 0x9}}}}}}}]}}, &(0x7f0000019640)={0xa, &(0x7f00000191c0)={0xa, 0x6, 0x300, 0x6, 0xc5, 0x3, 0x10, 0xff}, 0x10, &(0x7f0000019400)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0xc, 0x80, 0x0, 0x3, 0x0, 0x6}]}, 0x1, [{0x10, &(0x7f0000019440)=@string={0x10, 0x3, "687ef36fb8aacf2c83aae7469b4a"}}]}) syz_usb_disconnect(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/102390, 0x18ff6) read(0xffffffffffffffff, 0x0, 0x0) 03:18:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 86) 03:18:47 executing program 2: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ftruncate(r0, 0x8000000000000000) 03:18:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x7e, 0x0, 0x4) 03:18:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder-control\x00', 0x802, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000000c0)) read(r1, &(0x7f0000000040)=""/48, 0x30) 03:18:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x80f43, 0x4) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) 03:18:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x86, 0x0, 0x4) 03:18:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1798.759873] UDC core: couldn't find an available UDC or it's busy: -19 [ 1798.761597] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 03:18:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1798.783462] UDC core: couldn't find an available UDC or it's busy: -19 [ 1798.784917] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 03:18:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:18:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x87, 0x0, 0x4) 03:18:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 87) 03:18:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x82, 0x0, 0x4) 03:18:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x80c40, 0x80) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="19a70bc90385b545"}}) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1798.891486] FAULT_INJECTION: forcing a failure. [ 1798.891486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1798.892814] CPU: 0 PID: 10564 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1798.893684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1798.894785] Call Trace: [ 1798.895038] [ 1798.895257] dump_stack_lvl+0x8b/0xb3 [ 1798.895649] should_fail.cold+0x5/0xa [ 1798.896030] prepare_alloc_pages+0x17b/0x500 [ 1798.896471] __alloc_pages+0x131/0x4e0 [ 1798.896850] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1798.897434] ? __lock_acquire+0xbac/0x5b70 [ 1798.897889] ? mark_lock+0xfc/0x2e10 [ 1798.898251] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1798.898828] alloc_pages_vma+0xde/0x500 [ 1798.899226] __handle_mm_fault+0xfb3/0x3570 [ 1798.899701] ? lock_is_held_type+0xd7/0x130 [ 1798.900156] ? __pmd_alloc+0x680/0x680 [ 1798.900602] handle_mm_fault+0x2e6/0xa20 [ 1798.901051] do_user_addr_fault+0x54a/0x12a0 [ 1798.901552] exc_page_fault+0xa2/0x1a0 [ 1798.901994] asm_exc_page_fault+0x1e/0x30 [ 1798.902438] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1798.903031] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1798.905029] RSP: 0018:ffff888040be79f0 EFLAGS: 00050246 [ 1798.905608] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1798.906390] RDX: 0000000000000000 RSI: ffff88801f349000 RDI: 000000002002b000 [ 1798.907155] RBP: 000000002002b000 R08: 0000000000000000 R09: ffff88801f349fff [ 1798.907920] R10: ffffed1003e693ff R11: 0000000000000001 R12: ffff88801f349000 [ 1798.908718] R13: 000000002002c000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1798.909453] copyout.part.0+0xdf/0x110 [ 1798.909931] copy_page_to_iter+0x248/0xdd0 [ 1798.910451] filemap_read+0x4ff/0xbb0 [ 1798.910916] ? filemap_get_pages+0x1c90/0x1c90 [ 1798.911465] ? lock_acquire+0x1b2/0x4d0 [ 1798.911922] generic_file_read_iter+0x3cf/0x540 [ 1798.912462] ext4_file_read_iter+0x184/0x490 [ 1798.912974] new_sync_read+0x427/0x6f0 [ 1798.913417] ? __ia32_sys_llseek+0x380/0x380 [ 1798.913949] ? security_file_permission+0xb1/0xd0 [ 1798.914499] vfs_read+0x356/0x5f0 [ 1798.914894] ksys_read+0x12d/0x250 [ 1798.915292] ? __ia32_sys_pwrite64+0x230/0x230 [ 1798.915807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1798.916388] do_syscall_64+0x3b/0x90 [ 1798.916813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1798.917386] RIP: 0033:0x7f63a2e8eb19 [ 1798.917801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1798.919820] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1798.920668] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1798.921461] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1798.922262] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1798.923035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1798.923726] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1798.924514] 03:18:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x28, 0x0, 0x4) 03:18:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6f, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1799.506664] UDC core: couldn't find an available UDC or it's busy: -19 [ 1799.508425] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1799.513040] UDC core: couldn't find an available UDC or it's busy: -19 [ 1799.514714] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 03:19:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x83, 0x0, 0x4) 03:19:01 executing program 0: fork() r0 = gettid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r2 = gettid() r3 = gettid() kcmp(r2, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r4 = gettid() r5 = gettid() r6 = gettid() kcmp(r5, r6, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) waitid(0x2, r4, &(0x7f0000000380), 0x8, &(0x7f0000000280)) wait4(r2, &(0x7f0000000180), 0x20000000, &(0x7f00000001c0)) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r7, &(0x7f0000000000), 0xfffffdef) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x400a00, 0x0) ioctl$TIOCSRS485(r8, 0x542f, &(0x7f00000000c0)={0x40, 0x2, 0x8001}) 03:19:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = getgid() fchown(r1, 0xee01, r2) read(0xffffffffffffffff, 0x0, 0x0) 03:19:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x88, 0x0, 0x4) 03:19:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 88) 03:19:01 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x72de7ddf6159c73f, 0x0) r1 = syz_open_dev$sg(&(0x7f00000001c0), 0x1ff, 0x42e080) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x3, 0x400000, 0x2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0xe000000000000000, 0x8, 0x8}) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40800, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/rt_acct\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0xa0000, 0x0) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000280)) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x40) ioctl$SG_IO(r5, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r5, &(0x7f0000000100)=""/147, 0x93) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x1000, 0x3, @buffer={0x0, 0x23, &(0x7f00000002c0)=""/35}, &(0x7f0000001040)="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", &(0x7f0000000300)=""/172, 0x9, 0x0, 0x0, &(0x7f00000003c0)}) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000040)='\x00', 0x0, r3) 03:19:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x70, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:01 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) (fail_nth: 1) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) [ 1812.253611] FAULT_INJECTION: forcing a failure. [ 1812.253611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1812.256163] CPU: 1 PID: 10590 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1812.257917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1812.260281] Call Trace: [ 1812.260817] [ 1812.261302] dump_stack_lvl+0x8b/0xb3 [ 1812.262159] should_fail.cold+0x5/0xa [ 1812.262996] copy_page_to_iter+0x217/0xdd0 [ 1812.263940] filemap_read+0x4ff/0xbb0 [ 1812.264776] ? filemap_get_pages+0x1c90/0x1c90 [ 1812.265780] ? lock_acquire+0x1b2/0x4d0 [ 1812.266649] generic_file_read_iter+0x3cf/0x540 [ 1812.267657] ext4_file_read_iter+0x184/0x490 [ 1812.268606] new_sync_read+0x427/0x6f0 [ 1812.269443] ? __ia32_sys_llseek+0x380/0x380 [ 1812.270414] ? security_file_permission+0xb1/0xd0 [ 1812.271459] vfs_read+0x356/0x5f0 [ 1812.272215] ksys_read+0x12d/0x250 [ 1812.272981] ? __ia32_sys_pwrite64+0x230/0x230 [ 1812.273986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1812.275098] do_syscall_64+0x3b/0x90 [ 1812.275905] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1812.276996] RIP: 0033:0x7f63a2e8eb19 [ 1812.277777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1812.281603] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1812.283213] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1812.284702] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1812.286233] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1812.287724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1812.289209] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1812.290731] 03:19:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x71, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 89) [ 1812.347211] FAULT_INJECTION: forcing a failure. [ 1812.347211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1812.349585] CPU: 1 PID: 10602 Comm: syz-executor.2 Not tainted 5.16.0-rc4-next-20211208 #1 03:19:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x84, 0x0, 0x4) [ 1812.351230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1812.353576] Call Trace: [ 1812.354112] [ 1812.354552] dump_stack_lvl+0x8b/0xb3 [ 1812.355323] should_fail.cold+0x5/0xa [ 1812.356090] _copy_to_user+0x2e/0x150 [ 1812.356850] simple_read_from_buffer+0xcc/0x160 [ 1812.357777] proc_fail_nth_read+0x194/0x220 [ 1812.358656] ? proc_fault_inject_read+0x230/0x230 [ 1812.359616] ? security_file_permission+0xb1/0xd0 [ 1812.360576] ? proc_fault_inject_read+0x230/0x230 [ 1812.361537] vfs_read+0x1b6/0x5f0 [ 1812.362247] ksys_read+0x12d/0x250 [ 1812.362958] ? __ia32_sys_pwrite64+0x230/0x230 [ 1812.363867] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1812.364890] do_syscall_64+0x3b/0x90 [ 1812.365636] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1812.366675] RIP: 0033:0x7f38be19869c [ 1812.367401] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1812.371005] RSP: 002b:00007f38bb75b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1812.372491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f38be19869c [ 1812.373893] RDX: 000000000000000f RSI: 00007f38bb75b1e0 RDI: 0000000000000005 [ 1812.375309] RBP: 00007f38bb75b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1812.376710] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1812.378114] R13: 00007ffd8a7cdcff R14: 00007f38bb75b300 R15: 0000000000022000 [ 1812.379531] [ 1812.426344] FAULT_INJECTION: forcing a failure. [ 1812.426344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1812.429027] CPU: 0 PID: 10615 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1812.430807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1812.433200] Call Trace: [ 1812.433745] [ 1812.434231] dump_stack_lvl+0x8b/0xb3 [ 1812.435063] should_fail.cold+0x5/0xa [ 1812.435898] prepare_alloc_pages+0x17b/0x500 [ 1812.436846] __alloc_pages+0x131/0x4e0 [ 1812.437681] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1812.438987] ? __lock_acquire+0xbac/0x5b70 [ 1812.439908] ? mark_lock+0xfc/0x2e10 [ 1812.440701] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1812.441883] alloc_pages_vma+0xde/0x500 [ 1812.442758] __handle_mm_fault+0xfb3/0x3570 [ 1812.443691] ? lock_is_held_type+0xd7/0x130 [ 1812.444607] ? __pmd_alloc+0x680/0x680 [ 1812.445487] handle_mm_fault+0x2e6/0xa20 [ 1812.446391] do_user_addr_fault+0x54a/0x12a0 [ 1812.447355] exc_page_fault+0xa2/0x1a0 [ 1812.448188] asm_exc_page_fault+0x1e/0x30 [ 1812.449070] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1812.450242] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1812.454142] RSP: 0018:ffff88800e51f9f0 EFLAGS: 00050246 [ 1812.455273] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1812.456783] RDX: 0000000000000000 RSI: ffff88801f34a000 RDI: 000000002002c000 [ 1812.458304] RBP: 000000002002c000 R08: 0000000000000000 R09: ffff88801f34afff [ 1812.459805] R10: ffffed1003e695ff R11: 0000000000000001 R12: ffff88801f34a000 [ 1812.461316] R13: 000000002002d000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1812.462863] copyout.part.0+0xdf/0x110 [ 1812.463708] copy_page_to_iter+0x248/0xdd0 [ 1812.464645] filemap_read+0x4ff/0xbb0 [ 1812.465483] ? filemap_get_pages+0x1c90/0x1c90 [ 1812.466495] ? lock_acquire+0x1b2/0x4d0 [ 1812.467352] generic_file_read_iter+0x3cf/0x540 [ 1812.468353] ext4_file_read_iter+0x184/0x490 [ 1812.469300] new_sync_read+0x427/0x6f0 [ 1812.470159] ? __ia32_sys_llseek+0x380/0x380 [ 1812.471125] ? security_file_permission+0xb1/0xd0 [ 1812.472171] vfs_read+0x356/0x5f0 [ 1812.472927] ksys_read+0x12d/0x250 [ 1812.473692] ? __ia32_sys_pwrite64+0x230/0x230 [ 1812.474684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1812.475793] do_syscall_64+0x3b/0x90 [ 1812.476595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1812.477684] RIP: 0033:0x7f63a2e8eb19 [ 1812.478487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1812.482375] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1812.483985] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1812.485491] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1812.487009] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1812.488516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1812.490028] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1812.491548] 03:19:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x72, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:01 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='/file0\x00'/16]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000040)={@desc={0x1, 0x0, @desc4}}) read(r0, &(0x7f0000000000), 0xfffffdef) 03:19:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x89, 0x0, 0x4) 03:19:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x85, 0x0, 0x4) 03:19:01 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xffffffffffffffff, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:19:01 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200001, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x2, 0x1, 0x7, 0x80, 0x0, 0x4, 0xa0000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x128, 0x7fce}, 0x60006, 0x9, 0x81, 0x1, 0x9, 0x3, 0x5, 0x0, 0x3f, 0x0, 0x8}, r0, 0x7, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) read(0xffffffffffffffff, 0x0, 0x0) 03:19:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x73, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x540, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:19:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x86, 0x0, 0x4) 03:19:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8a, 0x0, 0x4) 03:19:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8b, 0x0, 0x4) 03:19:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x44800, 0x131) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) pwrite64(r0, &(0x7f0000000000)="d7f4874c3f22937de52d9f32b9d5770904716458b5f4143489a417de31864db19d7a8fc83eb7d6291f41c36651d685e00d599670a6d1674efb208344bcd315170ba54e4b5d57b63d06211d1ff33772d77e36ed93511386c79fb9eba43ff38403d45a63edc2f82c3d500525", 0x6b, 0x800) 03:19:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x87, 0x0, 0x4) 03:19:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x74, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 90) 03:19:18 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x2, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:19:18 executing program 4: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x120, r0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}]}, 0x120}, 0x1, 0x0, 0x0, 0x2}, 0x40000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/7, 0x7) read(0xffffffffffffffff, 0x0, 0x0) 03:19:18 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x4001, 0x60) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1829.768731] FAULT_INJECTION: forcing a failure. [ 1829.768731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1829.771120] CPU: 0 PID: 10667 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1829.772749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1829.774988] Call Trace: [ 1829.775493] [ 1829.775936] dump_stack_lvl+0x8b/0xb3 [ 1829.776718] should_fail.cold+0x5/0xa [ 1829.777487] copy_page_to_iter+0x217/0xdd0 [ 1829.778383] filemap_read+0x4ff/0xbb0 [ 1829.779161] ? filemap_get_pages+0x1c90/0x1c90 [ 1829.780096] ? lock_acquire+0x1b2/0x4d0 [ 1829.780892] generic_file_read_iter+0x3cf/0x540 [ 1829.781820] ext4_file_read_iter+0x184/0x490 [ 1829.782712] new_sync_read+0x427/0x6f0 [ 1829.783487] ? __ia32_sys_llseek+0x380/0x380 [ 1829.784371] ? security_file_permission+0xb1/0xd0 [ 1829.785342] vfs_read+0x356/0x5f0 [ 1829.786033] ksys_read+0x12d/0x250 [ 1829.786753] ? __ia32_sys_pwrite64+0x230/0x230 [ 1829.787652] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1829.788683] do_syscall_64+0x3b/0x90 [ 1829.789435] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1829.790466] RIP: 0033:0x7f63a2e8eb19 [ 1829.791195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1829.795009] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1829.796505] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1829.797904] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1829.799321] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1829.800722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1829.802117] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1829.803545] 03:19:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x88, 0x0, 0x4) 03:19:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x75, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8c, 0x0, 0x4) 03:19:18 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x3, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) [ 1829.971826] Process accounting paused 03:19:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x60000002}) 03:19:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x76, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x89, 0x0, 0x4) 03:19:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 91) 03:19:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8d, 0x0, 0x4) 03:19:32 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x4, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:19:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x420}, 0x1, 0x0, 0x0, 0x20008080}, 0x44010) 03:19:32 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @empty}, @in6=@private1, 0x4e22, 0xa340, 0x4e24, 0x0, 0x2, 0x20, 0xc0, 0x67, 0x0, r2}, {0x5, 0x7724, 0x2, 0x6, 0x9c, 0x5, 0xfffffffffffffffa, 0x4}, {0x100000001, 0x100000001, 0x9, 0x10001}, 0x2, 0x6e6bbf, 0x2, 0x1, 0x0, 0x3}, {{@in=@loopback, 0x4d5, 0x33}, 0xa, @in=@remote, 0x0, 0x6, 0x3, 0x1, 0x2, 0x6, 0x9}}, 0xe8) [ 1843.952393] FAULT_INJECTION: forcing a failure. [ 1843.952393] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1843.955183] CPU: 0 PID: 10709 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1843.957071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 03:19:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x5, 0x4, 0x7fffffff, 0x3, 0x6}) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1843.959655] Call Trace: [ 1843.960399] [ 1843.960914] dump_stack_lvl+0x8b/0xb3 [ 1843.961805] should_fail.cold+0x5/0xa [ 1843.962704] prepare_alloc_pages+0x17b/0x500 [ 1843.963715] __alloc_pages+0x131/0x4e0 [ 1843.964605] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1843.965971] ? __lock_acquire+0xbac/0x5b70 [ 1843.966972] ? mark_lock+0xfc/0x2e10 [ 1843.967818] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1843.969073] alloc_pages_vma+0xde/0x500 [ 1843.969994] __handle_mm_fault+0xfb3/0x3570 [ 1843.971019] ? lock_is_held_type+0xd7/0x130 [ 1843.972000] ? __pmd_alloc+0x680/0x680 [ 1843.972935] handle_mm_fault+0x2e6/0xa20 [ 1843.973872] do_user_addr_fault+0x54a/0x12a0 [ 1843.975089] exc_page_fault+0xa2/0x1a0 [ 1843.975970] asm_exc_page_fault+0x1e/0x30 [ 1843.976902] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1843.978124] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1843.982259] RSP: 0018:ffff888044adf9f0 EFLAGS: 00050246 [ 1843.983461] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1843.985048] RDX: 0000000000000000 RSI: ffff88801f34b000 RDI: 000000002002d000 [ 1843.986654] RBP: 000000002002d000 R08: 0000000000000000 R09: ffff88801f34bfff [ 1843.988276] R10: ffffed1003e697ff R11: 0000000000000001 R12: ffff88801f34b000 [ 1843.989899] R13: 000000002002e000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1843.991573] copyout.part.0+0xdf/0x110 03:19:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x77, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1843.992493] copy_page_to_iter+0x248/0xdd0 [ 1843.993565] filemap_read+0x4ff/0xbb0 [ 1843.994483] ? filemap_get_pages+0x1c90/0x1c90 [ 1843.995582] ? lock_acquire+0x1b2/0x4d0 [ 1843.996510] generic_file_read_iter+0x3cf/0x540 [ 1843.997578] ext4_file_read_iter+0x184/0x490 [ 1843.998602] new_sync_read+0x427/0x6f0 [ 1843.999477] ? __ia32_sys_llseek+0x380/0x380 [ 1844.000490] ? security_file_permission+0xb1/0xd0 [ 1844.001582] vfs_read+0x356/0x5f0 [ 1844.002373] ksys_read+0x12d/0x250 [ 1844.003185] ? __ia32_sys_pwrite64+0x230/0x230 [ 1844.004214] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1844.005370] do_syscall_64+0x3b/0x90 [ 1844.006216] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1844.007380] RIP: 0033:0x7f63a2e8eb19 [ 1844.008200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1844.012265] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1844.013949] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1844.015537] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1844.017112] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1844.018713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1844.020289] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1844.021901] 03:19:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x78, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8a, 0x0, 0x4) 03:19:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8e, 0x0, 0x4) 03:19:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 92) 03:19:33 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x5, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:19:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x79, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1844.154343] FAULT_INJECTION: forcing a failure. [ 1844.154343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1844.155679] CPU: 1 PID: 10727 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1844.156546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1844.157779] Call Trace: [ 1844.158054] [ 1844.158290] dump_stack_lvl+0x8b/0xb3 [ 1844.158729] should_fail.cold+0x5/0xa [ 1844.159157] copy_page_to_iter+0x217/0xdd0 [ 1844.159640] filemap_read+0x4ff/0xbb0 [ 1844.160058] ? filemap_get_pages+0x1c90/0x1c90 [ 1844.160557] ? lock_acquire+0x1b2/0x4d0 [ 1844.160991] generic_file_read_iter+0x3cf/0x540 [ 1844.161496] ext4_file_read_iter+0x184/0x490 [ 1844.161980] new_sync_read+0x427/0x6f0 [ 1844.162387] ? __ia32_sys_llseek+0x380/0x380 [ 1844.162893] ? security_file_permission+0xb1/0xd0 [ 1844.163423] vfs_read+0x356/0x5f0 [ 1844.163813] ksys_read+0x12d/0x250 [ 1844.164201] ? __ia32_sys_pwrite64+0x230/0x230 [ 1844.164707] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1844.165274] do_syscall_64+0x3b/0x90 [ 1844.165691] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1844.166244] RIP: 0033:0x7f63a2e8eb19 [ 1844.166657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1844.168624] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1844.169445] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1844.170219] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1844.171003] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1844.171788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1844.172557] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1844.173339] 03:19:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/163, 0xa3}, {&(0x7f0000000100)=""/22, 0x16}], 0x2, 0x80, 0x80000001) 03:19:33 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x7f, &(0x7f0000000040)=0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x1, 0x88) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r4, &(0x7f0000000000), 0xfffffdef) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r5, &(0x7f0000000000), 0xfffffdef) renameat2(r4, &(0x7f00000000c0)='./file1\x00', r5, &(0x7f0000000100)='./file1\x00', 0x1) close(r3) read(r2, &(0x7f0000000000), 0xfffffdef) 03:19:47 executing program 0: ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000000)={0x965, 0x80, 0x1}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/69, 0x45) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8b, 0x0, 0x4) 03:19:47 executing program 6: timer_create(0x0, 0x0, &(0x7f0000000180)) r0 = fork() ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000200)={0x38, 0x2, 0x7}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)) timer_create(0x2, &(0x7f00000000c0)={0x0, 0x1e, 0x4, @thr={&(0x7f0000000000)="25f514ffb15aa033b0637b2a6b6443719134cb9c02f7faa774b207cfb401671925495c63f747f14bc394490135575769fbd9c00661254f", &(0x7f0000000040)="ee2dccecd2bb545ec9b3889ec9c158ba74b6698795a4e2b22cc7dd5086a735ef1ccbf3663de55c5002935f467cad7f6abb75a2be4b7642be63ca7626baa826fb"}}, &(0x7f0000000080)=0x0) timer_getoverrun(r1) fork() waitid(0x0, 0x0, &(0x7f0000000100), 0x4, &(0x7f0000001280)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) 03:19:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 93) 03:19:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x20) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) 03:19:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8f, 0x0, 0x4) 03:19:47 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x6, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) [ 1857.970713] FAULT_INJECTION: forcing a failure. [ 1857.970713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1857.972008] CPU: 0 PID: 10764 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1857.972870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1857.974061] Call Trace: [ 1857.974328] [ 1857.974566] dump_stack_lvl+0x8b/0xb3 [ 1857.974987] should_fail.cold+0x5/0xa [ 1857.975404] prepare_alloc_pages+0x17b/0x500 [ 1857.975889] __alloc_pages+0x131/0x4e0 [ 1857.976317] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1857.976951] ? lock_chain_count+0x20/0x20 [ 1857.977383] ? __lock_acquire+0xbac/0x5b70 [ 1857.977845] ? mark_lock+0xfc/0x2e10 [ 1857.978245] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1857.978861] alloc_pages_vma+0xde/0x500 [ 1857.979292] __handle_mm_fault+0xfb3/0x3570 [ 1857.979772] ? lock_is_held_type+0xd7/0x130 [ 1857.980219] ? __pmd_alloc+0x680/0x680 [ 1857.980665] ? handle_mm_fault+0x1cd/0xa20 [ 1857.981123] ? __rcu_read_unlock+0xe9/0x510 [ 1857.981595] handle_mm_fault+0x2e6/0xa20 [ 1857.982035] do_user_addr_fault+0x54a/0x12a0 [ 1857.982506] exc_page_fault+0xa2/0x1a0 [ 1857.982939] asm_exc_page_fault+0x1e/0x30 [ 1857.983374] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1857.983962] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1857.985918] RSP: 0018:ffff88801b50f9f0 EFLAGS: 00050246 [ 1857.986476] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1857.987237] RDX: 0000000000000000 RSI: ffff88801f34c000 RDI: 000000002002e000 [ 1857.987996] RBP: 000000002002e000 R08: 0000000000000000 R09: ffff88801f34cfff [ 1857.988761] R10: ffffed1003e699ff R11: 0000000000000001 R12: ffff88801f34c000 [ 1857.989520] R13: 000000002002f000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1857.990299] copyout.part.0+0xdf/0x110 [ 1857.990740] copy_page_to_iter+0x248/0xdd0 [ 1857.991216] filemap_read+0x4ff/0xbb0 [ 1857.991639] ? filemap_get_pages+0x1c90/0x1c90 [ 1857.992139] ? lock_acquire+0x1b2/0x4d0 [ 1857.992569] generic_file_read_iter+0x3cf/0x540 [ 1857.993084] ext4_file_read_iter+0x184/0x490 [ 1857.993564] new_sync_read+0x427/0x6f0 [ 1857.993986] ? __ia32_sys_llseek+0x380/0x380 [ 1857.994470] ? security_file_permission+0xb1/0xd0 [ 1857.995007] vfs_read+0x356/0x5f0 [ 1857.995394] ksys_read+0x12d/0x250 [ 1857.995777] ? __ia32_sys_pwrite64+0x230/0x230 [ 1857.996274] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1857.996840] do_syscall_64+0x3b/0x90 [ 1857.997241] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1857.997790] RIP: 0033:0x7f63a2e8eb19 [ 1857.998182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1858.000139] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1858.000950] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1858.001716] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1858.002660] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1858.003483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1858.004239] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1858.005019] 03:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8c, 0x0, 0x4) 03:19:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000001180)=[{&(0x7f00000000c0)="369d9db54319e09ac4a3c521134d7f914cdd75ba1d200d3ffd8233438a3bb451d128fd10558849886912dd0db6bbb86a07954e96328f3638f6764cb4a66c9c10ea90044cac6bebae6360a7a1df4cc0856638458bdc3756caaeb39a618eac2d6cd8e4a22c96237c18bfe8fd8c79860403e23c68e3c404d40b66013afba37db46c06eb9d6dc6b2b6dedb0ca612bbd857ed14d521a8a028c68e8ae3", 0x9a, 0x100000000}, {&(0x7f0000000180)="1c5f1855820c79802153e3834e804c8f1a28d96a84f0bf8b5fddea1a533c864f85380f243bd4d23e01d45b84c223a9fb370a81009a0806eea7606ef15743b7aea56543680528cbd67ac9b730e9ac0de6af7102699ebde57a78c110e75123a6d7456a450024f1942684d80901fa87443ba4fde4703241b1057ad070b8c9a2db524a21f6e04c2be0d0a60f4fe1ef93c8f2b1c299d8383e5be99c0fbae9fba3ea17ab258790a8ebab8c5336afaae67541132836e70384367664c07160c7d8f1db30d8db3ee573ad9deba47cf299c162e6ac976f481bdcf3f031af2f9cdb4be7b70232fd1bae9e0b8d1ebccb1c4c226aa22f22895b857d6767917493be91a7f684c1f5ec27b4c25b80a367d0bbe7582aef166a20eff3e9631850cfba0a5825ad5391fdd046e49f1e81f2fffa7587c0c421ca62db2543f08ef31097fbc4788fb0a421a5c807de710d55a4fcf8b46cadb0d97b87936030ccf089dfd7aab8ba4e6a5c80199396ca27ca38104fd47d92790b062f7b6b53b341815bcf14b03754e82cdf7eeeff3c990192814c493b8e33425812b6e76a9c9de02c15fb4d2e650b405559b4415cf2d523afbbb039c0275360788127891cd9fa8294ca36a9410d4ae18312f756421682c827fc98780ef1f214b567964df8e97ee3f5e1e176df30436bea60f70120b8d185eed0fde76ae807e2e0354d35c13354a4155742c528682c37b36feedb8e740ae9dd0f0971c05343f8e03b0f9d2c43f26276f6e13213fe27c03ccc1bad8e9d08b3d261a4c955be0d3b6216365602a4524aa1587d967cafe28eac618e911491031efc3405cc7053b28d65d24dc1ce8e956854851000212dc5a92c62f5dba0e8e23c4670aa33ba2e073a9bf976a8f2fd1bbae75698ed3aefd1ceff5a8b678b908e8714c05da37034fa78922817887000d7a2088028adb82ce677f906b81c2bd2a1c5ab0290c5045e4eb84e3c092544c591920829337249a77876074fc792cf1cfdec17ba4f0eb34207d125bfb7f43bb248c4792d7669e8c6bb94ef07b1b844d936a9c3c587f0c5c120d734dd11b99bf8f00fe1d86c0ca253e3aaccf8e173bd52dc4050a2ab7974d34ea178c69825c392f9415f41cf7bd2882b35d41013ebdc12b6a000629a5e24adbf8aa6e9648bf5aa7afba30310d366310af5f265483372b1435dd8bf1448b2c9d14c30db8318ec990f6b868ea9998a02faa81126c73ae98251f1e9f8ede1bb0885ef9842cd16cb93d246559740643d1253b48d2df746efd69d393cd9569363c2b095f0cabc678dce801d7a24575868e9c4aa1cb3cddf904e72e5f8ac7d216124d99750758d4b7c5c9f924f8bd93b7ebfadb815ce559cbc0fed5ccb197908efdc21847c36cb32e5825d7f48e7cfff46082b33b1a3aeb731d5b4db45c576b2f81b0813a7a5ef1b55e1b962bfbf13b656d1027630e81e6eab711c9fca92112d34f5b45b2bf482fd4db7d5700a864cec86bfb4d2b46f1dda3b455a213df8badd6cc49ce19c6a5d0cd55af6ab81e1d87a8e6718aaea9dea8543c72f69cca1eb7abb6d13eb2a3f9a0967c65559b51a843db1df0085bc1eb7128cf682ec7b8f0069eccefbdbe321c3f47ddce5c8e7cb2a00dfe3c8c2bcb4ef5bb4d347a4a7f96096234b4db5cbc383faeb41213e91b96fd24245505cf67e5cd0f991ed7d5280f1c7ab1a76297c6a749c6e26b7c76a08ac9e4e26cd05f946512d345f99e503f9be936985f949b28c76479ad7cad4b26306b3f7c1ab21de089e56c2730a7140a58a40344080bd5bc82c1fb70977bc5b6e722edede92021a5fc21beef6a765644f841815a58a50b23a0e63333c0325c9fe045ad5ac6cbbabf28651194ba4ed2b5995002f8e90d9926b64588d8409d34eb461a2a328598ce94d22a2e50b03b97109d29e3baf3e4c87fb56867e34d6114138ad8dce9f17e0e30cb3585c4406a6fb6094f910ff80784b55447aa48538e22e4a0bd3f21804cfebf60da007347ce52a82294eae9f6d6fab213fe5052eceeba7b7cdc7c72d403f1a13f7f5ab2f9ff9fea602229c149281387a96486a08fd740bfb197bcaa6c2874f43a55d1ec018a1bf58e968a6d3166648c75c1cc106a5ef7c435efca6bd3a8776aad2661e381006ae09f66975a7569beb9b6f2c254291859697fef229f9ea9d7029a8bd6d29ee6f69d88fd452b875e378a8ab3e788d89f6f13e8a02d7c35e9f1e08d7ca722199cf3e4206f436f631e8f276256bd377caecd4fa59db085bc2417d4022962e425f4f99c56659bdac3c0032d96977839f6dc37984c0286f3e266f34a66a02f79ad4a1a35266e28283fa43d4650a001031b5112d484d1bb8c5d235e7692f7fc0fea675dae82878988ff9a0394902e2fafddffec702fcb8b6c749570c95a683ac35979a8c92328934da186b7fb51c5ebc0189551482e4b3019c994ea0ef8c233fecf478040c65064ac581a6a91338233a0488006cea59c94c6f96d21a372211ef09aa4de8ddd98247f373054bf9a5bea73f76a2bf1edc39afc6044d1a486c68bd12bfe305875fa90c9f226608e5c516e325f059781676defa20be6f29c9d6e09e12728cf0b0d2f487d10c112b955071a13cf54c3345f6feb6e1170ff091cde7dfdee80a915e3b8e1b89191e09aa5fda9fa5ffbbbd0cf3453850ae5660f4f4576e2b04d212fd9dd5cef98ed8aa42099d3ffabf9ea0a8ad3b8eee3ea6365ab6234bb41ee06bc2487daa499f65a14bc2bc04cad1f52a3c8acca0f11be3ed5bebe7edfeb7510799a13867f514d053631b24b88346d8d33a1f01284cbafb77330d78a2c3a884b6a97cf5b38214e5a3e46a30a977cf23c30fdf571e4f946d9cb6b34057b6eab28296390768b9de41f35a1d283fbef55104b5a4a0af88338d1842ef51ee47397449c140784d41473cc8b190d670bb87cbdf1f032950cf2771aaad43e4d7fbc7b0b1627f1db21086063686e698e64401efcf4eac78b1c25882bbfefb6ea9b243a4552aae6ca60c7d03ab60bdf32a70637ea28f50648705268a48b267cd038d1568934de046fead3326ff0c336de4f722f5109d0075982c99ade1810d7cbfd8cafee1a69de432bfd7301d5bc68a9b16a0f2dbc59e50d96c8a1ca5c4e1f0ff64196bba90954878dcf24dbc57d26f875ac130d6c7c210778d644976bd6512be8d25ea2b391ca284238f8e6082331daa57d4d6cd03c435ba85b8fc4ed3632b2f50edaa0ceb8777e618efcdb79f98ae3d37b5b1b57f4eefceb111ebd79adec95dd75982e4363fd97bc8f3b34335a1ab52779c4ef72d754214e690e72c55d4d0c365338bd844264eefd275d085e3d07de95ffc339a0a2bcb8d48e3a03e5997d6a29191e9cda9d0f46c24c7a37c60bda3ae205503c231635d32aa5a974b17c87b06ea54690502395d03a96c2e6f0ec94bf3f4e78d7f0a2bda66bc1d5cf0d5ecd17f578312a6e3918846a53dc54331f3afb8b424fd43d7a553c64acfc8c1eb43a568832132511653b9d9f28b94c7059e8196fe1fd777aed6ce9827335241b1ae419b8b2dd42e739d900a06660e8c805ba50d7e2bc592d875ab91c2c9c5e917a67fd2c838409915816e7e59ea5948109068f5014618e697b8276902fcdc29a38786adf588bd4a57b8b6e4e382644ff2be964da4af2cbd0337672535c46be751ae436ffbfc52f7742228c529cb33cb97867e489389f69ab89c459d833f128738232834d3127ecad31293856c89d7fb5c81d79597e3959f714a807ca0b2dfe66bb1abebe7959ec503a9b09f7ae72348dcee39368db53389082b8a2d2b1b17dcb3f2a047baa499f0fe28ddebecc354e2d76dd21680465361525b434a9f28f9c33fa09d62fc587927f1444b60434e7a287ede6d16cc01c4c2a17bdbbf007cd3462ed2a20fab66b22457f5d47bcb4e325e741e9338bd813e712fe836bda4b3489099fc1a7dd77c0c6c2fbca86b69f3e721afa1419573bb130537665adb0976901e29018fcc0f6c00a97cdf31045b4fb834fc120ee16f265e850d672f44492cf922b5057c24728edb66d9a6bc8ab5c425ed1b6f589b43d1c956bba9dcae7d251a072fc2b5cf363d95e22130835d8c51f7b220e7615fe984c8fe18c3e14596576071d926dfaeee19c7ccde4bc5496f54f6158717042287368ccb3a45bd962f6113781dadb19e6a188e78af561b5ca3fca0faad31dc0043ee3ea31bc9b525cf8d02ad7aae0f64a76a14fd3247c8681242a55a81e34fbdb7ff1baa8a4f76f6bada9a92f1fae4586a3507c6fcff7e852c2fece1107ac696f639e5bd4f325b9199283f074a469eebbccf272102b72fdbfa69f7798348b4cfa2d5bfe3118283f23b31b4d264550ac4b7a50c2a59f1404c669d3d95bcab978dece6e3af7f4a775837ad906ae33dae9a0e4354d2229e7235ab58b8797d5a13fb4f3821b3dc85377e547bae3c939a4121d3846aded82a273699d76d2b9798b8b6154e232c9a49998559697a9a39a69456e7a6cf1fb6cfa7c4c8fba653307073845e1bd6cb044671fb0ddb3b47c3cb86ff1eda2d00ed620ae662632dabfe9bf5442761b34614f4f39e9cb583d91dd565af13c2b812b5af4e21afa7895e2f5143a7473d0a8648b3c3681af229100b2cce365255c41e533aeff1ddde2376802a30710e9ebf10f2872caaa0430c9fd4b0c1813a8f29e4e52d1d4855ed0a16751d5c1e3210317a7d4602ce04f42d361a20aab1281bfcb1275de3c640b65a33b0d26cd6c67b68aea534b040c939e46c685fba43f49f0a3aa454c643a7690c058876756b1c4cb583bb595b17e9f3e8517597d8eb775ba4507084f1a0713b9c5eddd430b4dce789a145320530ac29f5972c2665c72315f7a00ccb4df4d4129d77ad4888047c462bdc87e513f1f0c11d5c59ac94e6123982b071c0d026c032c856b61b66cad1e830e8aaca10880c7c6a5d6db46a2c82bd44d57698527ff09467a4c17f344f33dcc0d1d597f5e579101862840fff31c10e09e8d10efc33bd1107b028104f566cdf21ff6411d11e53f156402432c89b8a9c166e660de4cfa6413db9d0b0b1046f793345ad9b53edd6579b84c485810389460d63c245ae1411a94eae1969de61b043c686019e539ea1da484b2d942bd70ccd4165ad24badc70b51bf4e62ef5b07dd95c5a6d00e55f6be771564b2662323b436eb73bea355680e06d6c9a2a677ac0363fb6d3f3772cd2260d01b4e799e85ae811e392857f6bceeabfb242c4b351ad06c577ea842485a2657c80b45be29747d1184e7bfa1bbe4aa83b9ab66ca7e41e33ed5e36a93f25a16e6f5cf1f73c3a4e3bc60913d101a95f79a701f5256b807aa5eade1e0f1dace86a2ea14b56d51cf602fb76a07d5bbde0206348d3f8935e4c97da0e2f420a0a0ff858ca7caf106e309ae00f616ef83481809c55dc1977f0fc3de22a635aab81852a1b5b8f365fc4c6288be9f4fcbd03945fb6cad6082cc84093cc561785aec9063aba59dbe8a031b775611ac1f090307cc451c9755e063975cbdd33ecdace5b207c55efa5a8b03040a7be42888a493a4d76fee773a84594426cbeebfe3db9394aae17878d44db8f96bce76713b6bab7e32c59bdd420be5f63c297b61843c548a4b3562811fc07a8f0b84169cbb1c8ccefae6a05f72ac6fee3fc54d3a7d71104b233f9b0328e581f3fc3845ee3274ab0603ecd4c3022ac1921d8dc0b3b1802add35410d4285aed8e967245f7aa6c04f2bf86e1dbe9d35a516222df835cb46f4b7ffd7cbcf568dea697ce484bcf0068ca3cd74f0fe5e279e15661838ad972f704b0ebdd0a0947", 0x1000, 0x8}], 0x4b040, &(0x7f00000011c0)={[{}, {@mode={'mode', 0x3d, 0x7}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)=0x0) setresgid(0xffffffffffffffff, r2, 0x0) fchownat(r1, &(0x7f0000001200)='./file0\x00', 0x0, r2, 0x800) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)=0x0) setresgid(0xffffffffffffffff, r3, 0x0) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r2, r4) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:19:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 94) 03:19:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:19:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x90, 0x0, 0x4) 03:19:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8d, 0x0, 0x4) [ 1858.150545] FAULT_INJECTION: forcing a failure. [ 1858.150545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1858.152930] CPU: 1 PID: 10781 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1858.154551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1858.156843] Call Trace: [ 1858.157350] [ 1858.157803] dump_stack_lvl+0x8b/0xb3 [ 1858.158582] should_fail.cold+0x5/0xa [ 1858.159389] copy_page_to_iter+0x217/0xdd0 [ 1858.160279] filemap_read+0x4ff/0xbb0 [ 1858.161074] ? filemap_get_pages+0x1c90/0x1c90 [ 1858.162035] ? lock_acquire+0x1b2/0x4d0 [ 1858.162876] generic_file_read_iter+0x3cf/0x540 [ 1858.163820] ext4_file_read_iter+0x184/0x490 [ 1858.164720] new_sync_read+0x427/0x6f0 [ 1858.165513] ? __ia32_sys_llseek+0x380/0x380 [ 1858.166446] ? security_file_permission+0xb1/0xd0 [ 1858.167473] vfs_read+0x356/0x5f0 [ 1858.168188] ksys_read+0x12d/0x250 [ 1858.168907] ? __ia32_sys_pwrite64+0x230/0x230 [ 1858.170025] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1858.171135] do_syscall_64+0x3b/0x90 [ 1858.171905] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1858.172946] RIP: 0033:0x7f63a2e8eb19 [ 1858.173697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1858.177406] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1858.178951] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1858.180402] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1858.181831] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1858.183378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1858.185217] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1858.187018] 03:20:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x9, 0x103000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', r1) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = fsmount(r0, 0x0, 0x8) write$nbd(r2, &(0x7f0000000100)={0x67446698, 0x0, 0x1, 0x2, 0x4, "0267551efab1ed733c0ce77975a60eb56b709ccf6d1850fb89250d6e3072d1c6e1e224463a9ebcb80cc321d573c2f0115081e42d96d8763f2c3afbbe535e9781e8912ffc6187a9c62ef60f5fe7a413100a6e5e167a76d9b681c7f29551e73b612e508ee549f147c2a02d8e4967c9addba7c460b2f0455c078088377e22a2208222c1d73ad8484870ea418cc663ad18a1e8d10f4b33dd01aed01c42adfd113b071f44b826fb7900766ba9566acad7ccaae6109f4fd3379179999f24173920"}, 0xce) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000200)={0x0, "9c204e8c90a2f2b38ef7be5fa1f67396"}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001200)={r3, "09d04db04694e631862178c050863e98"}) 03:20:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 95) 03:20:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x91, 0x0, 0x4) 03:20:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x521040, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/211, 0xd3) openat(r0, &(0x7f0000000000)='./file0\x00', 0x10881, 0x40) 03:20:02 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:02 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000300)=""/189, 0xbd}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000440)=""/175, 0xaf}], 0x3, &(0x7f0000002140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000013000000000004000000000020000000000050a35166a673ce6c6ea71acc283ce5c5480a656c1702000000000000004c2d6bf8708c413c5df814", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32], 0xa8}, 0x22) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000780)=""/237, 0xed}, {&(0x7f0000000640)=""/83, 0x53}, {&(0x7f00000006c0)}, {&(0x7f0000000880)=""/147, 0x93}, {&(0x7f0000000940)=""/22, 0x16}, {&(0x7f0000000980)=""/235, 0xeb}], 0x6, &(0x7f0000000b00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x58}, 0x40000020) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x20000, &(0x7f0000000bc0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@privport}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_gt={'euid>', r3}}, {@smackfsfloor}]}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000000c0)={0x7f, 0x1, 'client1\x00', 0xffffffff80000000, "70c8241d6f85f0af", "406e136db90d58a865cd6879dbe6805c5ac6cb79676b4860c9df5eb1f10bf102", 0xd47, 0x4}) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) close_range(0xffffffffffffffff, r6, 0x2) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000001040)={{r5}, "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"}) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) r8 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r8, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r8, {0x1985}}, './file0\x00'}) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x401c5820, &(0x7f0000000180)={0xffff0001, 0x5, 0x200, 0x4, 0x8001}) read(r7, &(0x7f0000000000), 0xfffffdef) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000f40)={0x53, 0xfffffffffffffffd, 0xd9, 0x94, @scatter={0x2, 0x0, &(0x7f0000000d40)=[{&(0x7f00000006c0)=""/60, 0x3c}, {&(0x7f0000000c80)=""/140, 0x8c}]}, &(0x7f0000000d80)="4bf8f883082a2ab81bf1702f0c0e01296e8c14c205767bb64ef936afc5b5c47a9fdbe38398a013fae52cdcbf5ada9cf31fdc5bbce306613cba02b0c55a3fac0c6374421eb781842d4d2e5a023c24efe0fbad3ce3325ca2dad92edbad95c23c0b1357f2f398348e68d379057cbbff9d1a372a216e59f8f9226105e5ea3398b509c3763ec81fde40133ccd35fce6f53136b4e7d48b9497bece801934b0c3dd558f854a203d31ccd1bbb54801bb7a6b122a2c317e90349efc08f20abdf096265584b75a04558c4cca1c6074310bb2a657a3cfc76df9fd89fbbb8e", &(0x7f0000000e80)=""/83, 0xef, 0x42, 0xffffffffffffffff, &(0x7f0000000f00)}) ioctl$BTRFS_IOC_SYNC(r4, 0x9408, 0x0) 03:20:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8e, 0x0, 0x4) [ 1873.396011] FAULT_INJECTION: forcing a failure. [ 1873.396011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1873.398337] CPU: 1 PID: 10804 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1873.399948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1873.402117] Call Trace: [ 1873.402606] [ 1873.403055] dump_stack_lvl+0x8b/0xb3 [ 1873.403810] should_fail.cold+0x5/0xa [ 1873.404563] prepare_alloc_pages+0x17b/0x500 [ 1873.405426] __alloc_pages+0x131/0x4e0 [ 1873.406180] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1873.407363] ? __lock_acquire+0xbac/0x5b70 [ 1873.408198] ? mark_lock+0xfc/0x2e10 [ 1873.408910] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1873.409974] alloc_pages_vma+0xde/0x500 [ 1873.410779] __handle_mm_fault+0xfb3/0x3570 [ 1873.411648] ? lock_is_held_type+0xd7/0x130 [ 1873.412501] ? __pmd_alloc+0x680/0x680 [ 1873.413299] handle_mm_fault+0x2e6/0xa20 [ 1873.414128] do_user_addr_fault+0x54a/0x12a0 [ 1873.415044] exc_page_fault+0xa2/0x1a0 [ 1873.415825] asm_exc_page_fault+0x1e/0x30 [ 1873.416652] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1873.417744] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1873.421331] RSP: 0018:ffff888038f879f0 EFLAGS: 00050246 [ 1873.422380] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1873.423801] RDX: 0000000000000000 RSI: ffff88801f34d000 RDI: 000000002002f000 [ 1873.425209] RBP: 000000002002f000 R08: 0000000000000000 R09: ffff88801f34dfff [ 1873.426616] R10: ffffed1003e69bff R11: 0000000000000001 R12: ffff88801f34d000 [ 1873.428044] R13: 0000000020030000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1873.429479] copyout.part.0+0xdf/0x110 [ 1873.430273] copy_page_to_iter+0x248/0xdd0 [ 1873.431163] filemap_read+0x4ff/0xbb0 [ 1873.431946] ? filemap_get_pages+0x1c90/0x1c90 [ 1873.432889] generic_file_read_iter+0x3cf/0x540 [ 1873.433832] ext4_file_read_iter+0x184/0x490 [ 1873.434725] new_sync_read+0x427/0x6f0 [ 1873.435517] ? __ia32_sys_llseek+0x380/0x380 [ 1873.436423] ? security_file_permission+0xb1/0xd0 [ 1873.437399] vfs_read+0x356/0x5f0 [ 1873.438107] ksys_read+0x12d/0x250 [ 1873.438823] ? __ia32_sys_pwrite64+0x230/0x230 [ 1873.439761] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1873.440801] do_syscall_64+0x3b/0x90 [ 1873.441557] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1873.442580] RIP: 0033:0x7f63a2e8eb19 [ 1873.443328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1873.446977] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1873.448485] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1873.450065] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1873.451794] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1873.453219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1873.454638] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1873.456133] 03:20:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x8f, 0x0, 0x4) 03:20:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x92, 0x0, 0x4) 03:20:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x209, 0x5, 0xfffffeff}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x20100, 0x0) fdatasync(r2) read(0xffffffffffffffff, 0x0, 0x0) 03:20:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:02 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x482000, 0x0) read(r1, &(0x7f00000001c0)=""/102400, 0x19000) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") 03:20:02 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) [ 1873.675734] Process accounting resumed 03:20:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) 03:20:16 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(r0, &(0x7f00000000c0)=""/174, 0xae) 03:20:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x7e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f00000000c0)={0x0, 0x7, 0x7, 0x1}) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r3, 0x0, 0x0) 03:20:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000000), 0x5, 0x781000) r2 = gettid() r3 = gettid() kcmp(r2, r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r4 = accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c, 0x80000) r5 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) read(r5, &(0x7f00000001c0)=""/5, 0x5) ioctl$SG_IO(r5, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r4, &(0x7f0000000180)={r0, r5, 0x7f}) r6 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) splice(r1, &(0x7f0000000040)=0xff, r6, &(0x7f00000000c0)=0xa29, 0x7, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:20:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x93, 0x0, 0x4) 03:20:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x90, 0x0, 0x4) 03:20:16 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x9, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 96) 03:20:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x82, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) [ 1887.683622] FAULT_INJECTION: forcing a failure. [ 1887.683622] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1887.684942] CPU: 1 PID: 10866 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1887.685819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1887.687000] Call Trace: [ 1887.687276] [ 1887.687507] dump_stack_lvl+0x8b/0xb3 [ 1887.687930] should_fail.cold+0x5/0xa [ 1887.688344] copy_page_to_iter+0x217/0xdd0 [ 1887.688816] filemap_read+0x4ff/0xbb0 [ 1887.689243] ? filemap_get_pages+0x1c90/0x1c90 [ 1887.689746] ? lock_acquire+0x1b2/0x4d0 [ 1887.690173] generic_file_read_iter+0x3cf/0x540 [ 1887.690668] ext4_file_read_iter+0x184/0x490 [ 1887.691154] new_sync_read+0x427/0x6f0 [ 1887.691568] ? __ia32_sys_llseek+0x380/0x380 [ 1887.692050] ? security_file_permission+0xb1/0xd0 [ 1887.692566] vfs_read+0x356/0x5f0 [ 1887.692935] ksys_read+0x12d/0x250 [ 1887.693315] ? __ia32_sys_pwrite64+0x230/0x230 [ 1887.693794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1887.694345] do_syscall_64+0x3b/0x90 [ 1887.694756] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.695312] RIP: 0033:0x7f63a2e8eb19 [ 1887.695711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.697631] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1887.698423] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1887.699559] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1887.700494] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.701265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.702046] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1887.702833] 03:20:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x91, 0x0, 0x4) 03:20:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x83, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x92, 0x0, 0x4) 03:20:16 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xa, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x94, 0x0, 0x4) 03:20:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x84, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 97) 03:20:16 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1887.880227] FAULT_INJECTION: forcing a failure. [ 1887.880227] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1887.881686] CPU: 1 PID: 10894 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1887.882598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1887.883827] Call Trace: [ 1887.884103] [ 1887.884344] dump_stack_lvl+0x8b/0xb3 [ 1887.884780] should_fail.cold+0x5/0xa [ 1887.885200] prepare_alloc_pages+0x17b/0x500 [ 1887.885676] __alloc_pages+0x131/0x4e0 [ 1887.886102] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1887.886750] ? __lock_acquire+0xbac/0x5b70 [ 1887.887265] ? mark_lock+0xfc/0x2e10 [ 1887.887672] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1887.888277] alloc_pages_vma+0xde/0x500 [ 1887.888722] __handle_mm_fault+0xfb3/0x3570 [ 1887.889214] ? lock_is_held_type+0xd7/0x130 [ 1887.889694] ? __pmd_alloc+0x680/0x680 [ 1887.890157] handle_mm_fault+0x2e6/0xa20 [ 1887.890618] do_user_addr_fault+0x54a/0x12a0 [ 1887.891139] exc_page_fault+0xa2/0x1a0 [ 1887.891579] asm_exc_page_fault+0x1e/0x30 [ 1887.892047] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1887.892652] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1887.894622] RSP: 0018:ffff8880401d79f0 EFLAGS: 00050246 [ 1887.895214] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1887.896004] RDX: 0000000000000000 RSI: ffff88801f323000 RDI: 0000000020030000 [ 1887.896752] RBP: 0000000020030000 R08: 0000000000000000 R09: ffff88801f323fff [ 1887.897543] R10: ffffed1003e647ff R11: 0000000000000001 R12: ffff88801f323000 [ 1887.898328] R13: 0000000020031000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1887.899143] copyout.part.0+0xdf/0x110 [ 1887.899584] copy_page_to_iter+0x248/0xdd0 [ 1887.900074] filemap_read+0x4ff/0xbb0 [ 1887.900518] ? filemap_get_pages+0x1c90/0x1c90 [ 1887.901041] ? lock_acquire+0x1b2/0x4d0 [ 1887.901489] generic_file_read_iter+0x3cf/0x540 [ 1887.902017] ext4_file_read_iter+0x184/0x490 [ 1887.902510] new_sync_read+0x427/0x6f0 [ 1887.902935] ? __ia32_sys_llseek+0x380/0x380 [ 1887.903452] ? security_file_permission+0xb1/0xd0 [ 1887.904001] vfs_read+0x356/0x5f0 [ 1887.904390] ksys_read+0x12d/0x250 [ 1887.904789] ? __ia32_sys_pwrite64+0x230/0x230 [ 1887.905297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1887.905871] do_syscall_64+0x3b/0x90 [ 1887.906291] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1887.906868] RIP: 0033:0x7f63a2e8eb19 [ 1887.907273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1887.909309] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1887.910144] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1887.910933] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1887.911718] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1887.912506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1887.913290] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1887.914088] 03:20:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x93, 0x0, 0x4) 03:20:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) 03:20:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$BINDER_FREEZE(r1, 0x400c620e, &(0x7f0000000040)={0xffffffffffffffff}) read(r0, &(0x7f0000000000), 0xfffffdef) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum, 0x0, @desc1}) 03:20:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x95, 0x0, 0x4) 03:20:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x94, 0x0, 0x4) 03:20:29 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddb000000081e0300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4042005}, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) close(r1) [ 1900.915598] FAULT_INJECTION: forcing a failure. [ 1900.915598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1900.916952] CPU: 1 PID: 10918 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1900.917887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1900.919142] Call Trace: [ 1900.919450] [ 1900.919696] dump_stack_lvl+0x8b/0xb3 [ 1900.920140] should_fail.cold+0x5/0xa [ 1900.920573] copy_page_to_iter+0x217/0xdd0 [ 1900.921208] filemap_read+0x4ff/0xbb0 [ 1900.921790] ? filemap_get_pages+0x1c90/0x1c90 [ 1900.922490] ? lock_acquire+0x1b2/0x4d0 [ 1900.923084] generic_file_read_iter+0x3cf/0x540 [ 1900.923761] ext4_file_read_iter+0x184/0x490 [ 1900.924371] new_sync_read+0x427/0x6f0 [ 1900.924917] ? __ia32_sys_llseek+0x380/0x380 [ 1900.925556] ? security_file_permission+0xb1/0xd0 [ 1900.926277] vfs_read+0x356/0x5f0 [ 1900.926801] ksys_read+0x12d/0x250 [ 1900.927340] ? __ia32_sys_pwrite64+0x230/0x230 [ 1900.928021] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1900.928791] do_syscall_64+0x3b/0x90 [ 1900.929344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1900.930083] RIP: 0033:0x7f63a2e8eb19 [ 1900.930636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1900.933290] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1900.934398] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1900.935465] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1900.936507] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1900.937533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1900.938572] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1900.939656] 03:20:29 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x85, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 98) 03:20:29 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xb, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x95, 0x0, 0x4) 03:20:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x96, 0x0, 0x4) 03:20:30 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x86, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x96, 0x0, 0x4) 03:20:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x97, 0x0, 0x4) 03:20:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 99) 03:20:30 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xc, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) read(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000000)) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000019180)='./file0\x00') r2 = socket$inet_icmp(0x2, 0x2, 0x1) read(r2, &(0x7f00000190c0)=""/157, 0x9d) [ 1901.123820] FAULT_INJECTION: forcing a failure. [ 1901.123820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1901.125215] CPU: 1 PID: 10946 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1901.126148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1901.127425] Call Trace: [ 1901.127705] [ 1901.127943] dump_stack_lvl+0x8b/0xb3 [ 1901.128378] should_fail.cold+0x5/0xa [ 1901.128808] prepare_alloc_pages+0x17b/0x500 [ 1901.129309] __alloc_pages+0x131/0x4e0 [ 1901.129745] ? __alloc_pages_slowpath.constprop.0+0x1f10/0x1f10 [ 1901.130413] ? __lock_acquire+0xbac/0x5b70 [ 1901.130903] ? mark_lock+0xfc/0x2e10 [ 1901.131333] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1901.131962] alloc_pages_vma+0xde/0x500 [ 1901.132410] __handle_mm_fault+0xfb3/0x3570 [ 1901.132904] ? lock_is_held_type+0xd7/0x130 [ 1901.133391] ? __pmd_alloc+0x680/0x680 [ 1901.133847] handle_mm_fault+0x2e6/0xa20 [ 1901.134306] do_user_addr_fault+0x54a/0x12a0 [ 1901.134824] exc_page_fault+0xa2/0x1a0 [ 1901.135261] asm_exc_page_fault+0x1e/0x30 [ 1901.135739] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1901.136357] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 [ 1901.138415] RSP: 0018:ffff88801ae079f0 EFLAGS: 00050246 [ 1901.138996] RAX: 0000000000000001 RBX: 0000000000001000 RCX: 0000000000000200 [ 1901.139791] RDX: 0000000000000000 RSI: ffff88801f338000 RDI: 0000000020031000 [ 1901.140591] RBP: 0000000020031000 R08: 0000000000000000 R09: ffff88801f338fff [ 1901.141385] R10: ffffed1003e671ff R11: 0000000000000001 R12: ffff88801f338000 [ 1901.142185] R13: 0000000020032000 R14: 00007ffffffff000 R15: 0000000000000000 [ 1901.142991] copyout.part.0+0xdf/0x110 [ 1901.143456] copy_page_to_iter+0x248/0xdd0 [ 1901.143949] filemap_read+0x4ff/0xbb0 [ 1901.144392] ? filemap_get_pages+0x1c90/0x1c90 [ 1901.144917] ? lock_acquire+0x1b2/0x4d0 [ 1901.145367] generic_file_read_iter+0x3cf/0x540 [ 1901.145896] ext4_file_read_iter+0x184/0x490 [ 1901.146390] new_sync_read+0x427/0x6f0 [ 1901.146826] ? __ia32_sys_llseek+0x380/0x380 [ 1901.147330] ? security_file_permission+0xb1/0xd0 [ 1901.147879] vfs_read+0x356/0x5f0 [ 1901.148274] ksys_read+0x12d/0x250 [ 1901.148670] ? __ia32_sys_pwrite64+0x230/0x230 [ 1901.149186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1901.149779] do_syscall_64+0x3b/0x90 [ 1901.150201] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1901.150774] RIP: 0033:0x7f63a2e8eb19 [ 1901.151161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1901.153230] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1901.154080] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1901.154879] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1901.155692] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1901.156483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1901.157278] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1901.158090] 03:20:30 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xffffffff}}, './file0\x00'}) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000000c0)={0x5, 0xe7, 0x6, 0x800, 0x2, [{0x7b1, 0x2, 0x400000000, '\x00', 0x2}, {0x7c, 0x0, 0xfffffffffffffe01, '\x00', 0x400}]}) read(r0, &(0x7f0000000000), 0xfffffdef) 03:20:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x20002, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x3, 0xab, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:20:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) (fail_nth: 100) 03:20:47 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x87, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:47 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xd, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:20:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, &(0x7f0000000380)={@mcast1, 0x0, r3}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x4e21, 0x6, 0x4e20, 0x0, 0xa, 0x80, 0x80, 0x0, r3, r4}, {0x8000, 0x74, 0x1, 0x35b, 0x6, 0x8001, 0x1, 0x3}, {0x3, 0x10001, 0xffffffffffffffff, 0x10001}, 0xff, 0x6e6bbb, 0x2, 0x1, 0x3, 0x2}, {{@in=@remote, 0x4d5, 0x2b}, 0x2, @in=@private=0xa0100fc, 0x3503, 0x1, 0x2, 0x3, 0x40000000, 0xfffffff7, 0x6}}, 0xe8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r5, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:20:47 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050000000000000000004400000008000300", @ANYRES32=r3, @ANYBLOB="0a0018"], 0x30}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4002108}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r2, 0x300, 0x70bd27, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0xbed71f49ede5fcce}, 0x0) 03:20:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x97, 0x0, 0x4) 03:20:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x98, 0x0, 0x4) 03:20:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="c97d0112e8d90f6f0a00d62ee6d916bcc43738d47e1e92736f0f5f7fc3271fcc4854549060316f534d44e13dabc7081b4177510c785c50d42774c6a804512b7f7fbc19b736c177f10f118ef5c191e8d46d60296d0c4ff8536dfac3c88f27295dfaae1a715ed2b45f2a46a9050d9b3a1baee645f9237e1e313a447968989c22372bfc3ac568eb3a880eaaec85b7764feb66a849e4ac56aa89dc886f0be287fcedbff9d0b3d4297fdf0970a8c6bd138b68df4d034d", 0xb4}, {&(0x7f0000000180)="ff4223cfd152efcfc73c25b8beb3eeb6184887ffeed779137253aac83fca87b86e5df00cdcecde9a53feacff78013b5cece237526bb7b3c2d3f508b005f102e23e67aabc580f0302c3eb124f0ffb3075cf847080efe9e2f71e236eb47734ee07fcbb49df81318f094d61eb705026cd91e55892e98653e89ab3af668df1dafeb05e569bc849aa518950e168c03fbed5175afda89e5c92b6407294ad903a0bb30a5457d989a40ddc473a10c6bba55c008fb3f23ab9bbe11010081b71e664443f9a9cd2473ec7607ea1a2d88b1a1c28561c276bb276098d85efa359c2", 0xdb}, {&(0x7f0000000280)="6cfad2230b2f76be066574db2167002a4b79be7004dbdfd33c43639881080ea76711924577e4c50695cde7ec65eee99e3c2ce7cde65890601190f7522152750bc9052a08585aafdf1634c182d0a5dde8596609432b1df2a7528017e21ce133db4682ee3c1922e47470cd5c040f4c63adceff3eb40f10def4e3b35f1e102270b65c01750c1f9e613fde76a66bde5ec927b50d27f0bc4f6e15a942ba85780b32f5fb68058984c3a17357199d0b589f3b771012b4bb015bf8f16ab4197533837ea748c4192075658134496b0af095bf78", 0xcf}], 0x3, 0x9, 0x478) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) [ 1918.883116] FAULT_INJECTION: forcing a failure. [ 1918.883116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1918.884684] CPU: 1 PID: 10974 Comm: syz-executor.1 Not tainted 5.16.0-rc4-next-20211208 #1 [ 1918.885744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1918.887177] Call Trace: [ 1918.887507] [ 1918.887805] dump_stack_lvl+0x8b/0xb3 [ 1918.888305] should_fail.cold+0x5/0xa [ 1918.888798] copy_page_to_iter+0x217/0xdd0 [ 1918.889357] filemap_read+0x4ff/0xbb0 [ 1918.889860] ? filemap_get_pages+0x1c90/0x1c90 [ 1918.890452] ? lock_acquire+0x1b2/0x4d0 [ 1918.890967] generic_file_read_iter+0x3cf/0x540 [ 1918.891513] ext4_file_read_iter+0x184/0x490 [ 1918.891978] new_sync_read+0x427/0x6f0 [ 1918.892364] ? __ia32_sys_llseek+0x380/0x380 [ 1918.892841] ? security_file_permission+0xb1/0xd0 [ 1918.893323] vfs_read+0x356/0x5f0 [ 1918.893670] ksys_read+0x12d/0x250 [ 1918.894045] ? __ia32_sys_pwrite64+0x230/0x230 [ 1918.894498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1918.895058] do_syscall_64+0x3b/0x90 [ 1918.895441] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1918.895995] RIP: 0033:0x7f63a2e8eb19 [ 1918.896360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1918.898282] RSP: 002b:00007f63a0404188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1918.899025] RAX: ffffffffffffffda RBX: 00007f63a2fa1f60 RCX: 00007f63a2e8eb19 [ 1918.899800] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000003 [ 1918.900542] RBP: 00007f63a04041d0 R08: 0000000000000000 R09: 0000000000000000 [ 1918.901282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1918.902021] R13: 00007ffd2e16dadf R14: 00007f63a0404300 R15: 0000000000022000 [ 1918.902801] [ 1918.934290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1918.952033] Process accounting paused 03:20:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000001c0)={0x7fffffff, 0x0, 0x3ff, 0x671, 0x3, 0x5}) read(r0, &(0x7f00000000c0)=""/241, 0xf1) read(r0, &(0x7f0000000000), 0xfffffdef) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x300, 0x0) [ 1918.994453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:20:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x98, 0x0, 0x4) 03:20:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x88, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:20:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x99, 0x0, 0x4) 03:20:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:21:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x11ffffdef) 03:21:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x89, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x99, 0x0, 0x4) 03:21:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'sit0\x00'}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000039fcffff", @ANYRES32=r1, @ANYBLOB="06000000000000213343faffffffffff"]) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x2002}, 0x4) 03:21:01 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xe, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:01 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:21:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9a, 0x0, 0x4) 03:21:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x298100, 0xb) read(r1, &(0x7f00000000c0)=""/4096, 0x1000) 03:21:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9b, 0x0, 0x4) 03:21:01 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0xf, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9a, 0x0, 0x4) 03:21:01 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x6) 03:21:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8a, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) read(r1, 0x0, 0x0) 03:21:01 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x17, 0x8, &(0x7f00000000c0)="8677dd0c9a637635"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$BTRFS_IOC_GET_FEATURES(r1, 0x80189439, &(0x7f0000000000)) 03:21:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9c, 0x0, 0x4) 03:21:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x444800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) openat(r1, &(0x7f0000000000)='./file0\x00', 0x408480, 0x100) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)=0x0) r3 = signalfd4(r1, &(0x7f0000000b40)={[0xbc]}, 0x8, 0x80000) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000002fc0)={&(0x7f0000002c40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002f80)={&(0x7f0000002c80)={0x2f4, 0x0, 0x800, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x1}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1d0, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x15, 0x0, "3303d3915b6627397711b1be610988defb"}, @NL80211_BAND_5GHZ={0x4}, @NL80211_BAND_5GHZ={0x31, 0x1, "b15933d727deaf56d32a815ef7b1a290235c03fe93ba255070e152e09845d26b38c24b5ac625358df7fc3770d8"}, @NL80211_BAND_60GHZ={0x4c, 0x2, "2c92fc7b6677a1b52a5ab70581cf375e2af2d1a75d6444e7728192aef8aa76b5fe3a405cef56baca0606289833ca02c08ba3f60c0d8751ac40ded6f319dbe725deb346f132d596d9"}, @NL80211_BAND_6GHZ={0x7, 0x3, "3756c4"}, @NL80211_BAND_2GHZ={0x43, 0x0, "ccdfac14b010c75528ea3a1ae39199b9f807a3e3162c5c122b8266120696e833d8ceac16837e548f0489794a368555f7154df03b87d8c0e5416bd893fa1ecf"}, @NL80211_BAND_60GHZ={0xe3, 0x2, "bdb78eda9d57acb7b060695d54ed59dffb08c39f7019b15b2cfad3a54f7bc8808ba7947622b01af4aa6094678615c2c905fa1f8bf93e34c823a180f2628111f6154e27b93897d5b08da927460b9f8028398da39ae8c00d677d669e7cde7f7070290027dd1ecb7b892032f64731e3223759127b12c3b2044c2627f3ceef2de132a8746b547741488e1004c5b5b0b2c1ec58e089aa465f8b998b8599c9bf98f5ee0a083c90574ff21a30826c1c13d65ec5fe8b8ce5b2a1f92bc0df26f91abfaa9898f78158b867f3d33185af56297513b6e5a006c560878be94dd6034722b056"}]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x90, 0x2d, 0x0, 0x1, [{0x13, 0x0, @random="37bf2ba390702d5f8ab23899fd3f65"}, {0xa, 0x0, @default_ap_ssid}, {0x24, 0x0, @random="d1f82c2f6e08098425b8f43ad096393104652d4828a7fba4f71d52517e8dbf8a"}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}]}, @NL80211_ATTR_SCAN_SSIDS={0x64, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @random="6b6d58e2a183"}]}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x2080}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x81}, 0x0) setresgid(0xffffffffffffffff, r2, 0x0) fchown(r0, 0x0, r2) 03:21:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9b, 0x0, 0x4) 03:21:01 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x10, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9d, 0x0, 0x4) 03:21:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8b, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:15 executing program 1: socketpair(0xa, 0x6, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) recvfrom$inet(r0, &(0x7f0000000040)=""/12, 0xc, 0x0, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) read(r1, &(0x7f0000000000), 0xfffffdef) 03:21:15 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) close(r0) 03:21:15 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8c, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:15 executing program 4: bind(0xffffffffffffffff, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x4, @broadcast, 'veth1_to_bridge\x00'}}, 0x80) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) read(0xffffffffffffffff, 0x0, 0x0) 03:21:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9e, 0x0, 0x4) 03:21:15 executing program 6: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x181800, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x80000, 0x155) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f00000000c0)='/dev/vcsu\x00', 0x0, 0xffffffffffffffff) read(r1, &(0x7f0000000000), 0xfffffdef) 03:21:15 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x11, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9c, 0x0, 0x4) 03:21:15 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8d, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9f, 0x0, 0x4) 03:21:15 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8e, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa0, 0x0, 0x4) 03:21:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x1610, &(0x7f0000000000)={0x0, 0xffa5, 0x1, 0x0, 0x20c, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) read(r1, &(0x7f0000000000), 0x0) 03:21:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9d, 0x0, 0x4) 03:21:31 executing program 6: pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="6b7bfb42869630847e35046d9fd323cded93182055fd2b1dd499a77cece9069c638b3b6f00d9d060a34339549296ed4fb9ea030fdbe440de716a648d44f5f255b66c9d56a16cbd53b2f4f4d00bc4f439182f4c843dc3d1a6446dc867a9fa4af879ce88551f913beb4e33a474c968af46fdaea7d0d395b220f80b2fea868fe16aebd9a55a6261aec36adab55d26668886997af2962a05", 0x96, 0xffff) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x801, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@private}}, &(0x7f00000002c0)=0xe8) read(0xffffffffffffffff, &(0x7f0000000080)=""/14, 0xfffffffffffffd3a) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x600880, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xff0}}, './file0\x00'}) 03:21:31 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x12, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9e, 0x0, 0x4) 03:21:31 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x8f, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:21:31 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x80800) ioctl$sock_proto_private(r0, 0x89e4, &(0x7f00000000c0)="32094b3ab44565b6740b5ea25eae9680ddb6cfb91195398514e31a65cbcb5a8d18896770653e538568a805da5bdffbe05b1d47cf08aa2d8029e543b4c71636397ea3aaebf52dd61131711ed054863bcd5b4ff3fab2cdbafe94df23f44e") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) 03:21:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa1, 0x0, 0x4) 03:21:31 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)=ANY=[@ANYBLOB="010000ea091dc90018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00@\x00\x00\x00\x00\x00./file0\x00']) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x8000, 0x113) read(r1, &(0x7f0000000000), 0xfffffdef) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x1, r1, 0x4, 0x80000}) 03:21:31 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x90, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:31 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x13, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x9f, 0x0, 0x4) 03:21:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa2, 0x0, 0x4) 03:21:31 executing program 1: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/36, 0x24}, {&(0x7f00000000c0)=""/129, 0x81}, {&(0x7f0000000180)=""/212, 0xd4}, {&(0x7f0000000280)=""/163, 0xa3}, {&(0x7f0000000340)=""/87, 0x57}, {&(0x7f0000000040)=""/47, 0x2f}], 0x6}}, {{&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/199, 0xc7}, {&(0x7f00000005c0)=""/53, 0x35}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/73, 0x49}], 0x4}}, {{&(0x7f0000000700), 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000780)=""/252, 0xfc}, {&(0x7f0000000880)=""/64, 0x40}], 0x2, &(0x7f0000000900)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000c80)=[{&(0x7f00000009c0)=""/224, 0xe0}, {&(0x7f0000000ac0)=""/248, 0xf8}, {&(0x7f0000000bc0)=""/19, 0x13}, {&(0x7f0000000c00)=""/78, 0x4e}], 0x4, &(0x7f0000000cc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}], 0x4, 0x2003, &(0x7f0000000f00)) clone3(&(0x7f0000001300)={0x2000, &(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)=0x0, {0x34}, &(0x7f00000010c0)=""/254, 0xfe, &(0x7f00000011c0)=""/223, &(0x7f00000012c0)=[r0, r0, r0, 0x0], 0x4, {r4}}, 0x58) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) recvmsg$unix(r3, &(0x7f0000003b40)={&(0x7f0000001440), 0x6e, &(0x7f0000003a00)=[{&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000034c0)=""/247, 0xf7}, {&(0x7f00000035c0)=""/183, 0xb7}, {&(0x7f0000003680)=""/241, 0xf1}, {&(0x7f0000003780)=""/92, 0x5c}, {&(0x7f0000003800)=""/79, 0x4f}, {&(0x7f0000003880)=""/186, 0xba}, {&(0x7f0000003940)=""/169, 0xa9}], 0x9, &(0x7f0000003ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x3) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000000f80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000600), 0x0, &(0x7f0000003b80)=[@cred={{0x1c, 0x1, 0x2, {r5, r1, r6}}}, @cred={{0x1c, 0x1, 0x2, {r0, r7, r2}}}], 0x40, 0x8064}, 0x8000) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x10240, 0x0) recvmsg$unix(r8, &(0x7f0000003e40)={&(0x7f0000003c00), 0x6e, &(0x7f0000003d80)=[{&(0x7f0000003c80)=""/246, 0xf6}], 0x1, &(0x7f0000003dc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x1000) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000f40)={0x0, 0x1, 0x6, @broadcast}, 0x10) r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r9, &(0x7f0000000000), 0xfffffdef) 03:21:31 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x400000, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) 03:21:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/122, 0x7a) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x650040, 0x40) sendto$unix(r0, &(0x7f0000000280)="90f958d0b806351e43949d6122eab9307378abd871be71e28a51633fac1b0aacf50d05c568ccf201b314482e800a2c45bd38c7d7a1bd24bac8f831efdede1ee96e99b37d07de8e94dfd90b3303c20a6a174d515eff66911134a0dba584dfc8446ded19e6f2e54936e8c7d2b1c6", 0x6d, 0x0, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e) read(r0, &(0x7f0000000000), 0xfffffdef) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/244, 0xf4}], 0x1) read(0xffffffffffffffff, 0x0, 0x0) [ 1962.277517] Process accounting resumed 03:21:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f00000000c0)={{r1}, 0x8, &(0x7f0000000040)=[0x7, 0xd0, 0x6, 0x80000001, 0xffffffffffffffc1, 0x200, 0x7, 0x401], 0x5f6c8be2, 0x0, [0x8001, 0x10000, 0x5, 0x101]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) 03:21:50 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x91, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(r0, &(0x7f00000000c0)=""/129, 0x81) 03:21:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ftruncate(r0, 0x9) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000000)={0x8001, 0x6, 0x97, {0x5, 0x7ff}, 0x3fffc00, 0xab}) 03:21:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa0, 0x0, 0x4) 03:21:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa3, 0x0, 0x4) 03:21:50 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x14, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:21:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x101000, 0x50) read(r0, &(0x7f0000000040)=""/12, 0xc) 03:21:50 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x1910c0, 0x0) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000190c0)=ANY=[@ANYBLOB="10000000170100070787dc0000200000"], 0x10) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) openat(r2, &(0x7f0000000040)='./file0\x00', 0x600, 0x81) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r3, &(0x7f0000000000), 0xfffffdef) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000019100)='/dev/sg#\x00', 0x0, r4) 03:21:50 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x92, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:21:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa1, 0x0, 0x4) 03:21:50 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x15, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x52, 0x3, 0xffffffff, "8ec89908248058905e1fc864cb77aad137c81066db3dba4558b76bf2791fc5a935905123ae73e27f53039c3305449f99ce3df3cf21273fa7c755e6ce365c14605fff9ac0ce5859ee478dc5f5dddf0d5c33c2"}) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sg(&(0x7f0000000000), 0x4, 0x80000) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000001, 0x10, r1, 0x2a8b7000) 03:22:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x93, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa4, 0x0, 0x4) 03:22:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r0, 0x8, 0x800000000, 0x4) read(r0, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa2, 0x0, 0x4) 03:22:04 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x16, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = io_uring_setup(0x750f, &(0x7f00000000c0)={0x0, 0x2734, 0x4, 0x2, 0x46}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x3, 0x6, 0x1000}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x501000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa3, 0x0, 0x4) [ 1995.170424] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1995.200349] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO 03:22:04 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x172) read(r1, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa5, 0x0, 0x4) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa4, 0x0, 0x4) [ 1995.261583] audit: type=1400 audit(1639365724.329:16): avc: denied { relabelto } for pid=11249 comm="syz-executor.0" name="UNIX" dev="sockfs" ino=41531 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:crond_runtime_t:s0 tclass=unix_dgram_socket permissive=1 03:22:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(r0, &(0x7f0000001480)=""/125, 0x7d) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1374}, 0x1, 0x0, 0x0, 0x41}, 0x20000044) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001500)='blkio.bfq.io_service_time\x00', 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r1, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000228bd700012", @ANYRES32=0x0, @ANYBLOB="0c00990000000000600000000a00060008021100000100000a000600ffffffffffff0000"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x31d080, 0x20) read(r2, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x17, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x94, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:04 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(0xffffffffffffffff, 0x80049367, &(0x7f0000000000)=0xe489000000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) move_mount(0xffffffffffffff9c, &(0x7f00000008c0)='./file0\x00', r0, &(0x7f0000000900)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', 0x2) read(r1, &(0x7f0000000000), 0xfffffdef) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0x3, 0x10100) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000240)={0x1, 0x2, 0x1000, 0x53, &(0x7f00000000c0)="e2315cf0d0ac28fd98a89fe7e6c6ec52c658723713f0ada94d8f1ee86d1cb992a4f72cd771bcbef9abe21e5c9298262a70727a4857a1e153cf1cac2fde6a433b6984adf401cdde1a23326673d5e570574ed04a", 0xe0, 0x0, &(0x7f0000000140)="a78edd4a79f936824876fe8433e90cc2d9c7a089542f3fd12d44ee601a16a2f4ec4d357c32006db38931e284d4781ca1764990306568e712803454afbfb17646d61ad2e5df89f38b84abf57c9df51543549c4900600caabba0a447e7076fe8bbebd25af60b642ca8064a48076ac37db1bb3c0103d144bc7863dcf541491535c1af52d0c4ef8dd1ec1c9acc7f2b5d34cf686d454c7c9a038c346866ca9672c5584012e25358432319c70042aaa1445ec7e09f93514eb751d1d3c764c24952d563c7a3f5465a693be83b7569b262aa632631ff620d9bd88241b4b40a344f9e53ce"}) r3 = pidfd_getfd(r1, r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000980)={0x4, 0x3f, 0x400, 0xffffffffffffff80, 0x3, 0x7}) r4 = syz_open_dev$vcsu(&(0x7f0000000a00), 0xfffffffffffffffc, 0x280000) openat(r4, &(0x7f0000000a40)='./file1\x00', 0x601c1, 0x2) ioctl$RTC_WIE_OFF(r3, 0x7010) fsetxattr$trusted_overlay_origin(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) sendmsg$unix(r3, &(0x7f0000000880)={&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000003c0)="5032f9310135c7f01b21d0c79d9730711a1881c2d20fb4ed3bc9de221106cbe387cc8e0b602578d9624cf0d679aa8b5dc05dbe053c92e9caeecdc2fc3490b875d4a78293133b834bbc436c5da9485c29f9a2b625445fa7b3ca07acef3bbce4541c2e0ae003a1c3cc124e7e07f28b19838f81fc121d507a62c8d3d1a7f47ed635b7c6f53edeca0ffa96c5449f5394f62c0fa30c60d094df5eedee52fa0332b5a4f4d35ffc344d16557c1bc072e1e978a335c2c7acceb44194452cf5ff8497d9985ce44fb07bab761623823660a4784f7318b2a0952ce642cff5055a2b139d27b0ec41495eaf645103a6b4dcfbdb88dd9165fa931735a84d81b89b6ad9406f", 0xfe}, {&(0x7f00000004c0)="3e791f6a9a565c370091dda816e697f7fb14178e93cded1b8c934a10f53812c4ea342ef2b07af728a54d8b1712d4aafeaafef47f350ae931b11c3ae3628a32ec9da7", 0x42}, {&(0x7f0000000540)="153140ed52f5e64053923d7530d7c3520db18faba487734c3c49762f1fe826b11231e5ac8c8168575e5b9ead5e7049eab4430167fd3eb868d1f09e6166db9b11dcfe0ebd4f6e9c09c22bd100c7564b8886b09eddac4b0f3b4fe1fe6a9a18c5fd3ce5a936f6bdbe81e370e0f5d73041f1c67a31", 0x73}, {&(0x7f00000005c0)="8717aa27f60687b73aa0", 0xa}, {&(0x7f0000000600)="12ac215cb8664206a230cc4a7e37ab7f894dcdd26ad19085fb06f9d8500009d038affc6f7165085080939715013625", 0x2f}, {&(0x7f0000000640)="264db0eca4345b41ee80719188f6224ecd83a39568a9a44b15f7eddc0b114134e17cfce5337d75fad512ad4b1f073bd861c31f17e9eda4e780f13d044ca2c78f05bb807a369575f9c07c139bdffa98ba7880e0fc7a1ded20d571a21871cbf1bef720be3fa3c436a6310d8a4329d26073411ea4bd5761f7", 0x77}, {&(0x7f00000006c0)="da9f4dfac4cf9d88343be6272db9be95c2c41790f13d77e844c6914d5d67a26e84dbcbccd1b983ff557e97d25494da91ced442f40b3a56946b644984b490de776cb107ed55253179a3d6009eebd6dad205bdd8c9b0795096a19b3aa9f318a407b402693000b9a0a033ee1d09fbe00e975a79ce70c328a061c996e034925cd68db8aeeef82333b32f251659dcaf7cc7e52c57b3408b7e590fc6542167fc0710a2c106d7b5ec22d2645d3cf24cf955c7c16e04ff8d47a2d859cb70fde51d0a26bc547d41246267ecffebd0032b360297e54341aa017ec36a8e9911e031288c2f69c995547b6572fae8b78b3eb9970c8a70c7fe4f715dce670e", 0xf8}, {&(0x7f00000007c0)="9ed94e35c5db785fb565aa833656b682419625e4a172d2c8f2484fe7af5cdf3991252138f4a0abf5c8ac2b21d97277b32ff595661584", 0x36}], 0x8, 0x0, 0x0, 0x801}, 0x4) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa5, 0x0, 0x4) [ 1995.362725] Process accounting paused 03:22:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x9, 0x0, 0x1) write(r0, &(0x7f00000000c0)="a7bd32baea9804fa3958878a13b40cbca1903244344849b17d29ba5675e511c05d09f9414b3d180660ec70eedee15d01c903", 0x32) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="000a000100000000fe8000000000000000000000000000bbff010000000000000000000000000001fc02000000000000000000000700000000000000000000000000ffffe0000001fe8000000000000000000000000000aa"], 0x58) read(r0, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa6, 0x0, 0x4) 03:22:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000040)='\x00', &(0x7f00000000c0)='@\x00', &(0x7f0000000100)=']\x00', &(0x7f0000000140)=')&\x00'], &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)=':])(,\x00', &(0x7f0000000240)='@\xaf&+/[\x00', &(0x7f0000000280)='/-2-\xf1}]!(', &(0x7f00000002c0)='\x00'], 0x100) read(0xffffffffffffffff, 0x0, 0x0) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa6, 0x0, 0x4) 03:22:04 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000900)={&(0x7f00000007c0)={0x140, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xf0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffd0}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '&\',\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'B+*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xa2{'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xf8\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c0) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000000)=@hci, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/225, 0xe1}, {&(0x7f00000001c0)=""/69, 0x45}, {&(0x7f0000000240)=""/188, 0xbc}, {&(0x7f0000000300)=""/95, 0x5f}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/94, 0x5e}], 0x6, &(0x7f0000000540)=""/239, 0xef}, 0x100) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000680), &(0x7f00000006c0)=0x4) 03:22:04 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x95, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa7, 0x0, 0x4) 03:22:04 executing program 4: waitid(0x2, 0xffffffffffffffff, &(0x7f0000000180), 0x2, &(0x7f00000000c0)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:22:04 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x18, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:04 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000000)={0x0, 0x5, 0x20}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x85) read(r0, &(0x7f0000000000), 0xfffffdef) 03:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa8, 0x0, 0x4) 03:22:16 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x19, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa9, 0x0, 0x4) 03:22:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x180) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file0\x00'}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x7, 0x4) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0xd62, 0x9d, 0x1, 0x2, 0x8}) 03:22:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa7, 0x0, 0x4) 03:22:16 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00', @ANYRES32=r2, @ANYBLOB='3\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {r3}}, './file0\x00'}) fadvise64(r2, 0x0, 0x2, 0x1) 03:22:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x96, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:16 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = getuid() r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fgetxattr(r2, &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f00000000c0)=""/14, 0xe) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xffffffffffffffff, 0x400) r3 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r3, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000100)) 03:22:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x80001, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x101) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r2, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(r2, r1, &(0x7f0000000080)=0x3, 0x7f) 03:22:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x5) read(r0, &(0x7f0000000000), 0xfffffdef) read(0xffffffffffffffff, 0x0, 0x0) 03:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) sendfile(r1, r0, &(0x7f0000000040)=0x40, 0x55) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0700000000000000db00000000000000040000000a140000020000000000000001000000000000008100000000000000000800000000000000009058000000000000000000000000000000000000000006000000000000000400000000000000040000000000000000000000000000000000000000000000800100"/144]) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f00000001c0)='\x00', 0x0, r0) 03:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa8, 0x0, 0x4) 03:22:30 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1a, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) 03:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xaa, 0x0, 0x4) 03:22:30 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x97, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:30 executing program 0: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc800, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r2, &(0x7f0000000000), 0xfffffdef) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x114, r1, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x114}, 0x1, 0x0, 0x0, 0x4000884}, 0x8000) 03:22:30 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0xfffffdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) read(r1, &(0x7f0000000000), 0xfffffdef) move_mount(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x33) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000000c0)={0x0, 0x63, "562a62a786196e97c611132f5481e83421aa93fa71475cdd136d6f279ff99bb74032ffe2092659ee2ee2e40eb28b142834d090827519c9dbc046ebc31deaae99dc1c8eab9f47c8e7cc4dde2a7771cedfa29db71d411ec362cc5f08b392e655b2e8f06b"}) 03:22:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000000c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000010c0)=ANY=[@ANYRES64=r2, @ANYBLOB="2a931a8a3f0e02760000008000000000080000000000060000000000000000000300000000000000000001000000000000000100ffffffff05000000000001000700000000000000050000000000000009000000000000000800000000000000400000000000000200"/168]) r3 = dup2(r0, r0) fchmod(r3, 0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000040)=0x889, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000001180)='./file0\x00', 0x208000, 0xc2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000e30000000018000000", @ANYRES32=r3, @ANYBLOB="03000000050000070000000000000000"]) read(r5, &(0x7f0000000040), 0x0) 03:22:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xab, 0x0, 0x4) 03:22:30 executing program 0: keyctl$describe(0x12, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2275, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read(r0, &(0x7f0000000000), 0x0) 03:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/25, 0x19) 03:22:30 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x98, 0x656, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x7fff, 0x0, 0x0, 0x121800, 0x0) pipe2$9p(0x0, 0x4000) 03:22:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0xa9, 0x0, 0x4) 03:22:30 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x40800, 0x0) fadvise64(r0, 0x1b, 0x0, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {0x0}], 0x0, 0x0) pipe2$9p(&(0x7f0000000700), 0x0) BUG: leak checking failed VM DIAGNOSIS: 03:22:31 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff88800f5dd9e8 RCX=0000000000000001 RDX=0000000000000000 RSI=ffffffff852017a0 RDI=ffff88800f5dd9e8 RBP=ffffffff852017a0 RSP=ffff88806ce09df0 R8 =0000000000000000 R9 =ffffffff858bde97 R10=fffffbfff0b17bd2 R11=0000000000000001 R12=ffff88800f5dd040 R13=ffff88800f5dd9e8 R14=00000000ffffffff R15=ffff88800f5dd9e8 RIP=ffffffff84060d64 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe24eaa38c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055f6f58f2838 CR3=000000000cca4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 000000000000002f 002f2e2e2f002e2e YMM01=0000000000000000 0000000000000000 0000000000000000 696c61766e49002f YMM02=0000000000000000 0000000000000000 ffffffffffffff0f 0e0d0c0b0a090807 YMM03=0000000000000000 0000000000000000 696e656420737365 636341002f737973 YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 000055f6f587acd0 000055f6f58b4f70 YMM06=0000000000000000 0000000000000000 000055f6f58b4f30 00000000ffffffff YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2f63697361622f63 72732f2e2e000d0a YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000020000000 0000000020000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffff8407f190 RBX=ffff8880081a9ac0 RCX=ffffffff84061151 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000001 RSP=ffff888008207e78 R8 =0000000000000001 R9 =ffff88806cf38a13 R10=ffffed100d9e7142 R11=0000000000000001 R12=ffffed1001035358 R13=ffffffff858bde90 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff8407f19b RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fa9c46d8d58 CR3=000000001acf4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000