90f5c5219aa519081def296eacf338db7c1cece5815a36a6ad4ec6b8007", @generic="00530722f8221af9c1c380399e7d3621b05f099d5c37ccb26c8c0248a9708a5f6c878b27d550be8ef634512b99e423e58d260ef82ca534ede77e517358076b302def00a3f2e0b555c69e1192bfab69476688ab441d2a12212afcc058bec8bb8b993bb20b4ea740b1833975bf08ebf94c7be88170ae812f3c27d6", @generic="5d329f07404e1de3c98a012460d03f2063fadeb051cc245eb1b81e18ce9de008463c2081ad3c24cb568f54c45bc39c9b60d0627bea224c"]}, 0x24c4}, 0x1, 0x0, 0x0, 0x4008005}, 0x20000000) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) syz_io_uring_setup(0x554, &(0x7f0000000080)={0x0, 0xb41e, 0x2, 0x3, 0x393}, &(0x7f0000867000/0x4000)=nil, &(0x7f0000866000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) [ 785.845837] Call Trace: [ 785.846112] dump_stack+0x107/0x167 [ 785.846441] should_fail.cold+0x5/0xa [ 785.846815] ? alloc_pipe_info+0x10a/0x590 [ 785.847178] should_failslab+0x5/0x20 [ 785.847517] kmem_cache_alloc_trace+0x55/0x320 [ 785.847958] alloc_pipe_info+0x10a/0x590 [ 785.848305] ? __lock_acquire+0xbb1/0x5b00 [ 785.848721] splice_direct_to_actor+0x774/0x980 [ 785.849119] ? _cond_resched+0x12/0x80 [ 785.849450] ? inode_security+0x107/0x140 [ 785.849872] ? pipe_to_sendpage+0x380/0x380 [ 785.850259] ? avc_policy_seqno+0x9/0x70 [ 785.850656] ? selinux_file_permission+0x92/0x520 [ 785.851063] ? do_splice_to+0x160/0x160 [ 785.851404] ? security_file_permission+0xb1/0xe0 [ 785.851875] do_splice_direct+0x1c4/0x290 [ 785.852227] ? splice_direct_to_actor+0x980/0x980 [ 785.852678] ? avc_policy_seqno+0x9/0x70 [ 785.853041] ? security_file_permission+0xb1/0xe0 [ 785.853459] do_sendfile+0x553/0x11e0 [ 785.853854] ? do_pwritev+0x270/0x270 [ 785.854223] ? wait_for_completion_io+0x270/0x270 [ 785.854701] ? rcu_read_lock_any_held+0x75/0xa0 [ 785.855111] ? vfs_write+0x354/0xb10 [ 785.855435] __x64_sys_sendfile64+0x1d1/0x210 [ 785.855861] ? __ia32_sys_sendfile+0x220/0x220 [ 785.856263] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 785.856754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 785.857205] do_syscall_64+0x33/0x40 [ 785.857521] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 785.858024] RIP: 0033:0x7fb1ac5e0b19 [ 785.858354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.860002] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 785.860696] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 785.861306] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 21:01:46 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:01:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 1) 21:01:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r0, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 785.861963] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 785.862640] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 785.863236] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:01:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/65, 0x41, 0x200000049) 21:01:46 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000080)=""/220) 21:01:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 2) 21:01:46 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:01:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3f, 0x20, 0x7, 0x5d, 0x0, 0x6, 0x100, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0x281, 0x20, 0x7411f3e, 0x9, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0xff}, 0xffffffffffffffff, 0xd, r0, 0x1) pidfd_getfd(r0, r1, 0x0) 21:01:46 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = shmget(0x0, 0x2000, 0x540009d0, &(0x7f0000868000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000001380)=[{&(0x7f0000000080)="a581d6cf6cc726b9105fd791bb4c23aee3ce90c54be0eb06e24c2b54545bee7a5e67bfbe2f04e3d9a34bc1774b126db9b03bbbb1be0b0bafe9c4d24b88c64ae92b4498aa0b1fd36bb2be782fe03ba1d6df4ac1e083e2b08327db5c76fa9bf4fb16de95be5a830d809998d83bb7e092480dc7914814e04f149b6c88ce45a7c704e7f60924f4d7d02d789ef0ae4ed13b59e972971ba797eaf8c0d603e1c29ae565c9062c885d4f1dfe8f8814c5716150364438f8622a1da0b3337d05dbd054dbc15cc38c5db37bdbe3b6b763eb642c87be91233f3993ced148dfd74f373730c2a576d84c907848cbe7b5", 0xe9}, {&(0x7f0000000000)="894c8f78bcddd442fc5f154698a7303f210e5abe54afe08957cde68b644a2bbb9bb002261fa2ac040dae71ae86a3404100547da4", 0x34}, {&(0x7f0000000180)}, {&(0x7f00000001c0)='t', 0x1}, {&(0x7f00000002c0)="f8f3811cc787680e5a00b639eea5554678f4f83dc68b15a7b579063b4f46e1a20a68e14fdcf5b55671312857f11dba547b4f601f7fb220a0b8c6b03a63e7b17456b00bc56ad02bb8c841c1cf9cd7caa57071b54ccfdd55d698c892450500e1ddb6f404a33a4f264530c8c255436a6d898ed3afb865e4e842e1c3b49ec72c21f328ae727f48f9ddfc7ad02602f50292c532a65bb13c9416458cdee4ae4e67989ddb82b4320ac33adc3a74a0908bbbce151855d6", 0xb3}, {&(0x7f0000000380)="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", 0x1000}], 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 786.045024] FAULT_INJECTION: forcing a failure. [ 786.045024] name failslab, interval 1, probability 0, space 0, times 0 [ 786.046225] CPU: 0 PID: 6063 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 786.046810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.047523] Call Trace: [ 786.047754] dump_stack+0x107/0x167 [ 786.048075] should_fail.cold+0x5/0xa [ 786.048414] ? create_object.isra.0+0x3a/0xa20 [ 786.048802] should_failslab+0x5/0x20 [ 786.049125] kmem_cache_alloc+0x5b/0x310 [ 786.049484] create_object.isra.0+0x3a/0xa20 [ 786.049855] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 786.050303] kmem_cache_alloc_trace+0x151/0x320 [ 786.050714] alloc_pipe_info+0x10a/0x590 [ 786.051059] ? __lock_acquire+0xbb1/0x5b00 [ 786.051431] splice_direct_to_actor+0x774/0x980 [ 786.051831] ? _cond_resched+0x12/0x80 [ 786.052162] ? inode_security+0x107/0x140 [ 786.052522] ? pipe_to_sendpage+0x380/0x380 [ 786.052895] ? avc_policy_seqno+0x9/0x70 [ 786.053238] ? selinux_file_permission+0x92/0x520 [ 786.053655] ? do_splice_to+0x160/0x160 [ 786.054031] ? security_file_permission+0xb1/0xe0 [ 786.054446] do_splice_direct+0x1c4/0x290 [ 786.054808] ? splice_direct_to_actor+0x980/0x980 [ 786.055213] ? avc_policy_seqno+0x9/0x70 [ 786.055563] ? security_file_permission+0xb1/0xe0 [ 786.055991] do_sendfile+0x553/0x11e0 [ 786.056322] ? do_pwritev+0x270/0x270 [ 786.056646] ? wait_for_completion_io+0x270/0x270 [ 786.057065] ? rcu_read_lock_any_held+0x75/0xa0 [ 786.057457] ? vfs_write+0x354/0xb10 [ 786.057788] __x64_sys_sendfile64+0x1d1/0x210 [ 786.058191] ? __ia32_sys_sendfile+0x220/0x220 [ 786.058581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 786.059035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 786.059473] do_syscall_64+0x33/0x40 [ 786.059790] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 786.060233] RIP: 0033:0x7fb1ac5e0b19 [ 786.060551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.062120] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 786.062763] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 786.063376] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 786.063976] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 786.064579] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 786.065184] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:01:46 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:01:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:01:46 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 799.053249] FAULT_INJECTION: forcing a failure. [ 799.053249] name failslab, interval 1, probability 0, space 0, times 0 [ 799.055075] CPU: 1 PID: 6098 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 799.055714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.056456] Call Trace: [ 799.056757] dump_stack+0x107/0x167 [ 799.057115] should_fail.cold+0x5/0xa [ 799.057450] ? alloc_pipe_info+0x1e5/0x590 [ 799.057853] should_failslab+0x5/0x20 [ 799.058603] __kmalloc+0x72/0x390 [ 799.058900] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 799.059409] alloc_pipe_info+0x1e5/0x590 [ 799.059804] ? __lock_acquire+0xbb1/0x5b00 [ 799.060216] splice_direct_to_actor+0x774/0x980 [ 799.060693] ? _cond_resched+0x12/0x80 [ 799.061071] ? inode_security+0x107/0x140 [ 799.061422] ? pipe_to_sendpage+0x380/0x380 [ 799.061830] ? avc_policy_seqno+0x9/0x70 [ 799.062586] ? selinux_file_permission+0x92/0x520 [ 799.063065] ? do_splice_to+0x160/0x160 [ 799.063406] ? security_file_permission+0xb1/0xe0 [ 799.063860] do_splice_direct+0x1c4/0x290 [ 799.064255] ? splice_direct_to_actor+0x980/0x980 [ 799.064736] ? avc_policy_seqno+0x9/0x70 [ 799.065131] ? security_file_permission+0xb1/0xe0 [ 799.065593] do_sendfile+0x553/0x11e0 [ 799.065925] ? do_pwritev+0x270/0x270 [ 799.066732] ? wait_for_completion_io+0x270/0x270 [ 799.067213] ? rcu_read_lock_any_held+0x75/0xa0 [ 799.067655] ? vfs_write+0x354/0xb10 [ 799.068020] __x64_sys_sendfile64+0x1d1/0x210 [ 799.068408] ? __ia32_sys_sendfile+0x220/0x220 [ 799.068867] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 799.069356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 799.069843] do_syscall_64+0x33/0x40 [ 799.070573] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 799.071080] RIP: 0033:0x7fb1ac5e0b19 [ 799.071399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.073083] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 799.073791] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 799.074820] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 799.075799] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 799.076438] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 799.077115] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:01:59 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:01:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 3) 21:01:59 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) fstatfs(r1, &(0x7f0000000080)=""/72) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000100)="5ce332dd97be0e3967bd38", 0xb}, {&(0x7f0000000140)="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", 0xff}, {&(0x7f00000002c0)="a8d1c6a64dbdc714a5c2225632a8b51d7028a8a6b4818cbd799a17a112e6abe88e39f549d980556c0a214646cbf940279ff82e187aca797e1f66e88c0f78db709fdea67dacb68b315158db2634032fa5969b173c2905c5d16a68ddfd316ea31112fe5a0b685e4b95e9723bc884ab64de72b0ad201d408969", 0x78}, {&(0x7f0000000340)="9b12eb78aecb3b14a6c86eb2a097cf96f81229ec1a3024dca36c62162a93602ff82ff681aa7a3b4c02e50521be32d85bd17b7f4ee70db35faf60e78d169e55ba1647d940820017a22af043d02617e5e469769f1ac42c15183cbda45f46e9192853785281f48fb1b5acc59199b05bac45beff5282c094", 0x76}], 0x4, 0xff2, 0xfffffc01, 0xa) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fcntl$setsig(r3, 0xa, 0x13) 21:01:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, 0x0, 0x0, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:01:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffff, 0x7, 0xfffffffffffffffe, 0xe76, 0x600}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:01:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:01:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:01:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:01:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) close(r1) 21:01:59 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:01:59 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10080, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x5, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x7fffffff, 0x7, 0x0, 0x8, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:01:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 4) 21:01:59 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:01:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x1, [0x0]}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 799.218134] FAULT_INJECTION: forcing a failure. [ 799.218134] name failslab, interval 1, probability 0, space 0, times 0 [ 799.218149] CPU: 0 PID: 6116 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 799.218156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.218160] Call Trace: [ 799.218179] dump_stack+0x107/0x167 [ 799.218192] should_fail.cold+0x5/0xa [ 799.218205] ? create_object.isra.0+0x3a/0xa20 [ 799.218215] ? create_object.isra.0+0x3a/0xa20 [ 799.218229] should_failslab+0x5/0x20 [ 799.218242] kmem_cache_alloc+0x5b/0x310 [ 799.218251] ? create_object.isra.0+0x3ad/0xa20 [ 799.218269] create_object.isra.0+0x3a/0xa20 [ 799.218281] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 799.218294] __kmalloc_node+0x1ae/0x420 [ 799.218310] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 799.218323] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 799.218334] ? trace_hardirqs_on+0x5b/0x180 [ 799.218348] kmem_cache_alloc_trace+0x169/0x320 [ 799.218365] alloc_pipe_info+0x10a/0x590 [ 799.218377] ? __lock_acquire+0xbb1/0x5b00 [ 799.218391] splice_direct_to_actor+0x774/0x980 [ 799.218406] ? _cond_resched+0x12/0x80 [ 799.218418] ? inode_security+0x107/0x140 [ 799.218427] ? pipe_to_sendpage+0x380/0x380 [ 799.218437] ? avc_policy_seqno+0x9/0x70 [ 799.218447] ? selinux_file_permission+0x92/0x520 [ 799.218458] ? do_splice_to+0x160/0x160 [ 799.218472] ? security_file_permission+0xb1/0xe0 [ 799.218488] do_splice_direct+0x1c4/0x290 [ 799.218499] ? splice_direct_to_actor+0x980/0x980 [ 799.218509] ? avc_policy_seqno+0x9/0x70 [ 799.218525] ? security_file_permission+0xb1/0xe0 [ 799.218542] do_sendfile+0x553/0x11e0 [ 799.218561] ? do_pwritev+0x270/0x270 [ 799.218574] ? wait_for_completion_io+0x270/0x270 [ 799.218588] ? rcu_read_lock_any_held+0x75/0xa0 [ 799.218598] ? vfs_write+0x354/0xb10 [ 799.218614] __x64_sys_sendfile64+0x1d1/0x210 [ 799.218626] ? __ia32_sys_sendfile+0x220/0x220 [ 799.218640] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 799.218651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 799.218663] do_syscall_64+0x33/0x40 [ 799.218674] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 799.218682] RIP: 0033:0x7fb1ac5e0b19 [ 799.218693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.218699] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 799.218713] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 799.218719] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 799.218726] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 799.218733] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 799.218740] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 5) 21:02:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:02:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:13 executing program 1: r0 = shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x3, 0xffffffffffffff24}, 0x800, 0x0, 0x0, 0x7, 0x1, 0x80000, 0x400, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000002c0)=""/4096) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') shmdt(r0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:13 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:02:13 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, 0x0, 0x0, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:02:13 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x100000000000) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x406d02, 0x0) recvmmsg$unix(r1, &(0x7f0000000400)=[{{&(0x7f0000000100), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/54, 0x36}, {&(0x7f00000001c0)=""/115, 0x73}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB="1c00000000000000010000000200000020bdcd47310797a9edeed636b24c92a003df3d9a9918902b35e51ed9395642b07af6c36fbd19e90b1a67d9b03020b3ad30d42580bc323941b98f72dbddf0823ae3fb0ef07c961e356f2c4a6045e8b7b937409e2f149792f6dbfe1b8fe67e0e6cdb986ff7bfcc50d097c4e14ef8ed89d8df81f26f461dc651c2093dc92baefec457c4f02d6983bbdd6388a70119b31bdbae07dff63b694ae865d5b976679d35ceb1129f8ff6255b183ae158cf9c1456dfd79731473cd8a09441b44b10afa1d746425b5c5b597b02e3daa172", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000002968bd1e2eccfe90d1134e3406505c154b018c7bde9f0d8efdda126924cb677c00534c6b4dd06ff9a29653518fc1220daa04650f8a5f2567f4543e06667fad20b805556baa75b41fda6eacc9448074570b6da03959c9aab815d478e6103344489b4917d8d9ec0276d68ba35bb8f6c6e762a06c53b0c7ca8d780c20338086c7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00$\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0xe8}}], 0x1, 0x103, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000300), 0x2001, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000340)={r4, 0x7, 0x100000001, 0x1}) inotify_add_watch(r4, &(0x7f0000000380)='./file0\x00', 0x10) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x541c, &(0x7f0000000080)) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup3(r0, r6, 0x0) pread64(r5, &(0x7f0000000240)=""/77, 0x4d, 0x200000048) [ 812.414414] FAULT_INJECTION: forcing a failure. [ 812.414414] name failslab, interval 1, probability 0, space 0, times 0 [ 812.415784] CPU: 0 PID: 6137 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 812.416489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 812.417226] Call Trace: [ 812.417502] dump_stack+0x107/0x167 [ 812.417813] should_fail.cold+0x5/0xa [ 812.418187] ? __iomap_dio_rw+0x1ee/0x1110 [ 812.418632] should_failslab+0x5/0x20 [ 812.418996] kmem_cache_alloc_trace+0x55/0x320 [ 812.419446] __iomap_dio_rw+0x1ee/0x1110 [ 812.419798] ? lock_release+0x680/0x680 [ 812.420213] ? iomap_dio_bio_actor+0xef0/0xef0 [ 812.420673] ? down_read+0x10f/0x430 [ 812.421041] ? down_write+0x160/0x160 [ 812.421415] iomap_dio_rw+0x31/0x90 [ 812.421726] ext4_file_read_iter+0x2c7/0x4c0 [ 812.422149] generic_file_splice_read+0x455/0x6d0 [ 812.422626] ? pipe_to_user+0x170/0x170 [ 812.423014] ? fsnotify_perm.part.0+0x22d/0x620 [ 812.423468] ? security_file_permission+0xb1/0xe0 [ 812.423876] ? pipe_to_user+0x170/0x170 [ 812.424288] do_splice_to+0x10e/0x160 [ 812.424679] splice_direct_to_actor+0x2fe/0x980 [ 812.425122] ? pipe_to_sendpage+0x380/0x380 [ 812.425533] ? do_splice_to+0x160/0x160 [ 812.425871] ? security_file_permission+0xb1/0xe0 [ 812.426417] do_splice_direct+0x1c4/0x290 [ 812.426768] ? splice_direct_to_actor+0x980/0x980 [ 812.427222] ? avc_policy_seqno+0x9/0x70 [ 812.427624] ? security_file_permission+0xb1/0xe0 [ 812.428115] do_sendfile+0x553/0x11e0 [ 812.428517] ? do_pwritev+0x270/0x270 [ 812.428843] ? wait_for_completion_io+0x270/0x270 [ 812.429302] ? rcu_read_lock_any_held+0x75/0xa0 [ 812.429735] ? vfs_write+0x354/0xb10 21:02:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:13 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000800)=ANY=[@ANYBLOB="1c2c2e761fd0604993dff83a5df6969d4c513cc51e3b61aca6f4ce9cd2eba16b", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e2f66696c653100dba816d12e959e48b7e88a714e4188a90b4306a940929f5dcad4fce4f0bbe12fdc5012c7136aa99abe381e6007a6273a50cfa50f5f8e59555626c63e0eb3f6c70000000000000000000000c2974d730186a7cf2211af1f26aa4515c8414d821c4b8dcd0198a2069ea081d4472bb9990a0a25b23df8ae3973b4d632bcd82f9438f73424f9983f2bffe918371cb22912e28826ea807ee2cec1de6642e64ce807561e2931f2c8ea44b718fcdcbd0beac6fa76638e1afdc7b7d687da1f3a6173795169896e45aed92220f5c9404ba7"]) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x2000, 0x77baea28dc8b509d, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) r2 = syz_open_dev$vcsn(0x0, 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x80001, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000040), 0x5, 0x4001c0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x110, r4, 0x8000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000002480), 0x800, 0x0) ioctl$CDROMREADAUDIO(r5, 0x530e, &(0x7f0000000ac0)={@msf, 0x1, 0x1, &(0x7f0000000a80)=""/1}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x801d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x65, 0x0, 0x0, @uid=r1}]}, 0x1c}}, 0x0) [ 812.430106] __x64_sys_sendfile64+0x1d1/0x210 [ 812.430544] ? __ia32_sys_sendfile+0x220/0x220 [ 812.430933] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 812.431558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 812.432069] do_syscall_64+0x33/0x40 [ 812.432465] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 812.432895] RIP: 0033:0x7fb1ac5e0b19 [ 812.433254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.435235] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 812.435915] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 812.436649] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 812.437290] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 812.437926] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 812.438642] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 6) 21:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 812.530477] FAULT_INJECTION: forcing a failure. [ 812.530477] name failslab, interval 1, probability 0, space 0, times 0 [ 812.531522] CPU: 0 PID: 6153 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 812.532168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 812.532856] Call Trace: [ 812.533375] dump_stack+0x107/0x167 [ 812.533686] should_fail.cold+0x5/0xa [ 812.534067] ? create_object.isra.0+0x3a/0xa20 [ 812.534499] should_failslab+0x5/0x20 [ 812.534830] kmem_cache_alloc+0x5b/0x310 [ 812.535225] create_object.isra.0+0x3a/0xa20 [ 812.535605] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 812.536109] kmem_cache_alloc_trace+0x151/0x320 [ 812.536512] __iomap_dio_rw+0x1ee/0x1110 [ 812.536863] ? lock_release+0x680/0x680 [ 812.537258] ? iomap_dio_bio_actor+0xef0/0xef0 [ 812.537656] ? down_read+0x10f/0x430 [ 812.538029] ? down_write+0x160/0x160 [ 812.538376] iomap_dio_rw+0x31/0x90 [ 812.538693] ext4_file_read_iter+0x2c7/0x4c0 [ 812.539115] generic_file_splice_read+0x455/0x6d0 [ 812.539525] ? pipe_to_user+0x170/0x170 [ 812.539874] ? fsnotify_perm.part.0+0x22d/0x620 [ 812.540346] ? security_file_permission+0xb1/0xe0 [ 812.540761] ? pipe_to_user+0x170/0x170 [ 812.541152] do_splice_to+0x10e/0x160 [ 812.541483] splice_direct_to_actor+0x2fe/0x980 [ 812.541883] ? pipe_to_sendpage+0x380/0x380 [ 812.542311] ? do_splice_to+0x160/0x160 [ 812.542687] ? security_file_permission+0xb1/0xe0 [ 812.543151] do_splice_direct+0x1c4/0x290 [ 812.543507] ? splice_direct_to_actor+0x980/0x980 [ 812.543914] ? avc_policy_seqno+0x9/0x70 [ 812.544338] ? security_file_permission+0xb1/0xe0 [ 812.544760] do_sendfile+0x553/0x11e0 [ 812.545144] ? do_pwritev+0x270/0x270 [ 812.545478] ? wait_for_completion_io+0x270/0x270 [ 812.545895] ? rcu_read_lock_any_held+0x75/0xa0 [ 812.546353] ? vfs_write+0x354/0xb10 [ 812.546680] __x64_sys_sendfile64+0x1d1/0x210 [ 812.547114] ? __ia32_sys_sendfile+0x220/0x220 [ 812.547512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 812.548026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 812.548480] do_syscall_64+0x33/0x40 [ 812.548815] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 812.549302] RIP: 0033:0x7fb1ac5e0b19 [ 812.549619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.551296] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 812.551944] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 812.552609] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 812.553249] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 812.553845] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 812.554512] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, 0x0, 0x0, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x23d, 0x4, 0xffff}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, 0x0, 0x0, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, 0x0, 0x0, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 825.591263] FAULT_INJECTION: forcing a failure. [ 825.591263] name failslab, interval 1, probability 0, space 0, times 0 [ 825.592627] CPU: 0 PID: 6188 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 825.593198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 825.593903] Call Trace: [ 825.594137] dump_stack+0x107/0x167 [ 825.594453] should_fail.cold+0x5/0xa [ 825.594798] ? mempool_alloc+0x148/0x360 [ 825.595145] ? mempool_free_pages+0x20/0x20 [ 825.595515] should_failslab+0x5/0x20 [ 825.595844] kmem_cache_alloc+0x5b/0x310 [ 825.596192] ? mempool_free_pages+0x20/0x20 [ 825.596559] mempool_alloc+0x148/0x360 [ 825.596895] ? mempool_resize+0x7d0/0x7d0 [ 825.597250] ? lock_downgrade+0x6d0/0x6d0 [ 825.597604] ? ext4_map_blocks+0x87c/0x1910 [ 825.597989] bio_alloc_bioset+0x36e/0x600 [ 825.598344] ? bvec_alloc+0x2f0/0x2f0 [ 825.598687] ? iov_iter_npages+0x1fd/0xa70 [ 825.599056] iomap_dio_bio_actor+0x518/0xef0 [ 825.599444] iomap_dio_actor+0x36f/0x560 [ 825.599799] iomap_apply+0x289/0x810 [ 825.600119] ? iomap_dio_rw+0x90/0x90 [ 825.600448] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 825.600941] ? delete_from_page_cache_batch+0xa30/0xa30 [ 825.601393] ? mark_held_locks+0x9e/0xe0 [ 825.601750] ? filemap_check_errors+0xa5/0x150 [ 825.602143] __iomap_dio_rw+0x6cd/0x1110 [ 825.602498] ? iomap_dio_rw+0x90/0x90 [ 825.602845] ? iomap_dio_bio_actor+0xef0/0xef0 [ 825.603240] ? down_read+0x10f/0x430 [ 825.603555] ? down_write+0x160/0x160 [ 825.603881] iomap_dio_rw+0x31/0x90 [ 825.604191] ext4_file_read_iter+0x2c7/0x4c0 [ 825.604569] generic_file_splice_read+0x455/0x6d0 [ 825.604973] ? pipe_to_user+0x170/0x170 [ 825.605317] ? fsnotify_perm.part.0+0x22d/0x620 [ 825.605714] ? security_file_permission+0xb1/0xe0 [ 825.606120] ? pipe_to_user+0x170/0x170 [ 825.606457] do_splice_to+0x10e/0x160 [ 825.607198] splice_direct_to_actor+0x2fe/0x980 [ 825.607592] ? pipe_to_sendpage+0x380/0x380 [ 825.607959] ? do_splice_to+0x160/0x160 [ 825.608294] ? security_file_permission+0xb1/0xe0 [ 825.608709] do_splice_direct+0x1c4/0x290 [ 825.609058] ? splice_direct_to_actor+0x980/0x980 [ 825.609461] ? avc_policy_seqno+0x9/0x70 [ 825.609808] ? security_file_permission+0xb1/0xe0 [ 825.610223] do_sendfile+0x553/0x11e0 [ 825.610564] ? do_pwritev+0x270/0x270 [ 825.610937] ? wait_for_completion_io+0x270/0x270 [ 825.611346] ? rcu_read_lock_any_held+0x75/0xa0 [ 825.611735] ? vfs_write+0x354/0xb10 [ 825.612055] __x64_sys_sendfile64+0x1d1/0x210 [ 825.612434] ? __ia32_sys_sendfile+0x220/0x220 [ 825.612822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 825.613260] ? syscall_enter_from_user_mode+0x1d/0x50 [ 825.613694] do_syscall_64+0x33/0x40 [ 825.614008] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 825.614437] RIP: 0033:0x7fb1ac5e0b19 [ 825.614781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.626565] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 825.627201] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 825.627794] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 825.628391] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 825.628984] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 825.629578] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 7) 21:02:26 executing program 1: sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x90, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x4709}, {0x8, 0x13, 0xffff}, {0x5, 0x14, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x5}, {0x8, 0x13, 0x10}, {0x5}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000841) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) sendmsg$NL80211_CMD_SET_PMK(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x30, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "5cc7234d2768e718aae433b3f2b24393"}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000084}, 0x20000001) r0 = shmget(0x1, 0x1000, 0x200, &(0x7f0000866000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/19) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xfffffffffffffffe}, 0x1220, 0x0, 0x3f, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x24, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {}, {0x8, 0x11, 0x1}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) openat$sr(0xffffffffffffff9c, &(0x7f0000001640), 0x10080, 0x0) sendmsg$nl_generic(r3, &(0x7f0000001600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000015c0)={&(0x7f00000012c0)={0x1d0, 0x3a, 0x400, 0x70bd2a, 0x25dfdbfc, {0x11}, [@nested={0x14, 0x3b, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @u32=0xffffffff}, @typed={0x8, 0x5, 0x0, 0x0, @fd=r2}]}, @nested={0x19b, 0x17, 0x0, 0x1, [@typed={0xe, 0x58, 0x0, 0x0, @str='netdevsim\x00'}, @generic="208a19ecdb6c307c38efbee7f8d3b4e9229f320dc39186a43553718ad3771e3a18415eb8cc0da78cb0428f5531c2c0a3d136f42a766694d9e01323ae9c06853f6b0a05cb25d2be09fbbef46906d6cdc5ccd772d3f53948a7b6fbd7963b0b864e233ae6a5058d0a19eb401f88605cfb9eaa", @generic="075f13162fc14470afe6fb210a87babfeec53e50e374d9eccf87e37a158e6c3a66dcc6a94edebc345d8c747735e885e0467a6bcb89b7744716d0027d4bb70be3cee1ca8651e3b19633794d6513c663", @typed={0x4, 0x7a}, @typed={0x8, 0x33, 0x0, 0x0, @ipv4=@remote}, @generic="9dec88a2b70556e8bc9cd9b3d30991f578deb0d9e72dd1eee88a6f88017aea9355ce5b155c76b6deccbd62757dd2d06be1d8a9aa0917d55b4122f957e38a9692a1ec13f6df05382fc404ecb634b837c1fac24d48634e3b6bffd456d64cfcdddb66d7601bc7248db654579e03e1bb37efc3845bfe0d493c62f51ec63bcb65e2d8cb0130f8398d893c2a87da8af7c56c03a890f2b82ebfedce0c760ac300883f56577a63a3e1f74e9cfd975081bdfa43c5b3de06655056c62df89dd4"]}, @typed={0xc, 0x1a, 0x0, 0x0, @u64=0x8}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000090) r4 = epoll_create(0x6) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f00000002c0)={{r4}, "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"}) 21:02:26 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:02:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, 0x0, 0x0, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x4, 0xff, 0x7, 0x0, 0xff, 0x467f9420aedbb5b4, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x7fffffff, 0x401}, 0x1000, 0xfffffffffffffff9, 0x1, 0x0, 0x9, 0x4, 0x5, 0x0, 0x40, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup3(r2, 0xffffffffffffffff, 0x80000) 21:02:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x5, 0x200}, 0x0, 0x400, 0xffffffff, 0x3, 0x0, 0x6, 0x400, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1008, 0x204, 0x502}) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x9, 0x1, 0x1, 0xb3, 0x0, 0x8, 0x4000, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x7ff, 0x80000000}, 0x19406bc6841e84f6, 0x6, 0x5, 0x6, 0x10001, 0x4e, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffb2}, 0x0, 0x5, r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:02:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:02:26 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup2(r0, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$KDSETLED(r1, 0x4b32, 0x10003) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 8) 21:02:26 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 825.913397] FAULT_INJECTION: forcing a failure. [ 825.913397] name failslab, interval 1, probability 0, space 0, times 0 [ 825.913444] CPU: 0 PID: 6221 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 825.913452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 825.913458] Call Trace: [ 825.913477] dump_stack+0x107/0x167 [ 825.913492] should_fail.cold+0x5/0xa 21:02:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r2, 0x9f79, 0x80000000, 0x200, 0x101}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 825.913510] ? create_object.isra.0+0x3a/0xa20 [ 825.913526] should_failslab+0x5/0x20 [ 825.913546] kmem_cache_alloc+0x5b/0x310 21:02:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) [ 825.913566] create_object.isra.0+0x3a/0xa20 [ 825.913580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 825.913599] kmem_cache_alloc_trace+0x151/0x320 [ 825.913622] __iomap_dio_rw+0x1ee/0x1110 [ 825.913643] ? lock_release+0x680/0x680 [ 825.913665] ? iomap_dio_bio_actor+0xef0/0xef0 21:02:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:02:26 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@l2={0x1f, 0x0, @none}, &(0x7f0000000000)=0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000000c0)={0x38, r2, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth0_vlan\x00'}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80080080}, 0xc, &(0x7f00000005c0)={&(0x7f0000000380)={0x204, r2, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xef, 0x2a, [@random={0x2, 0xbd, "7767c34517842371ae7d8bc2b1bee86fd9b427f9bc6f301172902fbd544481b6d7601842dd5a3b3321fc9317e34d1911baa99026073c91fba1e56e4e8962969b53bd04e13a9780f9710b588389257cda33ddee26e48273203176bac9e5c47599ccf6b0663cd0ded94a8b500d9e0a8aaa0e0025e4ee50f4a6d91935fd76aa1c1cd50082912b4376c49c1f52990871f3e83be9fdb34df89a1e6ff46d0f7b96c963f7a19952d7472cc42204f3948179f64f23bfd8a273082d49c8d3d80552"}, @channel_switch={0x25, 0x3, {0x1, 0x8}}, @sec_chan_ofs={0x3e, 0x1, 0x2}, @mesh_chsw={0x76, 0x6, {0x9, 0x8, 0x32, 0x2}}, @ht={0x2d, 0x1a, {0x1000, 0x3, 0x4, 0x0, {0x1, 0x99e, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3}, 0x800, 0x3, 0x1}}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1c}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x2203}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x1, 0x1}}, @NL80211_ATTR_SCAN_SSIDS={0x64, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x20, 0x0, @random="04e8c37c539608e752ae7741e1323b82369ccd972d97352858f7dcb9"}, {0x13, 0x0, @random="9b921c7b736a71e25970871096bc71"}, {0x5, 0x0, @random="97"}]}, @NL80211_ATTR_SCAN_SSIDS={0x60, 0x2d, 0x0, 0x1, [{0x1e, 0x0, @random="ed2a546be26d35ef7d011075d3e0b854efb417e2befdc87f9012"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0x24, 0x2c, 0x0, 0x1, [{0x8}, {0x8, 0x0, 0x1}, {0x8, 0x0, 0xffffffff}, {0x8, 0x0, 0x9}]}]}, 0x204}, 0x1, 0x0, 0x0, 0xd0}, 0x40) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [0x7ff, 0xffffffffffffff02, 0x2, 0x8001, 0x9, 0x100000001], 0x9, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x108) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x40000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 825.913691] ? down_read+0x10f/0x430 [ 825.913706] ? down_write+0x160/0x160 [ 825.913725] iomap_dio_rw+0x31/0x90 [ 825.913744] ext4_file_read_iter+0x2c7/0x4c0 [ 825.913763] generic_file_splice_read+0x455/0x6d0 [ 825.913778] ? pipe_to_user+0x170/0x170 [ 825.913802] ? fsnotify_perm.part.0+0x22d/0x620 [ 825.913822] ? security_file_permission+0xb1/0xe0 [ 825.913837] ? pipe_to_user+0x170/0x170 [ 825.913852] do_splice_to+0x10e/0x160 [ 825.913868] splice_direct_to_actor+0x2fe/0x980 [ 825.913888] ? pipe_to_sendpage+0x380/0x380 [ 825.913905] ? do_splice_to+0x160/0x160 [ 825.913922] ? security_file_permission+0xb1/0xe0 [ 825.913942] do_splice_direct+0x1c4/0x290 [ 825.913958] ? splice_direct_to_actor+0x980/0x980 [ 825.913970] ? avc_policy_seqno+0x9/0x70 [ 825.913992] ? security_file_permission+0xb1/0xe0 [ 825.914015] do_sendfile+0x553/0x11e0 [ 825.914040] ? do_pwritev+0x270/0x270 [ 825.914057] ? wait_for_completion_io+0x270/0x270 [ 825.914074] ? rcu_read_lock_any_held+0x75/0xa0 [ 825.914087] ? vfs_write+0x354/0xb10 [ 825.914108] __x64_sys_sendfile64+0x1d1/0x210 [ 825.914125] ? __ia32_sys_sendfile+0x220/0x220 [ 825.914143] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 825.914157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 825.914174] do_syscall_64+0x33/0x40 [ 825.914188] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 825.914199] RIP: 0033:0x7fb1ac5e0b19 [ 825.914214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.914223] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 825.914240] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 825.914249] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 825.914257] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 825.914266] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 825.914275] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 9) 21:02:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:02:40 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) 21:02:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:02:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="0b0000000100000018499008eb62c37620f24f71afd27d2e241bfd5e191dfb9cd6f75c67fd6d39c0b29676c06c8dbf8493688db64f54fb54eea33a204e8180c30817f899eddd6262d497ffe0dca831029a003e5585043f4c1f48acad9794068985b08b4cc0e93863c2d6782c63abfc04bab766a7f35f13626a8c1f5aa54dc79e0c63e873b7cdd5d0c8ffc3d85f1d70a28e5e8de0515ab8266e7b6df848211fef", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:40 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) copy_file_range(r0, 0x0, r1, &(0x7f0000000000)=0xffffffff, 0x1, 0x0) fork() r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180), &(0x7f00000001c0)={'L+', 0x8}, 0x16, 0x1) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x20000004a) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000100), 0x810af95d0c54b9c2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r3, 0x80089419, &(0x7f0000000140)) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x3, 0x4, 0x6, 0x3f, 0x0, 0x3f, 0x801, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x100000001, 0xff7}, 0x4, 0x403, 0x10001, 0x2, 0x2489, 0x7ffffffc, 0x7ff, 0x0, 0x8, 0x0, 0x8}, 0xffffffffffffffff, 0xd, r2, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r4, 0xc400941d, &(0x7f00000002c0)={0x0, 0x1, 0x2, 0x1}) 21:02:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='net/route\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 839.381149] FAULT_INJECTION: forcing a failure. [ 839.381149] name failslab, interval 1, probability 0, space 0, times 0 [ 839.381163] CPU: 0 PID: 6267 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 839.381170] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 839.381174] Call Trace: [ 839.381194] dump_stack+0x107/0x167 [ 839.381207] should_fail.cold+0x5/0xa [ 839.381222] ? bvec_alloc+0x148/0x2f0 [ 839.381238] should_failslab+0x5/0x20 [ 839.381255] kmem_cache_alloc+0x5b/0x310 [ 839.381269] bvec_alloc+0x148/0x2f0 [ 839.381283] bio_alloc_bioset+0x40a/0x600 [ 839.381296] ? bvec_alloc+0x2f0/0x2f0 [ 839.381311] ? iov_iter_npages+0x1fd/0xa70 21:02:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 839.381328] iomap_dio_bio_actor+0x518/0xef0 [ 839.381351] iomap_dio_actor+0x36f/0x560 [ 839.381367] iomap_apply+0x289/0x810 [ 839.381379] ? iomap_dio_rw+0x90/0x90 [ 839.381393] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 839.381412] ? delete_from_page_cache_batch+0xa30/0xa30 [ 839.381425] ? mark_held_locks+0x9e/0xe0 [ 839.381444] ? filemap_check_errors+0xa5/0x150 [ 839.381459] __iomap_dio_rw+0x6cd/0x1110 [ 839.381470] ? iomap_dio_rw+0x90/0x90 [ 839.381492] ? iomap_dio_bio_actor+0xef0/0xef0 [ 839.381512] ? down_read+0x10f/0x430 [ 839.381525] ? down_write+0x160/0x160 [ 839.381541] iomap_dio_rw+0x31/0x90 [ 839.381556] ext4_file_read_iter+0x2c7/0x4c0 [ 839.381572] generic_file_splice_read+0x455/0x6d0 [ 839.381584] ? pipe_to_user+0x170/0x170 [ 839.381603] ? fsnotify_perm.part.0+0x22d/0x620 [ 839.381620] ? security_file_permission+0xb1/0xe0 [ 839.381632] ? pipe_to_user+0x170/0x170 [ 839.381645] do_splice_to+0x10e/0x160 [ 839.381658] splice_direct_to_actor+0x2fe/0x980 [ 839.381673] ? pipe_to_sendpage+0x380/0x380 [ 839.381688] ? do_splice_to+0x160/0x160 [ 839.381701] ? security_file_permission+0xb1/0xe0 [ 839.381718] do_splice_direct+0x1c4/0x290 [ 839.381729] ? splice_direct_to_actor+0x980/0x980 [ 839.381740] ? avc_policy_seqno+0x9/0x70 [ 839.381757] ? security_file_permission+0xb1/0xe0 [ 839.381775] do_sendfile+0x553/0x11e0 [ 839.381794] ? do_pwritev+0x270/0x270 [ 839.381807] ? wait_for_completion_io+0x270/0x270 [ 839.381821] ? rcu_read_lock_any_held+0x75/0xa0 [ 839.381831] ? vfs_write+0x354/0xb10 [ 839.381847] __x64_sys_sendfile64+0x1d1/0x210 [ 839.381860] ? __ia32_sys_sendfile+0x220/0x220 [ 839.381875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 839.381886] ? syscall_enter_from_user_mode+0x1d/0x50 [ 839.381899] do_syscall_64+0x33/0x40 [ 839.381910] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 839.381918] RIP: 0033:0x7fb1ac5e0b19 [ 839.381930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 839.381936] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 839.381950] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 839.381957] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 839.381963] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 839.381970] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 839.381977] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 852.429163] FAULT_INJECTION: forcing a failure. [ 852.429163] name failslab, interval 1, probability 0, space 0, times 0 [ 852.430216] CPU: 0 PID: 6291 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 852.430822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.431580] Call Trace: [ 852.431828] dump_stack+0x107/0x167 [ 852.432166] should_fail.cold+0x5/0xa [ 852.432520] ? kmem_cache_alloc+0x2a6/0x310 [ 852.432919] ? create_object.isra.0+0x3a/0xa20 [ 852.433346] should_failslab+0x5/0x20 [ 852.433698] kmem_cache_alloc+0x5b/0x310 [ 852.434075] ? mempool_alloc+0x155/0x360 [ 852.434562] create_object.isra.0+0x3a/0xa20 [ 852.434579] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 852.434598] kmem_cache_alloc+0x159/0x310 [ 852.434620] bvec_alloc+0x148/0x2f0 [ 852.434637] bio_alloc_bioset+0x40a/0x600 21:02:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0xce66cdd0b7627f54, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000200)={0x5, 0xff, 0xfff7}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100), &(0x7f0000000140)=ANY=[@ANYBLOB="00fb5501096b3201cdbd4c85acdad0844371a8497bf80a9423c6c8e55c1afcdeda478aacf54e0f8c934f13d509e6e500000000000000974b64eb504640499a29333209e3b9c83f9bb95c00d5f7"], 0x55, 0x4) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x149c02, 0x0) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000080)={0xfcc, 0x6, 0x4278}) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:53 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 10) 21:02:53 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:02:53 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:53 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r2, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0xc054, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r0, r4, &(0x7f0000000540)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@ax25={{0x3, @null, 0x3}, [@default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @null, @null, @null]}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="a6ea7dc7bc45baa88af250c90b9777fd74d2d4108232265a7f169fb3f7342c08bc2a94a8b652ed9633f172e673c3d180", 0x30}, {&(0x7f0000000180)="337e03786c5dc0f12407a8328caa4a5bfc2ef10e43ab2f3232b80f4f110633679b8f2c3ee48d8cd61b78001011235f0f9e223abc470542d31a79a1332c4be506ee7560791c53b58e8d07078930e2dbf49a734220ae171c642b8d82588ed8af4ad42dea2435b8559681ad547e3ae14dde936337d88afc7a0a8a8da8385621dca989bfe221120a0edf93b94cb4315ee89f49e2ffb8bb20b47a387c8f6c23a35bfac8d2", 0xa2}], 0x2, &(0x7f0000000300)=[{0x38, 0x114, 0xfffffff9, "07cd5a32db58e339b90f136f4d8148a04931c2a0a868fa0b46669514d698a8589efb1b4ec1"}, {0xe8, 0x117, 0x8, "c80e45db0b4752b264c5720fd8a332b379e5c0e3bd615309ec537e6f6b439a00df5b9c8415738d2870a4cdb9e25c0f84c24c8e76d37b689fee7dbda5923469a41ecec4739cde59aea13be910a3ca6ab9d85c40095f9e66b46abd79b55f362728e95b683ac395290a4cd9b18b669ce8c3ac09c682d9b5be8ca283953f3536998bc4df4b12b86ff922d9a40b7a294bc9453aedc1312e3720105c6d44fd6c396891b230ca1e2efcb00e5317a2a64c2a686bcfd3fc4393077df1aa779a6154494a292c07e30b4cc454893733a5ad72f388660b6194b35e58"}, {0xe0, 0x3a, 0x2, "edae3fb4fcacd4ee9b3d577cdbcbe699192cf2578fe7bf3b1c8e63ae2846ab04d3af0e2a2d3591f9dab51137dd6dfbe695f75898bcc27aacbcc9b55c9893a4a77f1553283a155e552eae0be29e90ce07603af744ef2bf5299d66fa01ed35c5d3844b05301207ac0f896b447aeb4cddf3976e98d00b13dccd80754b6b43c924e9cf7810373d8ca723defe6630074dcc5a1a5b42dbfe9515b046ef0c2f8edf0845849e2ece2b0c4268d6fe80c331447944bbf71204210781005640409aa7672f56d1110839323e48436f6c0b66"}], 0x200}, 0x0, 0x4040000}, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000000), &(0x7f0000000080)={'L+', 0x5}, 0x16, 0x1) 21:02:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:02:53 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140), 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:02:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) [ 852.434654] ? bvec_alloc+0x2f0/0x2f0 [ 852.434673] ? iov_iter_npages+0x1fd/0xa70 [ 852.434695] iomap_dio_bio_actor+0x518/0xef0 [ 852.434724] iomap_dio_actor+0x36f/0x560 [ 852.434745] iomap_apply+0x289/0x810 [ 852.434759] ? iomap_dio_rw+0x90/0x90 [ 852.434777] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 852.434798] ? delete_from_page_cache_batch+0xa30/0xa30 [ 852.434813] ? mark_held_locks+0x9e/0xe0 21:02:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 852.434838] ? filemap_check_errors+0xa5/0x150 [ 852.434856] __iomap_dio_rw+0x6cd/0x1110 [ 852.434878] ? iomap_dio_rw+0x90/0x90 [ 852.434908] ? iomap_dio_bio_actor+0xef0/0xef0 [ 852.434933] ? down_read+0x10f/0x430 [ 852.434948] ? down_write+0x160/0x160 [ 852.434968] iomap_dio_rw+0x31/0x90 [ 852.434985] ext4_file_read_iter+0x2c7/0x4c0 [ 852.435003] generic_file_splice_read+0x455/0x6d0 21:02:53 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x1040, 0x0, 0x0, 0x7, 0x8000, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x81, 0xe8, 0x6, 0x21, @private2, @local, 0x40, 0x7, 0x4, 0xfffffffe}}) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r0, 0x80, &(0x7f0000000100)=@ll={0x11, 0x6, r4, 0x1, 0xf7, 0x6, @local}, 0x0, 0x0, 0x1, {0x0, r5}}, 0x800) [ 852.435019] ? pipe_to_user+0x170/0x170 [ 852.435041] ? fsnotify_perm.part.0+0x22d/0x620 [ 852.435061] ? security_file_permission+0xb1/0xe0 [ 852.435077] ? pipe_to_user+0x170/0x170 [ 852.435092] do_splice_to+0x10e/0x160 [ 852.435110] splice_direct_to_actor+0x2fe/0x980 [ 852.435128] ? pipe_to_sendpage+0x380/0x380 [ 852.435145] ? do_splice_to+0x160/0x160 [ 852.435161] ? security_file_permission+0xb1/0xe0 [ 852.435182] do_splice_direct+0x1c4/0x290 [ 852.435197] ? splice_direct_to_actor+0x980/0x980 [ 852.435210] ? avc_policy_seqno+0x9/0x70 [ 852.435230] ? security_file_permission+0xb1/0xe0 21:02:53 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = fsmount(r1, 0x1, 0x4) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0xff, 0x5, 0xe3, 0x0, 0xfff, 0x2, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x7}, 0x42050, 0x6, 0x80000001, 0x7, 0x7, 0x7fffffff, 0x7, 0x0, 0x1, 0x0, 0xa7c}, 0x0, 0xc, r0, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_RM_DEV(r4, 0x5000940b, &(0x7f00000002c0)={{r0}, "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"}) sendfile(r2, r3, &(0x7f0000000000)=0x8, 0x1e98c0000000000) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 852.435253] do_sendfile+0x553/0x11e0 [ 852.435277] ? do_pwritev+0x270/0x270 [ 852.435295] ? wait_for_completion_io+0x270/0x270 [ 852.435313] ? rcu_read_lock_any_held+0x75/0xa0 [ 852.435324] ? vfs_write+0x354/0xb10 [ 852.435346] __x64_sys_sendfile64+0x1d1/0x210 [ 852.435361] ? __ia32_sys_sendfile+0x220/0x220 [ 852.435380] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.435394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.435410] do_syscall_64+0x33/0x40 [ 852.435424] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.435434] RIP: 0033:0x7fb1ac5e0b19 [ 852.435448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.435456] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 852.435472] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 852.435480] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 852.435489] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 852.435497] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 852.435505] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:02:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) getsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000340)=""/148, &(0x7f0000000400)=0x94) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) close(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000300)={0x2, 'nr0\x00', {0x7}, 0x4}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r2) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x88, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000004}, 0x4008010) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/74) 21:02:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x3, 0xffffffff, 0x3, 0x0, 0x0, 0x400, 0x0, 0x3c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:02:53 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000002c0)={0x5, "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"}) 21:02:53 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:02:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 11) 21:03:07 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:03:07 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/45) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000100)=""/194) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) 21:03:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x207, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:07 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:03:07 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 866.941742] FAULT_INJECTION: forcing a failure. [ 866.941742] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 866.942841] CPU: 0 PID: 6341 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 866.943482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.944200] Call Trace: [ 866.944441] dump_stack+0x107/0x167 [ 866.944763] should_fail.cold+0x5/0xa [ 866.945101] __alloc_pages_nodemask+0x182/0x600 [ 866.945500] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 866.945998] ? do_syscall_64+0x33/0x40 [ 866.946340] ? __unwind_start+0x523/0x7e0 [ 866.946700] alloc_pages_current+0x187/0x280 [ 866.947071] ? lock_acquire+0x197/0x470 [ 866.947421] push_pipe+0x2b5/0x6d0 [ 866.947729] iov_iter_get_pages+0x6b4/0xf40 [ 866.948098] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 866.948523] bio_iov_iter_get_pages+0x22a/0x1200 [ 866.948925] ? bvec_alloc+0x17e/0x2f0 [ 866.949248] ? bio_alloc_bioset+0x2a1/0x600 [ 866.949611] ? bio_add_pc_page+0x100/0x100 [ 866.949971] ? bvec_alloc+0x210/0x2f0 [ 866.950295] ? iov_iter_npages+0x1fd/0xa70 [ 866.950658] iomap_dio_bio_actor+0x77a/0xef0 [ 866.951042] iomap_dio_actor+0x36f/0x560 [ 866.951407] iomap_apply+0x289/0x810 [ 866.951723] ? iomap_dio_rw+0x90/0x90 [ 866.952046] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 866.952540] ? delete_from_page_cache_batch+0xa30/0xa30 [ 866.952987] ? mark_held_locks+0x9e/0xe0 [ 866.953341] ? filemap_check_errors+0xa5/0x150 [ 866.953731] __iomap_dio_rw+0x6cd/0x1110 [ 866.954070] ? iomap_dio_rw+0x90/0x90 [ 866.954407] ? iomap_dio_bio_actor+0xef0/0xef0 [ 866.954800] ? down_read+0x10f/0x430 [ 866.955127] ? down_write+0x160/0x160 [ 866.955455] iomap_dio_rw+0x31/0x90 [ 866.955767] ext4_file_read_iter+0x2c7/0x4c0 [ 866.956142] generic_file_splice_read+0x455/0x6d0 [ 866.956549] ? pipe_to_user+0x170/0x170 [ 866.956902] ? fsnotify_perm.part.0+0x22d/0x620 [ 866.957302] ? security_file_permission+0xb1/0xe0 [ 866.957708] ? pipe_to_user+0x170/0x170 [ 866.958046] do_splice_to+0x10e/0x160 [ 866.958371] splice_direct_to_actor+0x2fe/0x980 [ 866.958766] ? pipe_to_sendpage+0x380/0x380 [ 866.959146] ? do_splice_to+0x160/0x160 [ 866.959491] ? security_file_permission+0xb1/0xe0 [ 866.959910] do_splice_direct+0x1c4/0x290 [ 866.960263] ? splice_direct_to_actor+0x980/0x980 [ 866.960670] ? avc_policy_seqno+0x9/0x70 [ 866.961022] ? security_file_permission+0xb1/0xe0 [ 866.961442] do_sendfile+0x553/0x11e0 [ 866.961775] ? do_pwritev+0x270/0x270 [ 866.962102] ? wait_for_completion_io+0x270/0x270 [ 866.962517] ? rcu_read_lock_any_held+0x75/0xa0 [ 866.962913] ? vfs_write+0x354/0xb10 [ 866.963246] __x64_sys_sendfile64+0x1d1/0x210 [ 866.963629] ? __ia32_sys_sendfile+0x220/0x220 [ 866.964017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 866.964460] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.964898] do_syscall_64+0x33/0x40 [ 866.965214] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 866.965646] RIP: 0033:0x7fb1ac5e0b19 [ 866.965967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.967507] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 866.968147] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 866.968747] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 866.969349] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.969944] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 866.970542] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:03:07 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:07 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0xb225, 0xbb, 0x9}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={r1, 0x0, 0x3, 0xfff}) sendfile(r0, r1, &(0x7f0000000000)=0xd92, 0xf3) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:07 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:03:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 12) [ 867.061413] FAULT_INJECTION: forcing a failure. [ 867.061413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 867.062457] CPU: 1 PID: 6367 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 867.063031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 867.063749] Call Trace: [ 867.063984] dump_stack+0x107/0x167 [ 867.064300] should_fail.cold+0x5/0xa [ 867.064634] __alloc_pages_nodemask+0x182/0x600 [ 867.065034] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 867.065539] ? do_syscall_64+0x33/0x40 [ 867.065883] ? __unwind_start+0x523/0x7e0 [ 867.066239] alloc_pages_current+0x187/0x280 [ 867.066616] ? lock_acquire+0x197/0x470 [ 867.066966] push_pipe+0x2b5/0x6d0 [ 867.067297] iov_iter_get_pages+0x6b4/0xf40 [ 867.067670] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 867.068096] bio_iov_iter_get_pages+0x22a/0x1200 [ 867.068502] ? bvec_alloc+0x17e/0x2f0 [ 867.068829] ? bio_alloc_bioset+0x2a1/0x600 [ 867.069194] ? bio_add_pc_page+0x100/0x100 [ 867.069556] ? bvec_alloc+0x210/0x2f0 [ 867.069880] ? iov_iter_npages+0x1fd/0xa70 [ 867.070244] iomap_dio_bio_actor+0x77a/0xef0 [ 867.070630] iomap_dio_actor+0x36f/0x560 [ 867.070981] iomap_apply+0x289/0x810 [ 867.071315] ? iomap_dio_rw+0x90/0x90 [ 867.071641] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 867.072133] ? delete_from_page_cache_batch+0xa30/0xa30 [ 867.072582] ? mark_held_locks+0x9e/0xe0 [ 867.072935] ? filemap_check_errors+0xa5/0x150 [ 867.073330] __iomap_dio_rw+0x6cd/0x1110 [ 867.073683] ? iomap_dio_rw+0x90/0x90 21:03:07 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = shmget(0x3, 0x1000, 0x10, &(0x7f0000866000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000080)=""/248) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) openat(r1, &(0x7f0000000000)='./file0\x00', 0x200000, 0x58) [ 867.073708] ? iomap_dio_bio_actor+0xef0/0xef0 [ 867.073728] ? down_read+0x10f/0x430 [ 867.073740] ? down_write+0x160/0x160 [ 867.073756] iomap_dio_rw+0x31/0x90 [ 867.073769] ext4_file_read_iter+0x2c7/0x4c0 [ 867.073785] generic_file_splice_read+0x455/0x6d0 [ 867.073797] ? pipe_to_user+0x170/0x170 [ 867.073816] ? fsnotify_perm.part.0+0x22d/0x620 [ 867.073833] ? security_file_permission+0xb1/0xe0 [ 867.073845] ? pipe_to_user+0x170/0x170 [ 867.073857] do_splice_to+0x10e/0x160 [ 867.073871] splice_direct_to_actor+0x2fe/0x980 [ 867.073885] ? pipe_to_sendpage+0x380/0x380 [ 867.073899] ? do_splice_to+0x160/0x160 [ 867.073912] ? security_file_permission+0xb1/0xe0 [ 867.073929] do_splice_direct+0x1c4/0x290 [ 867.073941] ? splice_direct_to_actor+0x980/0x980 [ 867.073951] ? avc_policy_seqno+0x9/0x70 [ 867.073968] ? security_file_permission+0xb1/0xe0 [ 867.073987] do_sendfile+0x553/0x11e0 [ 867.074006] ? do_pwritev+0x270/0x270 [ 867.074019] ? wait_for_completion_io+0x270/0x270 [ 867.074034] ? rcu_read_lock_any_held+0x75/0xa0 [ 867.074044] ? vfs_write+0x354/0xb10 [ 867.074060] __x64_sys_sendfile64+0x1d1/0x210 [ 867.074073] ? __ia32_sys_sendfile+0x220/0x220 [ 867.074087] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 867.074098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 867.074111] do_syscall_64+0x33/0x40 [ 867.074123] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 867.074131] RIP: 0033:0x7fb1ac5e0b19 21:03:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 867.074143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 867.074149] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 867.074163] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 867.074170] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 867.074177] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 867.074184] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 867.074192] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:03:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0xc, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0xf, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000100), 0x1ff, 0x121000) copy_file_range(r1, &(0x7f0000000080)=0xfffffffffffffffe, r2, &(0x7f0000000140)=0x7, 0xfff, 0x0) recvmsg$unix(r0, &(0x7f0000001900)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000001780)=[{&(0x7f0000000340)=""/76, 0x4c}, {&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f00000004c0)=""/178, 0xb2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000580)=""/124, 0x7c}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)}, {&(0x7f0000001640)=""/21, 0x15}, {&(0x7f0000001680)=""/99, 0x63}, {&(0x7f0000001700)=""/70, 0x46}], 0xa, &(0x7f0000001840)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa0}, 0x20) r4 = syz_open_procfs(r3, &(0x7f0000001600)='net/ip_tables_matches\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001940)={{{@in6=@private1, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000180)=0x1) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 13) 21:03:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:03:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:21 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000867000/0x1000)=nil) shmat(r1, &(0x7f0000868000/0x1000)=nil, 0x0) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:21 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:03:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 880.881045] FAULT_INJECTION: forcing a failure. [ 880.881045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 880.881059] CPU: 0 PID: 6400 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 880.881066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 880.881070] Call Trace: [ 880.881087] dump_stack+0x107/0x167 [ 880.881100] should_fail.cold+0x5/0xa [ 880.881117] __alloc_pages_nodemask+0x182/0x600 [ 880.881133] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 880.881143] ? do_syscall_64+0x33/0x40 [ 880.881164] ? __unwind_start+0x523/0x7e0 [ 880.881180] alloc_pages_current+0x187/0x280 [ 880.881192] ? lock_acquire+0x197/0x470 [ 880.881206] push_pipe+0x2b5/0x6d0 [ 880.881224] iov_iter_get_pages+0x6b4/0xf40 [ 880.881243] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 880.881264] bio_iov_iter_get_pages+0x22a/0x1200 21:03:21 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r1, 0x942e, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = shmget(0x1, 0x3000, 0x40, &(0x7f0000866000/0x3000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000100)=""/164) r3 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000866000/0x3000)=nil) shmat(r3, &(0x7f00001a8000/0x800000)=nil, 0x4000) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0xc8, 0x1f, 0x0, 0x0, 0x2, 0x8, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000}, 0x344c, 0xfffffffffffffff8, 0x6, 0x5, 0x7, 0x1, 0x20, 0x0, 0x10000, 0x0, 0x4c3}, 0xffffffffffffffff, 0xb, r1, 0x1) [ 880.881280] ? bvec_alloc+0x17e/0x2f0 [ 880.881294] ? bio_alloc_bioset+0x2a1/0x600 [ 880.881305] ? bio_add_pc_page+0x100/0x100 [ 880.881316] ? bvec_alloc+0x210/0x2f0 [ 880.881328] ? iov_iter_npages+0x1fd/0xa70 [ 880.881346] iomap_dio_bio_actor+0x77a/0xef0 [ 880.881369] iomap_dio_actor+0x36f/0x560 21:03:21 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x4, 0x29002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext, 0x92004, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = openat2(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x200040, 0x10, 0x1}, 0x18) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x13) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x44000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000400)={0xff, "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"}) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000080)=""/45, 0x2d}, {&(0x7f0000000180)=""/126, 0x7e}], 0x2, 0x2, 0x5) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0xf43}}, './file0\x00'}) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000300)={0x2, 0xff}) [ 880.881385] iomap_apply+0x289/0x810 [ 880.881397] ? iomap_dio_rw+0x90/0x90 [ 880.881412] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 880.881430] ? delete_from_page_cache_batch+0xa30/0xa30 [ 880.881440] ? mark_held_locks+0x9e/0xe0 21:03:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 880.881461] ? filemap_check_errors+0xa5/0x150 [ 880.881476] __iomap_dio_rw+0x6cd/0x1110 [ 880.881486] ? iomap_dio_rw+0x90/0x90 [ 880.881512] ? iomap_dio_bio_actor+0xef0/0xef0 [ 880.881531] ? down_read+0x10f/0x430 [ 880.881543] ? down_write+0x160/0x160 [ 880.881559] iomap_dio_rw+0x31/0x90 [ 880.881574] ext4_file_read_iter+0x2c7/0x4c0 [ 880.881592] generic_file_splice_read+0x455/0x6d0 21:03:21 executing program 1: shmat(0x0, &(0x7f0000869000/0x2000)=nil, 0x2000) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget(0x0, 0x1000, 0x54000000, &(0x7f0000869000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) shmctl$SHM_UNLOCK(r2, 0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') mmap(&(0x7f0000869000/0x2000)=nil, 0x2000, 0x2, 0x13, r3, 0xe94b000) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r4, 0xc0c89425, &(0x7f0000000100)={"a047362e9240f2ae247fb56687215389", 0x0, 0x0, {0x0, 0x45bf}, {0x3, 0x7ff}, 0x3, [0x4, 0x80000000, 0x6, 0x4, 0x6f5f, 0x7fffffff, 0x5, 0xfffffffffffffff8, 0x101, 0x7fff, 0x3f4, 0x4, 0x8, 0x9, 0x7f, 0x7]}) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x9, 0x4, 0x3, 0x0, 0x0, 0x4, 0x100, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x2, @perf_config_ext={0x80, 0x5}, 0x40, 0xffff, 0xffffffff, 0x1, 0x3, 0x7d6e, 0xc04c, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r0, 0x2) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000000)=""/40) [ 880.881606] ? pipe_to_user+0x170/0x170 [ 880.881627] ? fsnotify_perm.part.0+0x22d/0x620 [ 880.881646] ? security_file_permission+0xb1/0xe0 [ 880.881660] ? pipe_to_user+0x170/0x170 [ 880.881674] do_splice_to+0x10e/0x160 [ 880.881690] splice_direct_to_actor+0x2fe/0x980 [ 880.881707] ? pipe_to_sendpage+0x380/0x380 [ 880.881723] ? do_splice_to+0x160/0x160 [ 880.881736] ? security_file_permission+0xb1/0xe0 [ 880.881753] do_splice_direct+0x1c4/0x290 [ 880.881764] ? splice_direct_to_actor+0x980/0x980 [ 880.881774] ? avc_policy_seqno+0x9/0x70 [ 880.881790] ? security_file_permission+0xb1/0xe0 [ 880.881808] do_sendfile+0x553/0x11e0 [ 880.881827] ? do_pwritev+0x270/0x270 [ 880.881840] ? wait_for_completion_io+0x270/0x270 [ 880.881854] ? rcu_read_lock_any_held+0x75/0xa0 [ 880.881863] ? vfs_write+0x354/0xb10 [ 880.881879] __x64_sys_sendfile64+0x1d1/0x210 [ 880.881892] ? __ia32_sys_sendfile+0x220/0x220 [ 880.881906] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 880.881917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 880.881930] do_syscall_64+0x33/0x40 [ 880.881941] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 880.881949] RIP: 0033:0x7fb1ac5e0b19 [ 880.881960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 880.881967] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 880.881980] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 880.881986] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 880.881993] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 880.881999] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 880.882006] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:03:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fff, 0x9}, 0x2850, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:03:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:03:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) recvfrom$packet(r1, &(0x7f00000002c0)=""/4096, 0x1000, 0x10140, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x10, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, 0x14) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 14) 21:03:21 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:03:21 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 881.283999] FAULT_INJECTION: forcing a failure. [ 881.283999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 881.284016] CPU: 0 PID: 6435 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 881.284023] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 881.284028] Call Trace: [ 881.284047] dump_stack+0x107/0x167 [ 881.284062] should_fail.cold+0x5/0xa [ 881.284081] __alloc_pages_nodemask+0x182/0x600 [ 881.284098] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 881.284110] ? do_syscall_64+0x33/0x40 [ 881.284135] ? __unwind_start+0x523/0x7e0 [ 881.284154] alloc_pages_current+0x187/0x280 21:03:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 881.284167] ? lock_acquire+0x197/0x470 [ 881.284183] push_pipe+0x2b5/0x6d0 [ 881.284205] iov_iter_get_pages+0x6b4/0xf40 21:03:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f00000002c0)={{r1}, "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"}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 881.284223] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 881.284254] bio_iov_iter_get_pages+0x22a/0x1200 [ 881.284273] ? bvec_alloc+0x17e/0x2f0 [ 881.284290] ? bio_alloc_bioset+0x2a1/0x600 21:03:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:22 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) shmget(0x1, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) 21:03:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 15) [ 881.284303] ? bio_add_pc_page+0x100/0x100 [ 881.284316] ? bvec_alloc+0x210/0x2f0 [ 881.284332] ? iov_iter_npages+0x1fd/0xa70 [ 881.284353] iomap_dio_bio_actor+0x77a/0xef0 [ 881.284381] iomap_dio_actor+0x36f/0x560 [ 881.284401] iomap_apply+0x289/0x810 [ 881.284417] ? iomap_dio_rw+0x90/0x90 [ 881.284433] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 881.284455] ? delete_from_page_cache_batch+0xa30/0xa30 [ 881.284467] ? mark_held_locks+0x9e/0xe0 [ 881.284491] ? filemap_check_errors+0xa5/0x150 [ 881.284509] __iomap_dio_rw+0x6cd/0x1110 [ 881.284522] ? iomap_dio_rw+0x90/0x90 [ 881.284550] ? iomap_dio_bio_actor+0xef0/0xef0 [ 881.284573] ? down_read+0x10f/0x430 [ 881.284589] ? down_write+0x160/0x160 [ 881.284608] iomap_dio_rw+0x31/0x90 [ 881.284625] ext4_file_read_iter+0x2c7/0x4c0 [ 881.284643] generic_file_splice_read+0x455/0x6d0 [ 881.284658] ? pipe_to_user+0x170/0x170 [ 881.284678] ? fsnotify_perm.part.0+0x22d/0x620 [ 881.284696] ? security_file_permission+0xb1/0xe0 [ 881.284709] ? pipe_to_user+0x170/0x170 [ 881.284722] do_splice_to+0x10e/0x160 [ 881.284736] splice_direct_to_actor+0x2fe/0x980 [ 881.284752] ? pipe_to_sendpage+0x380/0x380 [ 881.284768] ? do_splice_to+0x160/0x160 [ 881.284782] ? security_file_permission+0xb1/0xe0 [ 881.284799] do_splice_direct+0x1c4/0x290 [ 881.284841] ? splice_direct_to_actor+0x980/0x980 [ 881.284855] ? avc_policy_seqno+0x9/0x70 [ 881.284876] ? security_file_permission+0xb1/0xe0 [ 881.284898] do_sendfile+0x553/0x11e0 [ 881.284920] ? do_pwritev+0x270/0x270 [ 881.284936] ? wait_for_completion_io+0x270/0x270 [ 881.284953] ? rcu_read_lock_any_held+0x75/0xa0 [ 881.284965] ? vfs_write+0x354/0xb10 [ 881.284985] __x64_sys_sendfile64+0x1d1/0x210 [ 881.285000] ? __ia32_sys_sendfile+0x220/0x220 [ 881.285018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 881.285032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 881.285047] do_syscall_64+0x33/0x40 [ 881.285060] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 881.285070] RIP: 0033:0x7fb1ac5e0b19 [ 881.285084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 881.285091] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 881.285107] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 881.285115] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 881.285123] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 881.285132] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 881.285141] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 881.529165] FAULT_INJECTION: forcing a failure. [ 881.529165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 881.529179] CPU: 0 PID: 6456 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 881.529185] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 881.529189] Call Trace: [ 881.529206] dump_stack+0x107/0x167 [ 881.529219] should_fail.cold+0x5/0xa [ 881.529240] __alloc_pages_nodemask+0x182/0x600 [ 881.529255] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 881.529265] ? do_syscall_64+0x33/0x40 [ 881.529286] ? __unwind_start+0x523/0x7e0 [ 881.529302] alloc_pages_current+0x187/0x280 [ 881.529314] ? lock_acquire+0x197/0x470 [ 881.529327] push_pipe+0x2b5/0x6d0 [ 881.529344] iov_iter_get_pages+0x6b4/0xf40 [ 881.529359] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 881.529380] bio_iov_iter_get_pages+0x22a/0x1200 [ 881.529396] ? bvec_alloc+0x17e/0x2f0 [ 881.529409] ? bio_alloc_bioset+0x2a1/0x600 [ 881.529420] ? bio_add_pc_page+0x100/0x100 [ 881.529431] ? bvec_alloc+0x210/0x2f0 [ 881.529444] ? iov_iter_npages+0x1fd/0xa70 [ 881.529460] iomap_dio_bio_actor+0x77a/0xef0 [ 881.529482] iomap_dio_actor+0x36f/0x560 [ 881.529498] iomap_apply+0x289/0x810 [ 881.529510] ? iomap_dio_rw+0x90/0x90 [ 881.529523] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 881.529541] ? delete_from_page_cache_batch+0xa30/0xa30 [ 881.529552] ? mark_held_locks+0x9e/0xe0 [ 881.529571] ? filemap_check_errors+0xa5/0x150 [ 881.529586] __iomap_dio_rw+0x6cd/0x1110 [ 881.529596] ? iomap_dio_rw+0x90/0x90 [ 881.529618] ? iomap_dio_bio_actor+0xef0/0xef0 [ 881.529637] ? down_read+0x10f/0x430 [ 881.529649] ? down_write+0x160/0x160 [ 881.529665] iomap_dio_rw+0x31/0x90 [ 881.529679] ext4_file_read_iter+0x2c7/0x4c0 [ 881.529694] generic_file_splice_read+0x455/0x6d0 [ 881.529706] ? pipe_to_user+0x170/0x170 [ 881.529724] ? fsnotify_perm.part.0+0x22d/0x620 [ 881.529740] ? security_file_permission+0xb1/0xe0 [ 881.529753] ? pipe_to_user+0x170/0x170 [ 881.529765] do_splice_to+0x10e/0x160 [ 881.529778] splice_direct_to_actor+0x2fe/0x980 [ 881.529792] ? pipe_to_sendpage+0x380/0x380 [ 881.529806] ? do_splice_to+0x160/0x160 [ 881.529819] ? security_file_permission+0xb1/0xe0 [ 881.529836] do_splice_direct+0x1c4/0x290 [ 881.529847] ? splice_direct_to_actor+0x980/0x980 [ 881.529857] ? avc_policy_seqno+0x9/0x70 [ 881.529874] ? security_file_permission+0xb1/0xe0 [ 881.529893] do_sendfile+0x553/0x11e0 [ 881.529911] ? do_pwritev+0x270/0x270 [ 881.529925] ? wait_for_completion_io+0x270/0x270 [ 881.529938] ? rcu_read_lock_any_held+0x75/0xa0 [ 881.529949] ? vfs_write+0x354/0xb10 [ 881.529965] __x64_sys_sendfile64+0x1d1/0x210 [ 881.529978] ? __ia32_sys_sendfile+0x220/0x220 [ 881.529992] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 881.530003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 881.530016] do_syscall_64+0x33/0x40 [ 881.530028] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 881.530035] RIP: 0033:0x7fb1ac5e0b19 [ 881.530047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 881.530053] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 881.530067] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 881.530073] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 881.530080] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 881.530087] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 881.530094] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:03:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:03:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:03:35 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:03:35 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f00000002c0)={{r1}, "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"}) recvmmsg$unix(r0, &(0x7f0000004d40)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000001800)=""/252, 0xfc}, {&(0x7f0000001900)=""/24, 0x18}, {&(0x7f0000001940)=""/203, 0xcb}, {&(0x7f0000001a40)=""/158, 0x9e}, {&(0x7f0000001b00)=""/244, 0xf4}, {&(0x7f0000001c00)=""/11, 0xb}, {&(0x7f0000001c40)=""/10, 0xa}, {&(0x7f0000001c80)=""/159, 0x9f}, {&(0x7f0000002e00)=""/244, 0xf4}, {&(0x7f0000002f00)=""/124, 0x7c}], 0xa}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000001d40)=""/56, 0x38}, {&(0x7f0000003040)=""/156, 0x9c}, {&(0x7f0000003100)=""/214, 0xd6}, {&(0x7f0000003200)=""/66, 0x42}, {&(0x7f0000003280)=""/108, 0x6c}, {&(0x7f0000003300)=""/28, 0x1c}, {&(0x7f0000003340)=""/158, 0x9e}], 0x7, &(0x7f0000003480)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x98}}, {{&(0x7f0000003540), 0x6e, &(0x7f0000003780)=[{&(0x7f00000035c0)=""/31, 0x1f}, {&(0x7f0000003600)=""/125, 0x7d}, {&(0x7f0000003680)=""/236, 0xec}], 0x3}}, {{&(0x7f00000037c0), 0x6e, &(0x7f0000004c40)=[{&(0x7f0000003840)=""/192, 0xc0}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/187, 0xbb}, {&(0x7f00000049c0)=""/182, 0xb6}, {&(0x7f0000004a80)=""/42, 0x2a}, {&(0x7f0000004ac0)=""/143, 0x8f}, {&(0x7f0000004b80)=""/169, 0xa9}], 0x7, &(0x7f0000004cc0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}], 0x4, 0x100, &(0x7f0000004e80)) newfstatat(0xffffffffffffff9c, &(0x7f0000004ec0)='./file0\x00', &(0x7f0000004f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) r4 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x2, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$NS_GET_OWNER_UID(r7, 0xb704, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) fsconfig$FSCONFIG_SET_PATH_EMPTY(r7, 0x4, &(0x7f0000000400)='@(!)!}!,:{)\x00', &(0x7f0000000440)='./file1\x00', r4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r5}}, {@posixacl}, {@loose}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000012c0)=ANY=[@ANYBLOB="02000000f7ff0a000000000002fc0400dfe270f7573da23e53b39ca9fc5f7eb3bcf7515d2cd9b7b134c6b02cc02a026028e7efe6f3803cb176e2ca0e1586a0345e40a8a166f311151a139b7df2b66ce8e85400f07e8f22ff913f8a284a09d1623b2a23fcc25f97d8bbcd38807aebc9c0f9e044cbd24e7680c738c5c7a4236bf197636a34028c421e9297e80c41ba9ae667e179d5b2d33fc1b51d17094186e09439ea813c8a1315893a2603af8aad5627e499676536ba78dc898734c01396", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="040001000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0xee00, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\b\x00', @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0xee00, @ANYBLOB="10000200000000002000020000000000"], 0x7c, 0x3) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r8, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:35 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 16) 21:03:35 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r4, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd=r1, 0x0, 0x0, 0xff, 0x5, 0x0, {0x0, 0x0, r0}}, 0x1) close_range(r0, r1, 0x2) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff2000/0xe000)=nil, 0xe000, 0x1000010, 0x10, 0xffffffffffffffff, 0x8000000) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x2c}, 0x4e21, 0x8, 0x4e21, 0x9, 0xa, 0x0, 0xa0, 0x8, 0x0, 0xee01}, {0xffffffffffffff47, 0x7, 0x4, 0x80000000, 0x9e3b, 0x6, 0x5, 0x2}, {0xffffffff, 0x5, 0x4, 0x8}, 0x2, 0x6e6bbf, 0x3, 0x1, 0x2, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x2, @in=@multicast1, 0x3505, 0x2, 0x2, 0x5, 0x7fff, 0x0, 0x3f}}, 0xe8) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 894.385135] SELinux: duplicate or incompatible mount options [ 894.386093] FAULT_INJECTION: forcing a failure. [ 894.386093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 894.389721] CPU: 0 PID: 6479 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 894.391464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 894.393588] Call Trace: [ 894.394269] dump_stack+0x107/0x167 [ 894.395205] should_fail.cold+0x5/0xa [ 894.396200] __alloc_pages_nodemask+0x182/0x600 [ 894.397373] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 894.398875] ? do_syscall_64+0x33/0x40 [ 894.399891] ? __unwind_start+0x523/0x7e0 [ 894.400984] alloc_pages_current+0x187/0x280 [ 894.402122] ? lock_acquire+0x197/0x470 [ 894.403136] push_pipe+0x2b5/0x6d0 [ 894.404052] iov_iter_get_pages+0x6b4/0xf40 [ 894.405159] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 894.406396] bio_iov_iter_get_pages+0x22a/0x1200 [ 894.407616] ? bvec_alloc+0x17e/0x2f0 [ 894.408578] ? bio_alloc_bioset+0x2a1/0x600 [ 894.409660] ? bio_add_pc_page+0x100/0x100 [ 894.410717] ? bvec_alloc+0x210/0x2f0 [ 894.411710] ? iov_iter_npages+0x1fd/0xa70 [ 894.412772] iomap_dio_bio_actor+0x77a/0xef0 [ 894.413878] iomap_dio_actor+0x36f/0x560 [ 894.414909] iomap_apply+0x289/0x810 [ 894.415847] ? iomap_dio_rw+0x90/0x90 [ 894.416837] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 894.418314] ? delete_from_page_cache_batch+0xa30/0xa30 [ 894.419665] ? mark_held_locks+0x9e/0xe0 [ 894.420733] ? filemap_check_errors+0xa5/0x150 [ 894.421883] __iomap_dio_rw+0x6cd/0x1110 [ 894.422901] ? iomap_dio_rw+0x90/0x90 [ 894.423894] ? iomap_dio_bio_actor+0xef0/0xef0 [ 894.425109] ? down_read+0x10f/0x430 [ 894.426039] ? down_write+0x160/0x160 [ 894.430172] iomap_dio_rw+0x31/0x90 [ 894.431093] ext4_file_read_iter+0x2c7/0x4c0 [ 894.432226] generic_file_splice_read+0x455/0x6d0 [ 894.433455] ? pipe_to_user+0x170/0x170 [ 894.434462] ? fsnotify_perm.part.0+0x22d/0x620 [ 894.435720] ? security_file_permission+0xb1/0xe0 [ 894.436961] ? pipe_to_user+0x170/0x170 [ 894.438360] do_splice_to+0x10e/0x160 [ 894.439321] splice_direct_to_actor+0x2fe/0x980 [ 894.440508] ? pipe_to_sendpage+0x380/0x380 [ 894.441588] ? do_splice_to+0x160/0x160 [ 894.442627] ? security_file_permission+0xb1/0xe0 [ 894.443836] do_splice_direct+0x1c4/0x290 [ 894.444877] ? splice_direct_to_actor+0x980/0x980 [ 894.446122] ? avc_policy_seqno+0x9/0x70 [ 894.447173] ? security_file_permission+0xb1/0xe0 [ 894.448320] do_sendfile+0x553/0x11e0 [ 894.449241] ? do_pwritev+0x270/0x270 [ 894.450125] ? wait_for_completion_io+0x270/0x270 [ 894.451438] ? rcu_read_lock_any_held+0x75/0xa0 [ 894.452565] ? vfs_write+0x354/0xb10 [ 894.453440] __x64_sys_sendfile64+0x1d1/0x210 [ 894.454471] ? __ia32_sys_sendfile+0x220/0x220 [ 894.455544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 894.456741] ? syscall_enter_from_user_mode+0x1d/0x50 [ 894.457973] do_syscall_64+0x33/0x40 [ 894.458801] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 894.460046] RIP: 0033:0x7fb1ac5e0b19 [ 894.460858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 894.465186] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 894.466915] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 894.468602] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 894.470276] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 894.471911] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 894.473573] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 894.496577] SELinux: duplicate or incompatible mount options 21:03:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xffffffef, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1f, 0x8, &(0x7f0000000680)=[{&(0x7f0000000140), 0x0, 0x5}, {&(0x7f0000000180)="f28028799b393a81418f10751c10be6ae6a76f943e4d913e5dceaf66d798537cebb17154b02b164cf5850333612bb832730cb368dd2d5065e7f4cbbd7650d21e1486900b8709fc324779b9c59cea6bab282abd47f9b86b1eca94d8b782f54887f3de2ad9bacfb2819d", 0x69, 0x100000000}, {&(0x7f00000002c0)="4e8ad7921f080156f831ccc2b3271f9c16c3a55ce324dce371696c424e718449b323a60d279fdff23cb4492486b4267c4d443f4a914c72854c2041ef4d1ba42b2a68f03fa84b504985c7ad0a63f147e1737e24d95c735fbd8f0534ce79310931c9ef6650520815fcf8e4cb2759459b799c6eb6a54c49a9593c07a20f1bfe4c8fecfefa32a905d758817b0da126617ee3f8d2fcc5a31a912b4a79d6b1da723d1279c8ee2f6769c60a917076eb5b68fa0f", 0xb0, 0xf81}, {&(0x7f0000000380)="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", 0xfa, 0x1}, {&(0x7f0000000480)="cc0fbfef47b7656775a0ab7ba4e4aaabee9eae269e131238dc7fcba26bdbee5f258802ed933627396f54f485b7b0c31c96aa3639a9b9e1b95dc4239ed2e485f7fbead86279bb1152e5b42d68fdcdeac2b0a6da2a566431b36b0c57169bd4682877ac939cbadaa19896c4564121d659c49078a6d5480bc90344b6b3dba6a2f86cd1a910991eec6fde8fd2e63f67f19bba76026e28082fc38acedcc0253c0e7eda3b", 0xa1, 0x8dd0}, {&(0x7f0000000540)="1a328305e0d6f4dd1e2e3813352424c8a56c6fb978572cb9923f5551b1f450d7a4e9ca6c9f7d43f64a75adb4855c452629610d37cdabeaa9cc29333cc770c6c57007f67e31539734bcc3a2df608b3df61c67f232c5c69c4ff06dd44fc4c419cdfe7fb7d4fa12ab388cb66d0ab4bf4a04b7ab87bac6eceb3e129c0d44e2e2572323e7e990868706e6e56532eddc8ae620d0318674f708e849b372a81121c78a", 0x9f, 0x2}, {&(0x7f0000000200), 0x0, 0x6}, {&(0x7f0000000600)="5107fb0af7906d0a6b2972dba04b76edbff97b948d6f31742314aeb63531b8ed8284451186fd990749f9e61cc92e0de5537822448cde795e8cb3376c243fe5ae29204d51914ec5a9efe87fa9918483eb5f74612c39ccf8faccf4db1a93de75f7f4c81b828ef0dd962f8ef51f1777bc", 0x6f, 0x2}], 0x10000, &(0x7f0000000740)={[], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}) openat(r1, &(0x7f0000000780)='./file0\x00', 0x480000, 0x32) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x400, 0x7fca, 0x1f, 0x20, 0xe, "577c0c858e0f5117"}) 21:03:35 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 894.527165] nfs: Unknown parameter 'func' 21:03:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') fallocate(0xffffffffffffffff, 0x22, 0xfffffffffffffff9, 0x1) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000080)={0xffffffff, 0x8, 0x4, 0x9, 0xff, "7ddd559c8bd0ff2b1701448eac810fbb32b95e", 0x6, 0x73bb4fe9}) 21:03:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:03:47 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 907.169732] FAULT_INJECTION: forcing a failure. [ 907.169732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 907.170762] CPU: 1 PID: 6509 Comm: syz-executor.4 Not tainted 5.10.225 #1 21:03:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 17) 21:03:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:03:47 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 21:03:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000300000005000208000000000c00018008000100", @ANYRES32=r2, @ANYBLOB], 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x4, 0x0, 0x5, 0x81, 0x4, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x8, 0x1f, 0x80}}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000300)={@multicast1, @broadcast, 0x0}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={0x0, @in={0x2, 0x4e22, @multicast1}, @xdp={0x2c, 0x14, 0x0, 0xd}, @xdp={0x2c, 0x17}, 0xff, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)='gre0\x00', 0x0, 0x5, 0x5}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r10, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r11, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)={0x19c, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0xfffffffc, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040040}, 0x40044) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:47 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 907.171333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 907.180012] Call Trace: [ 907.180290] dump_stack+0x107/0x167 [ 907.180666] should_fail.cold+0x5/0xa [ 907.181060] __alloc_pages_nodemask+0x182/0x600 [ 907.181541] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 907.182148] ? do_syscall_64+0x33/0x40 [ 907.182557] ? __unwind_start+0x523/0x7e0 [ 907.182984] alloc_pages_current+0x187/0x280 [ 907.183434] ? lock_acquire+0x197/0x470 [ 907.183831] push_pipe+0x2b5/0x6d0 [ 907.184139] iov_iter_get_pages+0x6b4/0xf40 [ 907.184505] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 907.184926] bio_iov_iter_get_pages+0x22a/0x1200 [ 907.185329] ? bvec_alloc+0x17e/0x2f0 [ 907.185651] ? bio_alloc_bioset+0x2a1/0x600 [ 907.186011] ? bio_add_pc_page+0x100/0x100 [ 907.186366] ? bvec_alloc+0x210/0x2f0 [ 907.186687] ? iov_iter_npages+0x1fd/0xa70 [ 907.187049] iomap_dio_bio_actor+0x77a/0xef0 [ 907.187430] iomap_dio_actor+0x36f/0x560 [ 907.187804] iomap_apply+0x289/0x810 [ 907.188188] ? iomap_dio_rw+0x90/0x90 [ 907.188582] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 907.189177] ? delete_from_page_cache_batch+0xa30/0xa30 [ 907.189720] ? mark_held_locks+0x9e/0xe0 [ 907.190146] ? filemap_check_errors+0xa5/0x150 [ 907.190618] __iomap_dio_rw+0x6cd/0x1110 [ 907.191032] ? iomap_dio_rw+0x90/0x90 [ 907.191434] ? iomap_dio_bio_actor+0xef0/0xef0 [ 907.191882] ? down_read+0x10f/0x430 [ 907.192196] ? down_write+0x160/0x160 [ 907.192521] iomap_dio_rw+0x31/0x90 [ 907.192830] ext4_file_read_iter+0x2c7/0x4c0 [ 907.193204] generic_file_splice_read+0x455/0x6d0 [ 907.193610] ? pipe_to_user+0x170/0x170 [ 907.193954] ? fsnotify_perm.part.0+0x22d/0x620 [ 907.194349] ? security_file_permission+0xb1/0xe0 [ 907.194755] ? pipe_to_user+0x170/0x170 [ 907.195089] do_splice_to+0x10e/0x160 [ 907.195413] splice_direct_to_actor+0x2fe/0x980 [ 907.195833] ? pipe_to_sendpage+0x380/0x380 [ 907.196279] ? do_splice_to+0x160/0x160 [ 907.196687] ? security_file_permission+0xb1/0xe0 [ 907.197184] do_splice_direct+0x1c4/0x290 [ 907.197608] ? splice_direct_to_actor+0x980/0x980 [ 907.198098] ? avc_policy_seqno+0x9/0x70 [ 907.198519] ? security_file_permission+0xb1/0xe0 [ 907.199021] do_sendfile+0x553/0x11e0 [ 907.199420] ? do_pwritev+0x270/0x270 [ 907.199804] ? wait_for_completion_io+0x270/0x270 [ 907.200213] ? rcu_read_lock_any_held+0x75/0xa0 [ 907.200602] ? vfs_write+0x354/0xb10 [ 907.200923] __x64_sys_sendfile64+0x1d1/0x210 [ 907.201301] ? __ia32_sys_sendfile+0x220/0x220 [ 907.201688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 907.202126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 907.202560] do_syscall_64+0x33/0x40 [ 907.202873] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 907.203302] RIP: 0033:0x7fb1ac5e0b19 [ 907.203617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 907.205488] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 907.206269] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 907.206996] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 907.207742] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 907.208470] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 907.209193] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:03:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:03:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000000)={0x4, 0x4, 0x20}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:48 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 21:03:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:03:48 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmget$private(0x0, 0x3000, 0x1, &(0x7f0000867000/0x3000)=nil) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = accept4$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @none}, &(0x7f0000000080)=0xe, 0x80000) lseek(r2, 0x81, 0x3) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000140)={'wlan0\x00'}) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000100)={'syzkaller0\x00', 0x80}) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r4, 0x7, 0x80000000, 0x7}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:48 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0xffffffff, 0x7, 0x1, 0x0, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x80, 0x1, 0x3f, 0x26, 0x0, 0x80, 0x100, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x0, 0x1}, 0x20, 0x7, 0x15f, 0x5, 0x7fffffff, 0x3ff, 0x1, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xc) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x403}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pread64(r1, &(0x7f0000000180)=""/46, 0x2e, 0xffffffffffffff7f) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:03:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:00 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, 0x0) 21:04:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:00 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:04:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') socketpair(0x6, 0x3, 0xea99, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f0000000080)=""/25, 0x19) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:00 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/51) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'veth0_to_team\x00'}) 21:04:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 18) 21:04:00 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r2, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 920.133011] FAULT_INJECTION: forcing a failure. [ 920.133011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 920.134054] CPU: 1 PID: 6561 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 920.134626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 920.135321] Call Trace: [ 920.135553] dump_stack+0x107/0x167 [ 920.135878] should_fail.cold+0x5/0xa [ 920.137641] __alloc_pages_nodemask+0x182/0x600 [ 920.138075] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 920.138691] ? do_syscall_64+0x33/0x40 [ 920.139061] ? __unwind_start+0x523/0x7e0 [ 920.139572] alloc_pages_current+0x187/0x280 [ 920.140547] ? lock_acquire+0x197/0x470 [ 920.140914] push_pipe+0x2b5/0x6d0 [ 920.141249] iov_iter_get_pages+0x6b4/0xf40 [ 920.141854] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 920.142443] bio_iov_iter_get_pages+0x22a/0x1200 [ 920.142889] ? bvec_alloc+0x17e/0x2f0 [ 920.143246] ? bio_alloc_bioset+0x2a1/0x600 [ 920.143791] ? bio_add_pc_page+0x100/0x100 [ 920.144201] ? bvec_alloc+0x210/0x2f0 [ 920.144683] ? iov_iter_npages+0x1fd/0xa70 [ 920.145093] iomap_dio_bio_actor+0x77a/0xef0 [ 920.145670] iomap_dio_actor+0x36f/0x560 [ 920.146057] iomap_apply+0x289/0x810 [ 920.147439] ? iomap_dio_rw+0x90/0x90 [ 920.147794] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 920.148348] ? delete_from_page_cache_batch+0xa30/0xa30 [ 920.148835] ? mark_held_locks+0x9e/0xe0 [ 920.149223] ? filemap_check_errors+0xa5/0x150 [ 920.149647] __iomap_dio_rw+0x6cd/0x1110 [ 920.150028] ? iomap_dio_rw+0x90/0x90 [ 920.150400] ? iomap_dio_bio_actor+0xef0/0xef0 [ 920.150841] ? down_read+0x10f/0x430 [ 920.151192] ? down_write+0x160/0x160 [ 920.151551] iomap_dio_rw+0x31/0x90 [ 920.151961] ext4_file_read_iter+0x2c7/0x4c0 [ 920.152337] generic_file_splice_read+0x455/0x6d0 [ 920.152743] ? pipe_to_user+0x170/0x170 [ 920.153088] ? fsnotify_perm.part.0+0x22d/0x620 [ 920.153485] ? security_file_permission+0xb1/0xe0 [ 920.153891] ? pipe_to_user+0x170/0x170 [ 920.154228] do_splice_to+0x10e/0x160 [ 920.154552] splice_direct_to_actor+0x2fe/0x980 [ 920.154948] ? pipe_to_sendpage+0x380/0x380 [ 920.155315] ? do_splice_to+0x160/0x160 [ 920.155652] ? security_file_permission+0xb1/0xe0 [ 920.156082] do_splice_direct+0x1c4/0x290 [ 920.156432] ? splice_direct_to_actor+0x980/0x980 [ 920.156835] ? avc_policy_seqno+0x9/0x70 [ 920.157182] ? security_file_permission+0xb1/0xe0 [ 920.157593] do_sendfile+0x553/0x11e0 [ 920.157921] ? do_pwritev+0x270/0x270 [ 920.158244] ? wait_for_completion_io+0x270/0x270 [ 920.158650] ? rcu_read_lock_any_held+0x75/0xa0 [ 920.159039] ? vfs_write+0x354/0xb10 [ 920.159358] __x64_sys_sendfile64+0x1d1/0x210 [ 920.159736] ? __ia32_sys_sendfile+0x220/0x220 [ 920.160151] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 920.160590] ? syscall_enter_from_user_mode+0x1d/0x50 [ 920.161023] do_syscall_64+0x33/0x40 [ 920.161336] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 920.161764] RIP: 0033:0x7fb1ac5e0b19 [ 920.162078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.163607] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 920.164295] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 920.164888] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 920.165481] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.166074] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 920.166667] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:00 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x0, 0x9, 0x52}) 21:04:00 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x190, 0x23, 0x200, 0x70bd2c, 0x25dfdbfb, {0x19}, [@nested={0xcd, 0x3e, 0x0, 0x1, [@typed={0x14, 0x6a, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @generic="cb35f17a79038f610637855608aae0d2d45d3e49d1ec14f7815bf1547b23390fa3bfd9dec0a45b3f7ee74c627561a3a48c03ad1f333be465d87a166b625cef83fc2845246e52a01e1c2d001e89e190f64d518160304df1bf67105b44d1ceb4fd6f4752835acc522180ff6960a6b32c61cbd9d1ea5bf3ffa08ae93de71204481ed4231de3c904737962090427d0cf5ef3e325fc6f53373afe6c4aecacbc3a9a197acb0672f7828df88c74ed04f24d02100c1f2c1c09"]}, @typed={0x8, 0x2e, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x31}}, @typed={0x8, 0x4b, 0x0, 0x0, @uid=0xffffffffffffffff}, @nested={0x9b, 0x35, 0x0, 0x1, [@typed={0x5, 0x5a, 0x0, 0x0, @str='\x00'}, @generic, @generic="6c15e3aded058966e4c67bbab7dcdbee5ddfd44e64a5d6b907941d0b574248165f4e50b2f39e0381fac4045173a4add105ca1a78bb925fae66fa2d16a701e116a061a3b258377bcf22caca7923d313a401779d5cf7f58dc34297b3160023358d55bcaeebeb829b9b5d1d39deb9f6b3eecb3fe57732d2190a346f0cc072d3236bd3a87a8b5a6af219f390b03d9adfae"]}]}, 0x190}, 0x1, 0x0, 0x0, 0x3b7d07bc69a6f29b}, 0x24000804) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES16=r1, @ANYBLOB]) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) 21:04:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:01 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) kcmp(r4, 0x0, 0x0, r5, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, @in_args={0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0xf350272f8eea88d3, 0x80, 0x1d, 0x5, 0x61, 0x3, 0x0, 0x5, 0x8000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x100, 0x60796564}, 0x84, 0x1451, 0x5, 0x3, 0xc9ba, 0xffffffc0, 0x1000, 0x0, 0x1, 0x0, 0x8}, r4, 0x5, r7, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x4, &(0x7f0000865000/0x4000)=nil) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000000)=""/4) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r8, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:01 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x0, 0x9, 0x52}) 21:04:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:04:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:04:14 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/8) 21:04:14 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x0, 0x9, 0x52}) 21:04:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:14 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 19) 21:04:14 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x3, 0x3f, 0x5, 0x20, 0x0, 0x4, 0x80, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x12800, 0xbae, 0x0, 0x1, 0x2, 0xc69d, 0xff53, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x75}}, './file0\x00'}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 934.077446] FAULT_INJECTION: forcing a failure. [ 934.077446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 934.078490] CPU: 1 PID: 6610 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 934.079061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 934.079759] Call Trace: [ 934.079990] dump_stack+0x107/0x167 [ 934.088356] should_fail.cold+0x5/0xa [ 934.088694] __alloc_pages_nodemask+0x182/0x600 [ 934.089124] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 934.089687] ? do_syscall_64+0x33/0x40 [ 934.090086] ? __unwind_start+0x523/0x7e0 [ 934.090490] alloc_pages_current+0x187/0x280 [ 934.090917] ? lock_acquire+0x197/0x470 [ 934.091306] push_pipe+0x2b5/0x6d0 [ 934.091669] iov_iter_get_pages+0x6b4/0xf40 [ 934.092114] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 934.092553] bio_iov_iter_get_pages+0x22a/0x1200 [ 934.092956] ? bvec_alloc+0x17e/0x2f0 [ 934.093280] ? bio_alloc_bioset+0x2a1/0x600 [ 934.093641] ? bio_add_pc_page+0x100/0x100 [ 934.093997] ? bvec_alloc+0x210/0x2f0 [ 934.094319] ? iov_iter_npages+0x1fd/0xa70 [ 934.094681] iomap_dio_bio_actor+0x77a/0xef0 [ 934.095063] iomap_dio_actor+0x36f/0x560 [ 934.095415] iomap_apply+0x289/0x810 [ 934.095729] ? iomap_dio_rw+0x90/0x90 [ 934.096065] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 934.096654] ? delete_from_page_cache_batch+0xa30/0xa30 [ 934.097176] ? mark_held_locks+0x9e/0xe0 [ 934.097619] ? filemap_check_errors+0xa5/0x150 [ 934.098067] __iomap_dio_rw+0x6cd/0x1110 [ 934.098473] ? iomap_dio_rw+0x90/0x90 [ 934.098855] ? iomap_dio_bio_actor+0xef0/0xef0 [ 934.099310] ? down_read+0x10f/0x430 [ 934.099672] ? down_write+0x160/0x160 [ 934.100074] iomap_dio_rw+0x31/0x90 [ 934.100429] ext4_file_read_iter+0x2c7/0x4c0 [ 934.100828] generic_file_splice_read+0x455/0x6d0 [ 934.101237] ? pipe_to_user+0x170/0x170 [ 934.101584] ? fsnotify_perm.part.0+0x22d/0x620 [ 934.101979] ? security_file_permission+0xb1/0xe0 [ 934.102384] ? pipe_to_user+0x170/0x170 [ 934.102720] do_splice_to+0x10e/0x160 [ 934.103043] splice_direct_to_actor+0x2fe/0x980 [ 934.103439] ? pipe_to_sendpage+0x380/0x380 [ 934.103805] ? do_splice_to+0x160/0x160 [ 934.108190] ? security_file_permission+0xb1/0xe0 [ 934.108615] do_splice_direct+0x1c4/0x290 [ 934.108971] ? splice_direct_to_actor+0x980/0x980 [ 934.109384] ? avc_policy_seqno+0x9/0x70 [ 934.109733] ? security_file_permission+0xb1/0xe0 [ 934.110172] do_sendfile+0x553/0x11e0 [ 934.110515] ? do_pwritev+0x270/0x270 [ 934.110844] ? wait_for_completion_io+0x270/0x270 [ 934.111281] ? rcu_read_lock_any_held+0x75/0xa0 [ 934.111675] ? vfs_write+0x354/0xb10 [ 934.112008] __x64_sys_sendfile64+0x1d1/0x210 [ 934.112421] ? __ia32_sys_sendfile+0x220/0x220 [ 934.112838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 934.113338] ? syscall_enter_from_user_mode+0x1d/0x50 [ 934.113824] do_syscall_64+0x33/0x40 [ 934.114212] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 934.114715] RIP: 0033:0x7fb1ac5e0b19 [ 934.115099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.116886] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 934.117526] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 934.118118] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 934.118711] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.119303] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 934.119901] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) write$binfmt_aout(r0, &(0x7f00000002c0)={{0xcc, 0x3, 0x5, 0x44, 0x325, 0x3, 0x152, 0x80000001}, "27de0a8dd99f1f04e12206336ed4457c34077a817e746775020b25ebbab8db958df2726680f6230be806363f37e9dbc10d13cb1f4a4671b4cf49abbd79bfe9f5c3f876d3f41b9219d5a4b77cb2304bb485dab09692509d07da7454b3783e42956366d31a7a9c7d479c8c3d52f62de9640c1c44dd93e2661ae9506b0c5de254db6b4b748299bdd8ef26ee857c6aef3e852e17aba41edb5fa3515af42b0cf4a9e0544a59e8f70684e4d1dd7f97d8482451e1b0c512a194f952b12b3a0ce2e75fbe437dacbdcffe44bc8613764465ae875caf3bc544bcb4c30d51b939f0667cde8c210fcd097e6b495c", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x908) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0x40010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_NOP={0x0, 0x5}, 0x8195) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000001000000180000004c65a0a04e33da93068d3cd54c67564871d3762a11b8bb078c02", @ANYRES32=r1, @ANYBLOB="03000000000000002e2f66696c653000"]) ioctl$TCSETSW2(r5, 0x402c542c, &(0x7f0000000080)={0x40, 0x5, 0x1, 0x999, 0x3, "a25f5d00db2a57672a0a58b7aa591b1da3dbb6", 0x81, 0x80000000}) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:14 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x0, 0x52}) 21:04:14 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000866000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="b0a7f2cdca912b15f9392b3c330702e822e1167f9508d99d06191682b3edbfda7cb09e539d83c81d50cd90e7ff7d6c989f3116a2767d7bc586cead3cd26e95f5b4c81b", 0x43}, {&(0x7f0000000100)="a743ea58d832f9693341fe0615c3e30bfb93a48c10ea65b08665ab81247da8d4be67362eddeb03b5894bfee4ae5675dd1ddb5ea818a4e85d0e98b81a08085a09f4d1fb53de90d283f4171eaa5fd7b1accddbfed672ddc403346f5c5317130542ce6ecbc3c1a20e2e0468b6", 0x6b}], 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000047) r3 = shmget(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) 21:04:15 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:15 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x48}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/85) shmctl$SHM_UNLOCK(0x0, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) 21:04:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:04:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:28 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) io_uring_setup(0x3798, &(0x7f0000000180)={0x0, 0xbf0e, 0x2, 0x0, 0x384}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) shmctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x1, 0xee01, 0xee01, r1, r2, 0x120, 0x8}, 0x0, 0x2, 0x8000, 0xbf8, 0xffffffffffffffff, 0x0, 0x81}) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) read$rfkill(r3, &(0x7f0000000140), 0x8) 21:04:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:04:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 20) 21:04:28 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000180)="77e668d3b8a1c66faba22071253c8fbaafaf3445988d74d8a59a26f0b4986e172496d39ce151038a5b493f99ce4be664005b0932f42d809d2090", 0x3a}, {&(0x7f00000002c0)="cab2e3cc3ad3de61dd47d3f301c0905c0c1d1d3ab02625b7bcbbc8834d4410509f9e5c8e4d6f88192996e4d065b9deec408b0dc2c9243256192da8534acaf9c51e027e49d9f710d6c0476f229c238c83a1adc2dd3f957a5cffe847a1d62fba2179b8a39ea4a8a910f1123ff429aea57b2e50f61f9625135b1639ecad84ba25c58629c9d6295a37265f5ee7d4905bf6ce0222e6342a9edb0bc2c2f2f062d78d24fb1ae5e8073cc8ed", 0xa8}, {&(0x7f0000000380)="111e311a8e6b8b40c6b1b7bc965bac3ffd06f387038d85f9821d42737743c6203ae92cf803ca059f5fc67bc4cc10fec7c0dde99bcb6d8e26e9fdb80885bc4149c74c2f40aadf2d7b996c7cc941c25b070af772e829ed73057b2978ed751c521991715e1c47bae4602aac5fb90f9e4fd3594bb28fb5ef126da62b74dd75320cdc2125a0197871273b6962e393d329a05fac6b8b6d05f00cfba0a0573ed9", 0x9d}, {&(0x7f0000000440)="0a06666e75055788ac4711ec033347cde9774a14bab6f5d66b16097c386701977902df116410a222d080b1adceae4dd37221045a0cd8108a5943d2a6ffa8447492eecd1372146b5938fc1cc561d27e4c03f6e943a48e6751fd7dd1bc12456a98880a64a9c0a6a6437110cd04d32e6cb19e1975eb3f9bc81601a8fa16a93c6f5bd6ae2cb6e84769320be6c3dabe3faeea68b0195f2b5004435d17fe9c87473199d4452fdc801351ff7dad0b47a94bc079754bd0c61884877335748b819f3f166512d3bc9d057b13ace069", 0xca}, {&(0x7f0000000540)="c7b699cb376c8e5387f45b469280185ad60dfa7679bdd7cc44a9c21cdb710c6ae90ab177471554b2e6884cd23dffc4e4d6b3fca8eb045ab8ec540d56a9d34c6b59646a5be2930e3928e824c27f2672c94b073acfa908a720d8d33086913cc139f43084e4bd132fb1036c306f4008cbd765921d392cfff09a98e6d3547e7628bf2d5198bf5ce792317593b5322f0df2", 0x8f}, {&(0x7f00000001c0)="a0e827826ce55251459092f82dbbfb8c0b6eb7c58522784a44e81ab9def6e66d60db4cbef01a8f92e8ad26bb562ce2281de091d4f23c12103f5c651de9391c27827a", 0x42}], 0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000100)={r2, 0x6, 0x605}) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {r2}}, './file0\x00'}) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f00000000c0)={0xfff, 0x204, 0x3fe}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000000)={0x401, 0x7, 0xd9, 0x1f, 0xff, "3d2cd15f8644d5437c3bee138f4a4ed47429f5", 0x9, 0xaf}) r7 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r7, 0x0, r0) [ 947.834215] FAULT_INJECTION: forcing a failure. [ 947.834215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 947.835310] CPU: 0 PID: 6651 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 947.835902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 947.836644] Call Trace: [ 947.836890] dump_stack+0x107/0x167 [ 947.837219] should_fail.cold+0x5/0xa [ 947.837569] __alloc_pages_nodemask+0x182/0x600 [ 947.837982] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 947.838510] ? do_syscall_64+0x33/0x40 [ 947.838866] ? __unwind_start+0x523/0x7e0 [ 947.839241] alloc_pages_current+0x187/0x280 [ 947.839640] ? lock_acquire+0x197/0x470 [ 947.840000] push_pipe+0x2b5/0x6d0 [ 947.840350] iov_iter_get_pages+0x6b4/0xf40 [ 947.840736] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 947.841178] bio_iov_iter_get_pages+0x22a/0x1200 [ 947.841604] ? bvec_alloc+0x17e/0x2f0 [ 947.841942] ? bio_alloc_bioset+0x2a1/0x600 [ 947.842325] ? bio_add_pc_page+0x100/0x100 [ 947.842707] ? bvec_alloc+0x210/0x2f0 [ 947.843059] ? iov_iter_npages+0x1fd/0xa70 [ 947.843453] iomap_dio_bio_actor+0x77a/0xef0 21:04:28 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x0, 0x52}) [ 947.843858] iomap_dio_actor+0x36f/0x560 [ 947.852587] iomap_apply+0x289/0x810 [ 947.852914] ? iomap_dio_rw+0x90/0x90 [ 947.853249] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 947.853755] ? delete_from_page_cache_batch+0xa30/0xa30 [ 947.854219] ? mark_held_locks+0x9e/0xe0 [ 947.854583] ? filemap_check_errors+0xa5/0x150 [ 947.854993] __iomap_dio_rw+0x6cd/0x1110 [ 947.860366] ? iomap_dio_rw+0x90/0x90 [ 947.860713] ? iomap_dio_bio_actor+0xef0/0xef0 [ 947.861120] ? down_read+0x10f/0x430 [ 947.861448] ? down_write+0x160/0x160 [ 947.861785] iomap_dio_rw+0x31/0x90 [ 947.862107] ext4_file_read_iter+0x2c7/0x4c0 [ 947.862497] generic_file_splice_read+0x455/0x6d0 [ 947.862917] ? pipe_to_user+0x170/0x170 [ 947.863274] ? fsnotify_perm.part.0+0x22d/0x620 [ 947.863686] ? security_file_permission+0xb1/0xe0 [ 947.864108] ? pipe_to_user+0x170/0x170 [ 947.864473] do_splice_to+0x10e/0x160 [ 947.864810] splice_direct_to_actor+0x2fe/0x980 [ 947.865219] ? pipe_to_sendpage+0x380/0x380 [ 947.865601] ? do_splice_to+0x160/0x160 [ 947.865950] ? security_file_permission+0xb1/0xe0 [ 947.866395] do_splice_direct+0x1c4/0x290 [ 947.866768] ? splice_direct_to_actor+0x980/0x980 21:04:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 947.867205] ? avc_policy_seqno+0x9/0x70 [ 947.867222] ? security_file_permission+0xb1/0xe0 [ 947.867243] do_sendfile+0x553/0x11e0 [ 947.867262] ? do_pwritev+0x270/0x270 [ 947.867276] ? wait_for_completion_io+0x270/0x270 [ 947.867290] ? rcu_read_lock_any_held+0x75/0xa0 [ 947.867300] ? vfs_write+0x354/0xb10 [ 947.867316] __x64_sys_sendfile64+0x1d1/0x210 [ 947.867329] ? __ia32_sys_sendfile+0x220/0x220 [ 947.867343] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 947.867355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 947.867367] do_syscall_64+0x33/0x40 [ 947.867378] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 947.867386] RIP: 0033:0x7fb1ac5e0b19 [ 947.867398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:04:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x43200, 0x0, 0xfffffffd, 0x3, 0x1, 0x0, 0x400}, 0x0, 0x8, r1, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 947.867404] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 21:04:28 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000868000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/95, 0x5f, 0x1, &(0x7f0000000100)=""/164, 0xa4}, &(0x7f00000001c0)=0x40) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(r2, 0x4b, 0x0, 0xd89) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="00000000000000002e2f66696c653100e03404f0ee872cc445083036a36430bd01d7228f60839ed4078ff86291ef58cf7c5d69f6268c83705dcc6a8dbeace4528395e53917a2374e3525c7ac9997514fa4616c9b7850907050a0dd776ae1a8eea4980892f381d4d70d29ab1d84950d2a9b835d7ac0e2d2f175fc36601a11dc87d567d7f746c8c2b037e5d39076bf694db44bd31eb7627dfc84e0233d0ec5d6c0bc3262d211"]) kcmp(r4, 0x0, 0x0, r5, r6) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x2000, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x20, 0x6, 0xcf, 0x4, 0x0, 0x2, 0x51000, 0x2f605b985856fdbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x8000, 0x1, 0x0, 0x9, 0x800, 0x2, 0x3, 0x0, 0x9, 0x0, 0x380}, r4, 0x0, r7, 0x2) [ 947.867417] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 21:04:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 947.867425] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 947.867431] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 947.867438] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 947.867445] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:28 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x0, 0x52}) 21:04:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/scsi_host', 0x86082, 0x11e) 21:04:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x4, @perf_config_ext, 0x824, 0x0, 0xffffffff, 0x7, 0xfffffffffffffffd, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:04:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 21) 21:04:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:04:28 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x9819) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f00000000c0)={0x0, 0x2, 0x10}) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffb000/0x2000)=nil, 0x2000) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000100)=""/31) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r2, 0x5000940f, &(0x7f00000002c0)={{r2}, "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"}) 21:04:28 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) [ 948.264811] audit: type=1400 audit(1725915869.019:12): avc: denied { create } for pid=6693 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 948.270044] FAULT_INJECTION: forcing a failure. [ 948.270044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 948.270060] CPU: 1 PID: 6703 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 948.270067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 948.270071] Call Trace: [ 948.270091] dump_stack+0x107/0x167 [ 948.270104] should_fail.cold+0x5/0xa [ 948.270122] __alloc_pages_nodemask+0x182/0x600 [ 948.270138] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 948.270149] ? do_syscall_64+0x33/0x40 [ 948.270171] ? __unwind_start+0x523/0x7e0 [ 948.270187] alloc_pages_current+0x187/0x280 [ 948.270199] ? lock_acquire+0x197/0x470 [ 948.270218] push_pipe+0x2b5/0x6d0 [ 948.270237] iov_iter_get_pages+0x6b4/0xf40 [ 948.270252] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 948.270274] bio_iov_iter_get_pages+0x22a/0x1200 [ 948.270290] ? bvec_alloc+0x17e/0x2f0 [ 948.270304] ? bio_alloc_bioset+0x2a1/0x600 [ 948.270314] ? bio_add_pc_page+0x100/0x100 [ 948.270326] ? bvec_alloc+0x210/0x2f0 [ 948.270339] ? iov_iter_npages+0x1fd/0xa70 [ 948.270356] iomap_dio_bio_actor+0x77a/0xef0 [ 948.270379] iomap_dio_actor+0x36f/0x560 [ 948.270396] iomap_apply+0x289/0x810 [ 948.270408] ? iomap_dio_rw+0x90/0x90 [ 948.270422] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 948.270441] ? delete_from_page_cache_batch+0xa30/0xa30 [ 948.270452] ? mark_held_locks+0x9e/0xe0 [ 948.270473] ? filemap_check_errors+0xa5/0x150 [ 948.270488] __iomap_dio_rw+0x6cd/0x1110 [ 948.270498] ? iomap_dio_rw+0x90/0x90 [ 948.270522] ? iomap_dio_bio_actor+0xef0/0xef0 [ 948.270543] ? down_read+0x10f/0x430 [ 948.270555] ? down_write+0x160/0x160 [ 948.270571] iomap_dio_rw+0x31/0x90 [ 948.270586] ext4_file_read_iter+0x2c7/0x4c0 [ 948.270602] generic_file_splice_read+0x455/0x6d0 [ 948.270615] ? pipe_to_user+0x170/0x170 [ 948.270633] ? fsnotify_perm.part.0+0x22d/0x620 [ 948.270649] ? security_file_permission+0xb1/0xe0 [ 948.270663] ? pipe_to_user+0x170/0x170 [ 948.270675] do_splice_to+0x10e/0x160 [ 948.270689] splice_direct_to_actor+0x2fe/0x980 [ 948.270704] ? pipe_to_sendpage+0x380/0x380 [ 948.270718] ? do_splice_to+0x160/0x160 [ 948.270731] ? security_file_permission+0xb1/0xe0 [ 948.270748] do_splice_direct+0x1c4/0x290 [ 948.270760] ? splice_direct_to_actor+0x980/0x980 [ 948.270770] ? avc_policy_seqno+0x9/0x70 [ 948.270787] ? security_file_permission+0xb1/0xe0 [ 948.270807] do_sendfile+0x553/0x11e0 [ 948.270826] ? do_pwritev+0x270/0x270 [ 948.270840] ? wait_for_completion_io+0x270/0x270 [ 948.270855] ? rcu_read_lock_any_held+0x75/0xa0 [ 948.270866] ? vfs_write+0x354/0xb10 [ 948.270882] __x64_sys_sendfile64+0x1d1/0x210 [ 948.270895] ? __ia32_sys_sendfile+0x220/0x220 [ 948.270909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 948.270921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 948.270934] do_syscall_64+0x33/0x40 [ 948.270946] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 948.270954] RIP: 0033:0x7fb1ac5e0b19 [ 948.270966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 948.270973] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 948.270988] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 948.270996] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 948.271003] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 948.271011] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 948.271018] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:42 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:04:42 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) 21:04:42 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) kcmp(r3, 0x0, 0x0, r4, r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x2, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x18}, 0x800, 0x0, 0x40000, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x800, 0x0, 0x4}, r3, 0xd, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') signalfd(r6, &(0x7f0000000140)={[0x9a]}, 0x8) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) flock(r9, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x0) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000000c0)=""/13) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000000), &(0x7f0000000080)={'U-', 0x30c}, 0x16, 0x1) readv(r8, &(0x7f0000000900)=[{&(0x7f00000002c0)=""/232, 0xe8}, {&(0x7f0000000180)=""/126, 0x7e}, {&(0x7f0000000440)=""/143, 0x8f}, {&(0x7f0000000500)=""/238, 0xee}, {&(0x7f0000000600)=""/220, 0xdc}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000700)=""/244, 0xf4}, {&(0x7f0000000800)=""/211, 0xd3}], 0x8) pread64(r7, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:42 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) r2 = dup2(r1, r0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f00000002c0)={0x0, 0x8, 0x1, [0x4, 0x1, 0x7, 0x4, 0x7ff], [0x8, 0x3, 0x9, 0x100000000, 0xc, 0x81, 0x2, 0x3, 0xffffffffffffe032, 0xc23, 0x400, 0xfff, 0x2cb4, 0x5, 0x5, 0x6, 0x1000, 0xfffffffffffffc00, 0x1000000010000000, 0x400000000000000, 0x1, 0x6, 0xe8a, 0x3, 0x3, 0x400, 0xffffffffffffffff, 0x4, 0x7ff, 0x85, 0x3ff, 0x115, 0x1, 0x71, 0x101, 0x9, 0x8, 0x3, 0x6, 0x7, 0x7, 0x253, 0x200, 0x9fb8, 0xffffffffffffff5b, 0x401, 0xf11, 0x0, 0x493, 0x57fd, 0x9, 0x3ff, 0x7fffffff, 0x1, 0x80000000, 0xfffffffffffffff9, 0xffff, 0x5, 0x101, 0xf6, 0x4000000000, 0x5, 0xd4a, 0x7fff, 0x8, 0x0, 0x2, 0x3, 0x8, 0x7, 0x6, 0x3, 0x4, 0x2c72, 0x3f, 0x200, 0x7, 0x40, 0x0, 0x7, 0x84, 0x8, 0x1, 0xfff, 0x401, 0x200, 0x7f, 0x3, 0x1, 0xffffffff, 0x7, 0x0, 0x3, 0xfff, 0x80000001, 0x200, 0x8, 0x0, 0x4, 0x40, 0x20, 0x81, 0xfff, 0x62ac, 0x3ff, 0x8, 0x1, 0x1000, 0x3, 0x7ff, 0xffffffff, 0x1f, 0x9, 0x4, 0x7, 0x7fff, 0x3, 0x7f, 0x9, 0x7, 0x1000]}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000700)={0xb, 0x6, {0x2, @usage=0x1, r3, 0x7, 0x0, 0x1, 0x3ff, 0x5, 0x4c0, @usage=0x2, 0x3, 0x3, [0x80000000, 0x2, 0x0, 0x2, 0x6, 0x6]}, {0x72cdab2f, @usage=0x4d0, 0x0, 0xffffffffffff9244, 0x40, 0x7c, 0x444, 0x1, 0x65, @usage, 0x80000000, 0x7, [0x5, 0x80, 0x2, 0x1ff, 0x7]}, {0x4, @usage=0x101, 0x0, 0x0, 0x101, 0xfffffffffffffffc, 0x8, 0x6, 0x4e, @usage=0x8, 0x3160, 0xff, [0x0, 0x2, 0x9, 0x3, 0x400, 0x2]}, {0x0, 0x80000000, 0x6}}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) write$binfmt_elf64(r4, &(0x7f000000ae00)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0xba, 0xff, 0x81, 0x9, 0x2, 0x6, 0x8, 0x1a9, 0x40, 0x3a1, 0x7, 0x5, 0x38, 0x1, 0x2, 0xaa, 0x2}, [{0x6474e551, 0x15d, 0x34, 0x401, 0x0, 0x9, 0x5, 0xfff}], "943debc12e6d45d38845fd019d1aea750b79f0df12cc3f62bcd25270046278e52beeb81624b9c182e8b60debae4a81487183a635620472f3c15d2169566cff612533c3ea07fcecaedbfae9b3c211037d852b0112dd55322f575bf6bbf336a2a523db17c4451396335196ac09", ['\x00', '\x00']}, 0x2e4) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x28}}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000e00)=""/95, &(0x7f0000000e80)=0x5f) sendmmsg$inet(r2, &(0x7f000000a9c0)=[{{&(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000100)="35912b3c57c9421d39bdcbf33b871d818b39c6cb70322c594472cbfdbf8e1767bedb1fefa553571d05c67ef12b52525445f9695451922614af3604eadc99e2358f91fa7f41c4de20ad5555b4ae1978d93561ef6e2fefbe30e3678a656cfdb74a15e1227257ed53adda0845a33708e43a310c7f", 0x73}, {&(0x7f0000000180)="cac93b388bd4af2929536440eef4a0a3bf2136a61560debc50566bc653ed43fc10fd5a62b4b8d56ebd13674e3835c50de95a735c0775dc6a4f3d17b579c9687376304d1b377044e39e119338ba9dadd04612be9364a86995385b5d84e9e457c3da282c09fad2ce14f536306e7bf808fabde5cace26199c0d1b70280051c300aface942b8886e81fc", 0x88}, {&(0x7f0000000b00)="d9fe04b2541890902756bbbe0da829060f1c2582b82e4729ad12ba2d60f7559dcc3106060a8547604828907c7d11aa092901345cd30aac4e582bca09dca8314c0fa3ec81fb", 0x45}, {&(0x7f0000000b80)="86c17c3de159fe76bfe4d50250cea93b5f2d4b44118d1a011a844075a0ae5584f2f50590796c1e1e3a400d2ba74135866e6df9324c2e9bbdfbc5031ba47dde0dd34871036779387eaf88c952647a18f082986df64a78f17738e112ba9208144e181f443fecbd434c4d6c307c4454641792e680a0d07d2cb5393b620a9c293d145fe7828eb234f47bef", 0x89}, {&(0x7f0000000c40)="ecc12b9c9ef1271144346963ffdb9fa43669bd3d86bb8650f5473134be47e535ae52eb7c27c291b65ffa83e166b52d2c3acd6f6f85eea935e485844a6c1d0d49efca949d9c5318fa3f67319b634dd6212d59480d5b6ec20fa9b3d8bdf6a9fb81ad69ec678f68b64345ee98", 0x6b}, {&(0x7f0000000cc0)="3334d04bb95f373913ad8bd203445f2c822957c1c8eb138706bc15558f90a1fc3c9f456e0766075269d362921854c7e6f572a2f9f3c74ff0b494a7e02af93d29e66083c547fb0460984c85a173952750179541b92d1511bd250ae59c09ca782fc98e3185276e463746876e24ad5367a6100279c3eb7cd87d8c42f736d3246fbfc41dd0f12f6c5c351e88850aaf39355c8eebd56665769f3396acb805", 0x9c}], 0x6, &(0x7f000000b100)=ANY=[@ANYBLOB="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"], 0x90}}, {{&(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000ec0)="900289270145bcad339bc5b58448a499fb558552072e3dd704e0e34638eeb1f53e9233bb8da805c35fb51798845a9de2e0b98d72e8a5bb0fcb2717dc4363dfd642e851ef42ce4613653e5b9eacc77ef5cd8d97b579c180c9cab730e486ceedfff8ea593cefe06c32a551ea54fa7285b96a3013a026cf6975f4b7ed833914d213e0d142b3d68efb0764e412c9ae4e311a5ddac0879c927c58148926c8d8a71cb0b1ce47de71de0e06ae15540d657ceb6c5f05789dda55686ab721c8aafe38773369b37338bf1037fe25f18348bd333649e443fe7b6a1ff51a5c5312d811c9", 0xde}, {&(0x7f0000000fc0)="ca81dd3f357d7eb25055fcec9d7150478320582e053d707932514c73be3bbacae17f7a722984e5c2c9710901ca74b7a0bb9f2718295601e29cffc59023ecda03b8930b0e8e7e321e3615a18d1e245f472a0f5b7e1e5f65bde3967e4eb187d8b05029126092db9f954f7283fa51adcfa1d685ee435ac9857a96d9bfec82e8ab4e169bf3233bd02a7ca275268d814f9a69e451e9a4a524b2213d8482f02da6550423904bd93a", 0xa5}, {&(0x7f0000001080)="f8fc4db0bb3d2ad4a9bc553adc4a115cf474b4c5eaed77886541c7d90565dfeb2cdeedafcd1abfa9a59697ce2672b5e7d80e92364bdc6f31a6017cfe72a1ed0c2bb6effb16cdb8", 0x47}, {&(0x7f0000001e00)="85f6e41b1c9a2ebbfb7887c268cf0bb145b3b1a6643f09a77a7f21cb227490465a5acc7775b48575c4bcb1bb414277f07c8d4d8ec27b286c87a802a9102030571eae09d53dea5bffdbece7349fc5998d5226e80db89c82cdb6b2b0c0a10ec7d8844a9f828c3bcdb782969a1144690d7294f81e196501d01cf2ae6c522a43cbdbd008931faf95af0c768cc52f3dd12afe8733ff08fc21404c5e07901ce301d468a3216112d50a5fe9ae153f768e2d9ca0de91aa69836738d508dd8e10860f929578f19549481c5fd440b18f9280122699ff2480efb050b793217b44dfbb041f1aba895ace30971c1164bc9ccd12a903e185783b591707d22d0805bc04479f4546274b67e896a5faaeef03cd29ae892f4a9f13f1eb7f00adf86949aaa120428f934dd82f09baed65d27f219bd27df0bc6fb83869d2268a0992db40a71d1a46ba15cad2f5b846e343d36abf1f3612c49469162ee507fb2e6da3bc0e233118e2c314f7711c036a0baf5ade805b61656b90a418bac71e34dc91c9a42007eb59c78965a19a368f9398531c90b0ea261d0bc2464ef98d78e17906b80e41017dcff9715216b18a00ea992005dd82f36b209c94df7731a094310c1f0177cc3a9ebdb83df81ffcf00f2767feb623ba6466c0d738a5f60bcc34df988fe3cf915f5f33569714dc59ed066a462a767fa464ef2ed29f133ef559844ad30c429fe50b3736f7fbec862b9ced7a548c541e36ab12096b2f912062c85c308ea1475fab41f7fd584685857c5e0347747561bd543721298583576d523d0ff5e7cb53824c3b5b7c2286543ddeab1eb9ff999cc9261d174ec14737133d74e3c4719a33ce808dd823a88d195ffb4902a22ae9691c44d18b00249408c8a918804274b329d9004c7dd6f6b1eaffe4323dd2ba52558555dc482ed0b806f3ee29f80abb04dac49359fb474e63e0f457cfcb633c78e1a5f576a1426986c378ffbf429d6d66d7b78d42957ae775192a17b42ccfffc3a29712dd7e07cb2bd1f03e165611f783f065900d8fa98cb208ae8a2b7cc98ea4057094c19d315d541e48dc62e928aa92887e0fc147f1023a4235a0082f8eaabcbb58de5b9964d397d97e30952055b22a9532ac4632229c01a882b5ab11798f63e1f9ef3dc10924f246a9056b0e53ff0797dd0133f22649a03de1c7206ea611f92f0f1e194d0480030ccc7837c2268c2ca1a1852b64b694076f837b260b89be208a379baa3c6253f32d2d51e6c9034f2253b2c6e6f2ce90b8e1e1f8b3d36da746324a75d3c96d93656a2369b658c7db4c2d962d72f78fe9e683d8e9a66fdc4d8f6f9ae4ca6bc0dbb7790fda5fcbf9d0e035f0c8268f84057d7e359403294e4cc7445712eea8000a8c8dd3f135e90960c867c39ffd37469131cd6c26cda9ee651414a150b62b9b6cd201023b020cf5cf47b34772129196a2b06bcfd3dd4d8348b06f0a717be1e485e2b274d534393baeab3487927d1952a1cbb7d66e40bc8753694e4f961307095b41f7b34ee98aa908733272584e7118a139cf9f970cd6557d76863c42f162c4c65cdf333b4b6b41b25498151a554f45ff6c89386966b117b2e04ad84d9835cfe62527d14cd7569a2a067f357893a894a8d878a98b542e3e78b1dfa7eae80f7751e825341e07a8bb39fac87e86d04febf4e7a248ce88705760781554b444c1b8d721f9c14dcd6be177815def27bced144ef5167459dc01f5e339fd7ac15426b4180e46284e15469d0175a145a390c59eb2f48c71052f07a35bb64ebc9fe82c07ff9724bb951fd765f240d8a7fa4bfd79fe4dc759d20765496eb0eca8be1354fa1d66286b8e157abae91f68fc4d06f5c9599e0cc928010438ff514346651185e57d73bcf5edc551b30b44cfde5d25bd93bc63ef81decbb3194e0ee3c734f57fcf6dc081ab02803481e706f496fd89e264ff09927f3b6ada15fe6ead7671b4ba22dcd9ebbacd89bb64424712f71f80bad1d08ea8dd7d5e51e6fd0bff6f733a9dcc87ef817e159aa82e45108ee1dbdc0f59188fc9ec558dadbab4690ae798d4d5cfef01b41b8091aefc8402199b8018fb55bf47a474e75856290101b8f99a631e40087b22685b23df501836ecc360b322b66cfaef3edb2182eee433c016186cfd58031c18f6285ef6e3ef894d7b2e977815ee82700e6205fc25f461dabc71660cd930785ca1b89d00362aa4a1b5ce4d975a789c9cbd6eb864c7812e777aebf507ff56e672fefe110a65016614e3449d5816164adfe3c297b3b6c71fe51f9588c12965be662b84ebc18260015555dac58c227fd89055894f047d3157106611de6d6847b17e67b375a688c132f540f48b065bee94b05afb89110fcd9197a90a268a1512c841f6c708075a59307e57bde5523e05568e188aebef25a4cb4cd1d23da1d5b6f7c20438c0ce600e4c7e253de819d53c783a1d8132a961ddcedb6733b5e8e17be718f14c3df2802f8137318c42f8c7198025adbc89615801f8ded7ac702b749e922f0e4583dcbce9acb247e76758f240a665e67e99b5575b04de01c0ef4f4f37e744bddbcde773a6525102795f7b5ace47edb67eba93e470271e630af502b069bec4ead2b555663d22731a0bb093baf4e358782d05b5661b4f23b4cb70a557ad3b0675039afda6f7a0c7e06b9301bf762d173932ea352f334daa14692ebfa989a8441f6a0409ed9d99545d6d07a7c707537aa668b7aea5d905795b51797084cfaa899e1f4c3d1c549d70f5cfc7b94679024920c27a2156693df8b24d3db4c0ff87019099bf6cd72b9961495ab5a1a1df4877fe6f12d6cdcebbc3f0d9f70af6af283307a73c96eba8f0c6fae7ee87b96f23c4964f9e24f08c2ff0aa6b290e7fb69afe3a4764b7a66890d9b9b4bbc94404677f849bf33d9126f3944a1cbd3747f4f5c1e6782c963959759f5e1abb450e96db5c2b1531f7e9755e4beb6697a083d5f1af48da5d0bab1b5deb7f172cab6faa59fc9f0c55a33999fe398b87090997d70dd981d624e9a4f069cb514b438693da1d49697bffbff108d15d3946776c3237d3ced0d6332060d4d5027961008937452565b3d7cfcb8a1b141440537407fead795278b8731cb00ceee8bdf9a99086ceaf8d4c35d203053c39bc057d90f11f05e02ece0b83fd8258bf93d278d96034998fdc8be09d3c9e2f3cff7328c81de9525daf2a74159b97ffc4fbb77be053f98a5f822e91b84b647d409ad12071039a81b11a8b9e57f87d200b87ae8fbe6814d545b38925378a5c72b561abf65590803cc76cb7456a544cdda518d132359274c02e134218218d730834dcd314039cc0f6afcda96908b2276aac8fd72d5e5fb903fa9e6cd23bb60da3f93497ef43a14a01d9684223e9118de64c4521f3dffb4a3d3cf3571a8b7b44a9ce6b8b419b93bd7b1edb24366273654359d3d698c1d13b7924894d8a6a189187f3380d6e64b0f2f50a0f38682d3508ad8f2f1ff0e62ffbe106f17f7e6dd938ff2fa3b42d9e003dc2d52490e63278faa5041a28987f4f674d1c1960b841b331cf03d3fc013783e9ddddaf478fe98bd937839a6d7ad090243ccd0418e222bb759c78204d31ec6522a314fda17bcfd5a001ed356998dab87d9ccbd1dc06c0ae62bb19bed4ec447e689bd7d64d48920eb6f5d3ffbc6198f670c8b3c5dbc91b372208a195f2c93d2c419cf335ba7faf0d3664cf2fc4c19bbc0ce3bb451c478df83f565b56fb013cde15540234e6d18ae21e9e7db2e852b987a5b2805e0436617a38807b9761de2b26ef3ffe226c84b0c5d5ba492d854686aa2a99d749f0562e4be8c38f45396e3945a72c296d64aa961633ee73724f391ad35b4bf2a91b8e0c66cf07e71ab628fa7d0609ba87c8a36712caa2ca81eff7b431da5b0b3e9f90a52480cc033d619f05b2873a1bedf094d8a18706d27c34fd8a6ec90e439086165a74a7ee4bc3ede281ce3d9e8e46bc8cffd2c763843619f7c17233d1316133737fd412dabef3b3fa89fabd5dca99dd5f034206214eeb36ae4c7917f77862b6eb85303df3f54727857e8149cd78de39f064b237e7035910d31c37b7a11f22c773cb148a77fea05035c5353ebdfd47e374400b194add0ae6ba6a50b45b088b5a1e5ce655d40028a83ee33ac46c1e37a36e8aad57dd994cca97709fe61d53413b8d1224ce09971c4189e247a0d96680b2f90955b69553667298cdf248a1cb963fa061a3b92c230b6292db64d435b435cc049f994d1b4c090e962444bb43fc12a2541eacbb980d56c28a8b71acf937307502030a68daa0dad62370402bacc469785aac69297b3edfea99ad7c64d31e7bf9b34c6321361d6bb4d4117daf44900ec42a6638d2f6073864b7f7ff3408f6c14865ec7a7a17f4e68c324af147da772b511e12341209f44aec6d313656f5a6bff19f765f68c18d62c1f815a3be17d190c15cacd94eb007518afd383edacb9ec09e96496b1678ad68392aee42d20a8fda4da422a2c63309b1f62b39d2eb8c3155d3ed2d12dc29d3bc8a413453027732f901bea6acb5f9728c1508c3b23cda530dc0ea9b49899e395bdddc46ee2a5b1e83c840f249ab11ec4f68af77e3474ad6b267c983804136de0b5d1c1a80165593b86b2d7fd81ac9b2aee739bc1384b96569965319f36704c5939c4934b50b83422787a34deccef71fda481068186d551929140e70df589ced8e19046c09c8577c3a09051a1b6a0951d493ae5217866acb58b22c3c30da9d77f73018e8d25b40469652ed8a6d467e55558691e4d12c63c767bf2abf9a3be585294777dcfa4599862dd64c131e4db4857b4443c653414d5d8e1dc02f733dd3e620484c6f6c100b2dd2341e6b5c45d46b6062c225aba09ca46c3951e629c3151f3f5f43a551ca63eee740581e6b05d270fb4208c27e217a566cea6671dd93b9528360323f7a535bfd1a818bfe26c0883e8991a31284ac28a302f8094b0b93891cd30ad2ff2b3e4fd631d0c3b0d854415f87494156deed358d3726f5dbd6b5b4157d4658d9a331d7faa1f7a878e8fdfe21071c7f90d58e7204f52190f90381225e92721603b1b938eb58c975b12a0b7ba75020f469413e7c8c493fa99f6837b7125f6ab7f30d5a837c6dacd0d9f7c8e7f33a81bc8a94cb9270bc9856f8f248e6582c78f7d2107df0cc3fc26c94e9157ac470c2f5f341cd63157fe123af35556a1f395056c17697d25b22b883f8016a450c4ad8404ba47506cd75372198e67439bbf893acb46d8617c8f58b4c86f933b7600cac9179fb467123e087b7b7862c933532f358ab8195f30b17c89640c08d9b0bdd8099701946f21c9bb1cbf6159e6df077b47fe5e48f3b03f0a61aab123f9d3a13fe43a5ebb76fa4a91ffdd68d0127fee9c87e9559561f2f8ff6cca290d027402b850a0b167d85e5bb8b92f20186375afee3626ebb31adf6cd3513daa4156e72c641eaf94afb90ea52224cf5f361ea86056d3b757f97d234f876be81b931ea66fa9926cb77c7c0ed12c1c6c440fc8e7a8f83b67195180ebaf75fe542c7ea68c0a13ce10f4066971ae04e334bec850308de752effbc984a9e1e85fb3f1a3fa73fb3e8a26d48e0632a0d4ff5b3d29ee23c3d62c113a6e5bc9c1f62c18fdf64c98f418a777ee0d04d7e88204be7c1deb9e0a883898cbe95cc9efa2d9bd6053bb10f7a75baabedcef38128d7f80a7e9473bc5329f006812573c450b91d283ce90ace533ad92b858133a83c428d436f285edc9a57a4946f4fa657e5023d68dc60712241f28bfdb6d3ac8c19f567aa364a22aba15dc4855e727aa067", 0x1000}, {&(0x7f000000ac00)="b289c5c0eba2f5e71ae4d4b0eed6811f6e2d31417c994115389ad1c2ba16d3244935c072d046c31962b5240a5bed5195366e4767ac5372cafd4ec162e4bb39afc23e1d95970f148b00081d03db8858e8c4ea49fb33b83f92c97851f0e355005d57672d5429d3de703e392593ddc8256476d15107a96bdcafc8cc5dd1d7de28ec7cba921dbef9ec56df39557834755bb4d7c6bcf508385c88fcd19d8d41f4b534fc3ba329a39e77ca5a22aa4c7f1ddcd12b705aeb5fd03730", 0xb8}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f00000011c0)="48066fffa1fd1611f8cd1965822e", 0xe}, {&(0x7f0000001200)="05483cb46819a5fa51e67cb52a6d314fba3b726e67b0133e3dee1e31739f399696dcc581f07cc5cc3d08a550a1526642c32916ef58e3ef2d44e876ec112379fc131faee99c28a65987fb87254099107d89578234b30a0b7723c2857c019adc4e8a6d57b0ae10acacfa0deebc4c55c925ed71b7b9dc2739fe262f36452411e12d759658", 0x83}], 0x8}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001340)="54f32ccab6feaefc3f946de42579f3c2cbb1a27bddcc531978afce091905d98e7d620d589f3d1982c2a8f276cfd393968a929fe669", 0x35}, {&(0x7f0000003e00)="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", 0x1000}, {&(0x7f0000004e00)="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", 0x1000}], 0x3, &(0x7f00000013c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x12}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x24c}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x34d}}], 0x98}}, {{&(0x7f0000001480)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000001840)=[{&(0x7f00000014c0)="02e9892b789185e7fba5e5c23f9599c8321ae8c05a3dedc5d77dc299f3e637929bd061720de779653d5bb6088c455d5a8aac6afd5f42fcc3fbea3f24379d279c961cf0e534d33c8e11a21fc89740b85cbb52c7314731f256510c3b8a54ceaab86f3ce484bdf6fcd3c447cc1121517a90da0998ff0a4cf5bc51e741475c9fa3402da649a35f6b1023ee6b7f79c8d802a36e8dfaaf195224cb4153c652b60ed14771c00fcb2335a0b15319d5a7f4ee148beff01c69b93ed842f7485cd97644383d93b1d23e4e667cbfc747cfedb09e707c5b0a6f2cf68065e25fbe0ebe6cd9fae9e04f8646b9278dbe", 0xe8}, {&(0x7f00000015c0)="9444bc16a05d623b53fc7c67e4ebf84b0b4a2fe0765e57a8561744ee7326a3ddf1642aacaa5706020d52f612b93c228dd1de2eeace12fac0bf72c0d8ba8c5516bc64723fdbd7077e2719d9f223bffdfe069048dfe6cda3a7721288391d72414bd296054d0e15222f0ee8afe331ea5f8972a24cde1e29c31afa48625059d6b02b0af16071318887975b9cb9b8cc5a010c00b48b0065af8cf6e253d3037ef1e22c789c9218e4f9dac281a52ac28092460a8e2b8c3527", 0xb5}, {&(0x7f0000001680)="39d8f1ff80edd6b0acff629dc37e1d89a4d38db84831a9f7a06b6fb86a32128801cbc176c740fbb9a4e44d008f8d7d7c9719ea932c0f975a1bceb44b02db8230e6b1e04690a866fbc4d45f0dae1341000c2d859faf714eb730ee2336d8ebdcbae3521ab0f7338327b07f4b3257c308204ca17c98acd901277749e623dfdff3983983dd917a28daea1e94f616745039b6eeb18a7e849267d24c00142ada2c62be33ee09dd44fc0e1c825dfc7a36178ac46594c948feec5eead2a5bfee50f79f4ea89f6e96ded6cf22c8073b14103812837537352727d698491ef028f20c01eafaa542151ff6271109994612e68a", 0xed}, {&(0x7f0000001780)="55254f96ff6830076315c42eae01e9c0f755e2b8d422b10fa1cfe3e9f1799928346acb47518c2861047aa91b0dff62a1469acf607c8ffdba19f1e5009273cb11924dc07ec7af82421544878e2d36d621db022a0e81988f1023f3d058b98fd5314a39d5ac88e36eb8b1d2a6a77f6f230c2342ce36f2c947f5ac1e03ae26c9084673212a5da83f8f5d9df5", 0x8a}], 0x4, &(0x7f0000001880)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @remote}}}], 0x38}}, {{&(0x7f00000018c0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000001ac0)=[{&(0x7f0000001900)="48fb160916b4873d68b6bbb055edc83d471a66b23d72d88ec0e0dcaa823c6ea2ca4f4ffd526a4657f9aca19fb227d30064a000f6f209270af8d1f6350ff0b37ded55ae913004ca148011137e3539dff4261899e225f9b42dba8c9cde5e6c0941b3039d6963d244d130f7a8a63813a233ac24b1eead0113b494937197ba241d01b8325365ecdaa49597bd3d00539bbb7d9bfe6fa5f14baf1f69ae6466513e6fa9dbfadea85d6c8708f958c606c5aaa0c8a31d3baf29f829b17d0f093b38559a5f931ab8147069259cf8c8e0b0fa16689bc1e7611cd76ee1385109113597f19ea3f83441ebf5471644852d5f59", 0xec}, {&(0x7f0000001a00)="f74ec4bd8d60bc3e011b36d16f0079695834fb6db6053ef338c4e2adf5b5efb982a479ea3a40efa064f74b08d6614d214b65f899b1e59436e0ae0c8258432f1670ca4199352131493aef32", 0x4b}, {&(0x7f0000001a80)="2d50adea8335f60d675a60c1e78380b494831b4f3a55c2bb0a302dd2b4001d5b7a35ed10a975955c5b113ef21f216526", 0x30}], 0x3, &(0x7f0000001b00)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}}, {{&(0x7f0000001b40)={0x2, 0x4e21, @private=0xa010102}, 0x10, &(0x7f0000007140)=[{&(0x7f0000001b80)="0acba6bfe2fbb64bd7237c58f9dc8e8f3c00531f49c3cd873544818b7c5dc9a9bfd3b4fc51a79fb13f10a3d60c6d71c8f0ada8be99cd52", 0x37}, {&(0x7f0000001bc0)="1e981a72c3d9b17ad58389e2c2c19895622f7e69883e3e63b01176a56656dbd9461c6ae1ac49e457d2b35fa120e50e79c979237ded6560308a68c6e3da0871b78ee51a4b1433656fa71c895dd711e6cd145d84ad1645e7247b2ca8b901785197ede966b8a8aa6b6c3233098db0a902ed503aac9dcc271ebea094a324bf5fa2565398a01c985a7eec193f22668746417bc4d6032b30e031fec2c8e881cc1766446c77434799e38e64550a24b77d07765bb20835e9d11ececaa3a295ff23b87b84fac79e0bc38fc078493f0f184f13566c1ef729c833f62d3fdb977360e90bf9685480230d5ca0a3bb358cfe3dea", 0xed}, {&(0x7f0000001cc0)="6a7a3faa1756469d312106925ba24ea873751add9e6971", 0x17}, {&(0x7f0000005e00)="61cc7a7789329b20abce06574b4934f9a18b9af514fd823cd31300457b3eb64ccdf44164c580cb92cb894b5aae4aa91122097d1bc4b6d735002b77452c67f534098e86f84421e1860fccc8233da1a7fdb6e8f1f2c9fa3e7d8321a5df25981e9195447ae8d96d6f5bca9f09b2bca00424d1ac86e5eaede39851f022fa877804ebdf9b72841d30b70fd6a237ce2ceeec93a87a9a82b4f78002c93cef138d26b4b2826b254501a0845b17a83fe4eb64c5a32b701d75a02841463e1698dd", 0xbc}, {&(0x7f0000001d00)="d3b906ca6451b0a52c10d8fbf5", 0xd}, {&(0x7f0000005ec0)="768fbd02d2494c7985518a891a7aaef4701a8eaf2361bc235eb150e010a0c016b0c1ec4e935bb774c68b7e9c3777abc48f7a6ebee14bab00273ffefd770088d3fea7d422efa37635595ad1061023f20817f557d6711991567b1962a33d46ce5e00109b7b76a9460c47ef94330b2e6347fab9c2babc2b688de3a371f367f3d5258e025c66cbe563b9fbf8d2a67a9d122531e079aa89882b2abde60b5fe442d6aa9537fb9a56c22089da3d77e9ed0a8e5363c5f292955fb46706163e56832a11e0cbcfbaa4e43cab15d25aead59d3dd30b75f0808b8150c85505b0e081d73808535c6b84e377ddef89eb13c052aa511e97cf30dc191f63f163ede40a3db69c42bbb0f779666dbaa4494648a9327ae1d97ecbdd1604444e0d237db0816abb193c76dcf1e7a51667cd3367a64a346e75f6cb3b683ff3c4ef0dbfa9af5d9c6a011b4e5a8f9d27396646729e33028ebdf04ac7e216f6e8785bc16d5f228dc73350fe897b78de63cfd96d117988760246f87c5b5d3efa809c8e13c14bf107ea79a960844d8c146508659fdea8c141db65feda92875b7cd3effe818365caff2af1c4d20cc6bc7a6fbe870a68fed0e751db23f922778a78605fd68db2556489d29738b3a0756c420d574b36ea67328d8483ea2046e95a56b2e8051d31259e230e133ee5d1c25ee173547c8f46d82655bfa66f5799e8a1e66cbce44c4b548a1d720e4a5542697bb6c2040d468ab4dd0704c42ea12e9b4c6afd839d72b31fe880775e68ce6c26457798b83bcf10ecb9a095f7e1cdeef947172ca7b6eb284b0fe62e20d23b99f7ab85b494ed3054fdc0483b3e910eee0861590278ea0b7282762ef84efd99c057a019c931c5d446bfe9aca842e1446fa40a2801c48cfdccc3c96887a2070f2c1d498c8edb5402d94dca8d3f62256deffebc4af6b0b366c61da6beb9dbedd1d8395b7e6c766533dbde36d0104de3ccea021e92ec8950de868260732497aa82f9331306ef09a6e2d4a2e9979400fb7fad593827ff39bfd9198dd926f4775810af4845c021984bbf182af7449eac256417b13c086bfc7fa64c2ce4863a017d19ecd0e33b3c2fdd6d2788cc730b7c9d9db9085c0e4b21b8744ca0f3348b2fd60f6cfd55f14e392eb3440e0abe1db53273445da6d0f8e98191d4c1cc3a77cd00352a5a7d2b8e0a9740d73c0b6290803e6a0ac9d4c4a51786501d3808fdffd7804dbfe681c8c6bc1d3352bb2ca9a8da277b659d6ea45d173fe852f7405367c17e5821608bb03e6991bf65730dfed7fd98d34a945c3d517de913ac89ab66f8407d73c87e9be3845cf62505f920347ca925b5b4ee3043f6c737d392fd6bfe03614b6c4862e08262c5f661570ef863ba1c1405df382e93a27d1d682ec6aad4103d607fcd396e9d2f64d89d81dacfb48bf251ea970ac519b01f1acf25e22a2135627e322ad32cabc7f306e8a51c1435615dfba0917649439a12bc8fc28b129e0b432f3e13264a6a659758a3dc7f2d77b7754f1cf8c65308d9545660d8e33219d25c9b0436a33e1a257478c769fb168ce1e624991dcc40eae77256e29561597e71dbd581d4858096c9b35e1005fb3f0dc22d79aee80c507e4b632fd1533b3ba40811a894a2aa15065c98e750d50b97d64b488f6d526977b857f555ba0b74593c1fa93831caf61911d13eae3d116cd2e6a5894f6b7c2ad89d5c6e6869a87c2818827943e60c5407f975bc9c7e927ba91440e5a5ba10528ae246eec3c32421778005c22c402229c5bc6ff67ff7b6f853e93635ab507e8984644de2ca9fbb2899889079c42a24f288318f1552f5ad5cb33a6e182f69344966183517d18c6a069038cd0bdff4d3a47c384d41f59032ac23a69f06c3dc984b4d4aa325707131b6a521ef1086ff643e8775a025146f8bcf27d1c5f8c0b2b672abaa16a51bc4f44e81518e5e00106a00077c19c5e07e6b61d565fa0f798f893094ccb88227abb0f830ca3d983de5ac3dfd9fb77a1673e05ef958593b84edf1497b0eefde29bb11a2450ea34b7dbac7cf9405c2ee352cf616d7eabc5e1342fb9ebabf29588fcc75196ad1bd26d60f52fdf29f5a7aa2bb24d425d0f2aaf5a8847af86411b4a5ee75d3cf10d5bf3ec71b9c03c84cd8ae2836321f4e7d9e9576d57f66163a590a2b81615f4c2ab3a974cf1a6d08c14408d099db5c1532b62e781854367ff9c7e9e5f2195bb69bba8578cb15cbc8de2b79289b63694a55e110bf2d01381fb66aa92357dc8033e30085901606e87dae7cc2f24c006b311441fb1d092a583794baf53a52b5f15d34442aea85e21e739d1d8dc1e10884e2ae89fe9187b444a28fd554a3097d00e0a82a4d8cb6d49bf9641025042add70e8408cb436ac0045d7f40edaee571377ccb4f53fbb903063a08368a693b7282e27f4c7e59b8607ba7c7819d1cb8e509448c592dfe7c87c358372876894c8b5272cff37d5bf1ba27b3e028a4bf5f660782de29b3e97539a8155fcf8047afa0ca91a59652d903193545abda192b99d906e3ff7b6d0606cef903855e9961b98534704d57a1f259ea7b8ca7629aeb04cc1f4df8f759c3acc1f4eab3c95457c609b2d9c9c417596cb55f711b6a1ef9e4912e36f0d822233e9f2bea81636625f1baac6b7698f50031a9a6a3660791c7d1ae588fbaad86b1f10925be74de7afa29605ef607564ad5e33ebfa538b6fa9f7c7714152ee8e7ed23604ec92e38466874f2d23a0e66c07e5d8031e3e1ed58256bbd0ff60f8c68b19743475e6fc087d65be7ee43dc475a7f62d3cda79459f2c9ae23879bc85f5d8509c8d84d34158973c2d63b58f573e2269185c49ee059a32188df87f64c53c1c81fc194133b819fe2c54f0b8d26966882fe1cea9713326b4151c3f1b4c66d720f45fc5981649f3cd89d0747a2b9d0bf8ccff27aeb990e4b50c350224052aac8971239146124419e4d3857192e789841e21b5c5845f5fe184bb4f30ac035bda099132ce1e43ea64ca25d16961610da2f8f7b34f08f8012161e3c07bf7f06b13031f1d88a22b7b6849b55977fbbab2d8518473471155af36cca1bcf1bc8b1bfbdc7873ffb4d97f0598455a31bc9734ff4eabd36e24a3fd8ca7bd63d06007a06cfd1debc181cdbbe1c8cf57260114a2f3e49544cc6b0aa0f142cf1bb0db1981ee602dd84baf7896d2600da3661b284684875f04e02f13a996fba1b92d435eb9a5cbd83db356aefe2b9e5cf6fde0c0f17a72c98242f036419308553fcbbc6dc7a922195f446f2dd9d9ba6b3d4b6610144b72a6fc1a42112f1abf5bd964bd3fbd7df3c14934ab2041f9787dc15c2f243c006ca5149ecf499d8f0edb33fd9f7483c81c72bc361a8158645c7ec8f94b0569896b3a248629dce57d1e68b63fa85918de0365e743885de1983cfa360780cc6b8a38a2c7d5521955291995774e578a304e131da4c1f24deaf5b22d3de98e58cd9091a8ce6b106a7b6ea3e1583ea0c9195632379d92173bd95febc3682a87ca97f17017b756f8e146d75fe2b4df22acec0e13f527a0b4b8f15094d9d40b10517d2e4d9419d39e3be840ca287ee5b809b7c456bd64f1731397101d4bceddce2acac18aa4dc5cf2758381825a2df65ed9877d94e7fdf829ec3ebef9c7d3240880e36e9f4f553abdb4cc06749ca4b607ec05ec9b0e3480ed846ac656ecbf8ff4147edfe60c1d9323b1ba7312067641c0f560588169be56d287639bbc62cbecd008db0bf7fd4065a84ea70c7978bee346b2dc897dcb00bd9d72d0b206eedd306b466510aa028d95fd194197a471fd5b0caa79f5fc5c330de896323afd9e070a35e00e4f70c8e22821522f6fb0025ee9ece933d722c476edaffbcf4594744bb9a0ae6b124ee587a68b195c3b42ac3e5f1bf3dd9b118ea05a827349908cb95ab09ad4843d92863c39f563efbef250cb90972c4d59a7c093cdac1d40808624593b7cec08056f2a2c8994709f3fce811b2fe56f97c7de76665d29ae564c50d9812e0a00cc6c12d8b46802cade818e1478af3d8a6e439c779b04b354872d131802bfdf4e718c4c9fef6494971a6668101902edaeba4ab824c0734121dc59d008045702b170d32204abaf8c131b6cf0fb2e875a97b1fd245741af9281286278b7c325f35afd4f307ae542cecc8d8f0ee0539a6f28c358d1f43739b63e12ba1566ce2c7f49abe59b10fb035786264116319ca67fb8a82bc12cfffda979b78bee78fba9ef55729e11464a9fc99478eeae4ab4f413b88c6e7835290f036cb1993578b3bf2c867e163dd864f274d89d63250407b13acb23985b36482f87df59a2eb303959e964bdde01762ca438278ce461de63f90496433b3c0dbc43c46dcf8b0337aba3f97c6008df96cd5e3e7085b62f05b8a3dbf60edf613a786921f41a725b621f8901bab8bcd7b54a39409b94515592febbc99612c749b19162772ba838b136ede82db86f44ee9480b2e9c5a35fb3fdfe6230892f04ba1ffcd59ccbd21433c41f37073d06504d7a92ff645f879dfe1c6ecb12f846995d64fbd3c63893e37bcd7048afee08a965ef875aea70b224c08ba88f22e0a12c4f5967cd8bba21e2a4e11d6caf5bc4a0280292a74b50863004ad5c415bcbdff0691103e8129a477fdd8b7a1f3a78c9377105ca27294504560b32d4c069a67b7a7271e64d89a6139b022d0e3c92491a94603e5e6a82b64f09a4491926431c3cdfa27863db9f086d2059ad9803a870a89121c4b3475d20a811374297c697d61771967ff14fd28800126f89b553785f34a1669e746dcd11b20dc326f3b6b54e14607c6a82f757801b1b75aecd7aa8d19b82f2763a25d3176b76bacd65d357c5804ebb54f1a9613f11f338352c0863fdf541dd6f87fe9f7a4d6028ab745cc17680a2c8e87f4554eb8c9bb501db4d19838492394dc98f6be19efbf495d05df66938c0cd2563c87cc7ca832dc5e2aa4192b3c431fa09f3e1a62612ded36878046159e9f86ab2242973b2fee8c8d34f9b591b0f6b4f54d1b49f2955603026ea48fed19b2ba83f80663b0019bcd95f5409158c168b6d743dd3afe829cc9ed38df53b74dbc0603b07e439423e82a0f3097cb6bb4d25ed182d6f18f61b6a0ea1acbc35de20c74ad3b6b40ebade8aeb01c34d15ed5549fb72652870eb2617773af01e9cf790d7afcdfc4d26b39e3dfd80dc1b722d16d6a90eba1fe3657df9d9a8d110eb0dd88fafb9fe92a2a26eae66715f4fb7cd60e488b32f19e6f640f9f1d807ff72dd567c56d8a9f3b9eda8c248357517793258571322bfe0e93ce12db3bda4e42c4ace43cab040ba13195032e27dfe1666ae26554ed84c8e1f267e812b27123370976ee32dcfa5bfb3ba5ad7fe0a70b60ab2a6638a691683b110b11a5693e548e2f3787366221a0a4883a423d078d5d851a7378bb2022af1185fc1a464688234ab41db70f23afff7f5928c0aea0b83e9badc9dde520787586a6a46ebdee14fd45ba6255f28d62ac7b698d3a7e42edc24866c50269172fcfcb865c5105fab6b6ac98f5fc63048fb0c3b0bed5325b4cd3a383058cf361a50b39d2f58e85723c3f95751d08e3a84adc28c03bf2a92dd5041b97d2e9c42f7161f3bb4d9b0452c0835672964e0d6d885b81af966caae445167341343f5f1c3a5baa5c7b1cfb5ffeac42bdaafc2da0a7940fc04b290fb2e657680ae3d447eef8358268ad41d98b5d4c397b4697b46f8398c9f135fb3ad348a1029b274dd6b2c6f200c13e3064c5acbe736ac7a8fe2cfbd01104cc6b2f6a4ad68cc752cc63df58dfca944773af42e6f3e1012755cee7b", 0x1000}, {&(0x7f0000006ec0)="9c8d86870fa914e86f73d67ae61ba51e08705f73620fe442a3d407907731fb0b69520ebe2d7da8f06b1274b4fa8bcaf10cf804cdce77daf62298f86512d838fcd2229e70b3b580f7e01bcd3b6d1caaf464d88c27b3a908ae14f1b90b3efe89f5dbb2f8dc60a079b4a577bea667f3c6b9a86dcdcc3e998620d9447970f9ab25d9193ec4b1097a1d22bc735f523b00f6a34010dd059f62ed5fc5ebf3c2ed11cb6e4404ae4f921a5df141b059d195295da579fd8b39cc3f5183583dec", 0xbb}, {&(0x7f0000006f80)="25fa94383a8ff7048c91f799f22e76122082e00c508cb534fced802ecab6141f280eb5d62b3bc272451a8f048db1a1b0a73ef27a7a709b88dab39bb9f7767eb0a116fa775ab7f345d5ed3767c4343a099e183a1db9ad9a4219ab5653a0a61fa6cf6079df6e6ae4191996e8075e71a6fbe20cbc84a9a2a475609b69df7897cf05d34d", 0x82}, {&(0x7f0000007040)="7ca2a7c8822dad4bfb9004f198bd768707f2e861c2d2500e073a65113d816ec297ab9c63e44cf344c1929669f43cc790d92b35fc20da05a094d12faa5e8c4f52fca86320f27000d6eb6df5648b9f2a9e701c7343ad8282a3a74d483b0291943691d2d99b1eb894210d12a1affbc62c5bd2138b72aec2d0eadd7e58b66165a490688a0ef8ceb2f57fe3159cbdd9d3457d67972d6bb6f5d76fcbb42e2c19e9aabb94dd1d69103175208e5bcfc5efbf858c2a25869d1fca51df982be2acabf08275a8d5120888f0e037e7", 0xc9}], 0x9}}, {{&(0x7f0000001d40)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000008200)=[{&(0x7f0000007200)="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", 0x1000}], 0x1}}, {{&(0x7f0000008240)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f00000084c0)=[{&(0x7f0000008280)="48c40888f483e219b3267d781c08fe5c4ed2b9003668ce91e5d80fba7b5b52490041839c5b2cd2", 0x27}, {&(0x7f00000082c0)="0280555e65f3892a2eecb8f56236c6cbc41fccb92852a2c2d9b51b418423f9ad11039d613831bb5be0db7a", 0x2b}, {&(0x7f0000008300)="bdd614e95313dc76ba67438141c3222a1ad86d80cbfd1e2d58261ab50fc525814c1d301be6cf3d07b76e69d4e9f6ee0d4121bcaffe69cfea7f2c42042e84c3e9fc4ea65c7b9545339fc8db869c13f04659cebc306d6c91baa7a2fc3e80ec747d61a776b9d7e757e814e77d1985d35880692121fbe69ce08f52a66323fd9338e7cee5bffcbe72c3ed1f50849b97b570b12a3d7b52ef23e5b1a30b0e2815e16009e6ad6d8acb7a9aa9739e735a", 0xac}, {&(0x7f00000083c0)="b6f552d805dab6a4b0710f741c76478c4c5b4f9568951573444ae42aff0d5b2bf6490dc3893fd52ff9ffb10ac2b067b35dfbc55dbe523a15d05cac11d1ada167edc6c2a706ee7d0adee3e93fc12a8b2547935a220d0260abb3471537a56b89ab55a1651f2201082135dea15e3c27655171f4dd809bd6c7233e390efe30476edc", 0x80}, {&(0x7f0000008440)="7469215ac9cd90ddd7c80de2232e6cb73ff19f7daac4ed73a1c77c7dcd490feb1758f1dcfdf9ff9006ae552bba1ec5ef0ac2344d1bf88ea3777428102dec65afaa1e4f0cf91074322b9a53abdb2ef129bf074f40b72aeab3e3fa284d7b019f07340e458fead9915e42afc5b028aae95c", 0x70}], 0x5, &(0x7f0000008540)}}, {{&(0x7f0000008580)={0x2, 0x4e23, @remote}, 0x10, &(0x7f000000a840)=[{&(0x7f00000085c0)="dfd4fbb006429bea79a3359697fca8e8cf9d3f0c62bd7c7ad3a940bacbccc7e1569d95930aeeb0ad088feb2fdd790bdea2a69907462000de858e934b56035046e1b4fd81d3b32c7668ceb0e76d", 0x4d}, {&(0x7f0000008640)="3536a6a553a3ec7133450ca5d96e11d23f1601bdf98600156d0e391a912db01f9a7e53512176623eba69f9c9d89df75dd6f93bbbad6967fbb626a9a5a242778f40224aac6b906a93f30a91061ddc7dbadd52d8af651fce4e1c03652a8a2023d46b6ccd53b860421247717856d4f6326fd5bf527b741ea958873a4e92790a96cb91ee8c13b17ede06159141b91d50", 0x8e}, {&(0x7f0000008700)="711e2b36562db8117feb3777504663afa48ac28aa16de5dfc3b5f78278a58dfa535b64b71bede3724528bb8358c83e24c62be3c5eec0b46f4dfcb600b91da3ce6c7ece5f09219f7866e12789b08cc39fc86082b35b734c45bdff9c591bf45dcec58c4bab512e29f467ef9d320370da125b4fa7f4722687a4424f66ddbfdece68ebda5617631708e87ad1590128047a6855894607deb0ff23c83a30649ef13a5f6fad4d51d38124ef221d57c49efab5b0100e0c17597a39a9588e976b64", 0xbd}, {&(0x7f00000087c0)="be2d299054cf2cbd7f2fd99978fe8abd3dfe8cf67b5774baa5afbbcbf03f46d6748d033159bf7f39adc2e94bb177cd469de390b4821dd9a0f516c545e97effedebb85aa48f56a713f8b47025d5909e783b1be319aaf7f5348f4c344663689f558ca183c11ba71b3a0b7dd4bd718267c1486f54f35a93610b827215213302", 0x7e}, {&(0x7f0000008840)="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", 0x1000}, {&(0x7f0000009840)="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", 0x1000}], 0x6, &(0x7f000000a8c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x81}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x800}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x609}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0xe0}}], 0x9, 0x90) pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:42 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:04:42 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 22) 21:04:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0xfc, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 961.486015] FAULT_INJECTION: forcing a failure. [ 961.486015] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 961.486031] CPU: 1 PID: 6727 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 961.486038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 961.486042] Call Trace: [ 961.486061] dump_stack+0x107/0x167 [ 961.486074] should_fail.cold+0x5/0xa [ 961.486092] __alloc_pages_nodemask+0x182/0x600 [ 961.486107] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 21:04:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 961.486118] ? do_syscall_64+0x33/0x40 [ 961.486140] ? __unwind_start+0x523/0x7e0 [ 961.486155] alloc_pages_current+0x187/0x280 [ 961.486167] ? lock_acquire+0x197/0x470 [ 961.486181] push_pipe+0x2b5/0x6d0 [ 961.486200] iov_iter_get_pages+0x6b4/0xf40 [ 961.486220] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 961.486242] bio_iov_iter_get_pages+0x22a/0x1200 [ 961.486258] ? bvec_alloc+0x17e/0x2f0 [ 961.486272] ? bio_alloc_bioset+0x2a1/0x600 [ 961.486282] ? bio_add_pc_page+0x100/0x100 [ 961.486293] ? bvec_alloc+0x210/0x2f0 [ 961.486306] ? iov_iter_npages+0x1fd/0xa70 [ 961.486324] iomap_dio_bio_actor+0x77a/0xef0 [ 961.486347] iomap_dio_actor+0x36f/0x560 [ 961.486363] iomap_apply+0x289/0x810 [ 961.486375] ? iomap_dio_rw+0x90/0x90 [ 961.486389] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 961.486408] ? delete_from_page_cache_batch+0xa30/0xa30 [ 961.486419] ? mark_held_locks+0x9e/0xe0 [ 961.486439] ? filemap_check_errors+0xa5/0x150 [ 961.486455] __iomap_dio_rw+0x6cd/0x1110 [ 961.486466] ? iomap_dio_rw+0x90/0x90 [ 961.486490] ? iomap_dio_bio_actor+0xef0/0xef0 [ 961.486510] ? down_read+0x10f/0x430 [ 961.486522] ? down_write+0x160/0x160 [ 961.486538] iomap_dio_rw+0x31/0x90 [ 961.486552] ext4_file_read_iter+0x2c7/0x4c0 [ 961.486568] generic_file_splice_read+0x455/0x6d0 [ 961.486580] ? pipe_to_user+0x170/0x170 [ 961.486598] ? fsnotify_perm.part.0+0x22d/0x620 [ 961.486613] ? security_file_permission+0xb1/0xe0 [ 961.486625] ? pipe_to_user+0x170/0x170 [ 961.486637] do_splice_to+0x10e/0x160 [ 961.486651] splice_direct_to_actor+0x2fe/0x980 [ 961.486665] ? pipe_to_sendpage+0x380/0x380 [ 961.486679] ? do_splice_to+0x160/0x160 [ 961.486691] ? security_file_permission+0xb1/0xe0 [ 961.486708] do_splice_direct+0x1c4/0x290 [ 961.486719] ? splice_direct_to_actor+0x980/0x980 [ 961.486730] ? avc_policy_seqno+0x9/0x70 [ 961.486746] ? security_file_permission+0xb1/0xe0 [ 961.486765] do_sendfile+0x553/0x11e0 [ 961.486784] ? do_pwritev+0x270/0x270 [ 961.486797] ? wait_for_completion_io+0x270/0x270 [ 961.486811] ? rcu_read_lock_any_held+0x75/0xa0 [ 961.486821] ? vfs_write+0x354/0xb10 [ 961.486837] __x64_sys_sendfile64+0x1d1/0x210 [ 961.486850] ? __ia32_sys_sendfile+0x220/0x220 [ 961.486864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 961.486876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 961.486888] do_syscall_64+0x33/0x40 [ 961.486899] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 961.486908] RIP: 0033:0x7fb1ac5e0b19 [ 961.486920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 961.486926] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 961.486940] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 961.486946] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 961.486953] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 961.486959] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 961.486966] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)={0x800, 0x7f, 0x7}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, r0, &(0x7f0000000000)={0x400402, 0x0, 0xa}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x12345}, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$KDSKBLED(r2, 0x4b65, 0x80000000) r3 = socket$unix(0x1, 0x1, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0x81, 0xfb5}, {0x2, 0x81}]}, 0x14, 0x0) 21:04:55 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:04:55 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x1c) ftruncate(r1, 0x80000001) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:55 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 23) 21:04:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x9, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2a30}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004091}, 0x24000841) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000180)) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:04:55 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9}) 21:04:55 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:04:55 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 975.288463] FAULT_INJECTION: forcing a failure. [ 975.288463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 975.293612] CPU: 0 PID: 6752 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 975.294250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 975.295028] Call Trace: [ 975.295290] dump_stack+0x107/0x167 [ 975.295647] should_fail.cold+0x5/0xa [ 975.296020] __alloc_pages_nodemask+0x182/0x600 [ 975.296475] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 975.297054] ? do_syscall_64+0x33/0x40 [ 975.297443] ? __unwind_start+0x523/0x7e0 [ 975.297848] alloc_pages_current+0x187/0x280 [ 975.298269] ? lock_acquire+0x197/0x470 [ 975.298651] push_pipe+0x2b5/0x6d0 [ 975.299013] iov_iter_get_pages+0x6b4/0xf40 [ 975.299433] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 975.299918] bio_iov_iter_get_pages+0x22a/0x1200 [ 975.300377] ? bvec_alloc+0x17e/0x2f0 [ 975.300763] ? bio_alloc_bioset+0x2a1/0x600 [ 975.301181] ? bio_add_pc_page+0x100/0x100 [ 975.301583] ? bvec_alloc+0x210/0x2f0 [ 975.301948] ? iov_iter_npages+0x1fd/0xa70 [ 975.302363] iomap_dio_bio_actor+0x77a/0xef0 [ 975.302800] iomap_dio_actor+0x36f/0x560 [ 975.303196] iomap_apply+0x289/0x810 [ 975.303552] ? iomap_dio_rw+0x90/0x90 [ 975.303916] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 975.304469] ? delete_from_page_cache_batch+0xa30/0xa30 [ 975.304983] ? mark_held_locks+0x9e/0xe0 [ 975.305382] ? filemap_check_errors+0xa5/0x150 [ 975.305821] __iomap_dio_rw+0x6cd/0x1110 [ 975.306204] ? iomap_dio_rw+0x90/0x90 [ 975.306589] ? iomap_dio_bio_actor+0xef0/0xef0 [ 975.307034] ? down_read+0x10f/0x430 [ 975.307388] ? down_write+0x160/0x160 [ 975.307760] iomap_dio_rw+0x31/0x90 [ 975.308112] ext4_file_read_iter+0x2c7/0x4c0 [ 975.308540] generic_file_splice_read+0x455/0x6d0 [ 975.309022] ? pipe_to_user+0x170/0x170 [ 975.309416] ? fsnotify_perm.part.0+0x22d/0x620 [ 975.309868] ? security_file_permission+0xb1/0xe0 [ 975.310332] ? pipe_to_user+0x170/0x170 [ 975.310712] do_splice_to+0x10e/0x160 [ 975.311080] splice_direct_to_actor+0x2fe/0x980 [ 975.311525] ? pipe_to_sendpage+0x380/0x380 [ 975.311935] ? do_splice_to+0x160/0x160 [ 975.312318] ? security_file_permission+0xb1/0xe0 [ 975.312806] do_splice_direct+0x1c4/0x290 [ 975.313207] ? splice_direct_to_actor+0x980/0x980 [ 975.313662] ? avc_policy_seqno+0x9/0x70 [ 975.314059] ? security_file_permission+0xb1/0xe0 [ 975.314532] do_sendfile+0x553/0x11e0 [ 975.314912] ? do_pwritev+0x270/0x270 [ 975.315287] ? wait_for_completion_io+0x270/0x270 [ 975.315757] ? rcu_read_lock_any_held+0x75/0xa0 [ 975.316205] ? vfs_write+0x354/0xb10 [ 975.316577] __x64_sys_sendfile64+0x1d1/0x210 [ 975.317025] ? __ia32_sys_sendfile+0x220/0x220 [ 975.317461] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 975.317957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 975.318445] do_syscall_64+0x33/0x40 [ 975.318802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 975.319286] RIP: 0033:0x7fb1ac5e0b19 [ 975.319638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 975.329419] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 975.330137] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 975.330809] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 975.331484] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 975.332149] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 975.332838] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:04:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_pts(r0, 0x16241) fsetxattr$security_capability(r1, &(0x7f0000000000), &(0x7f0000000080)=@v2={0x2000000, [{0xd579, 0xfffffff8}, {0x6, 0x100}]}, 0x14, 0x0) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = signalfd4(r0, &(0x7f00000000c0)={[0x4]}, 0x8, 0x80000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) r4 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$NS_GET_OWNER_UID(r7, 0xb704, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) fsconfig$FSCONFIG_SET_PATH_EMPTY(r7, 0x4, &(0x7f0000000400)='@(!)!}!,:{)\x00', &(0x7f0000000440)='./file1\x00', r4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r5}}, {@posixacl}, {@loose}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3, {0xee01, r6}}, './file0\x00'}) 21:04:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0xdd0, 0x3, 0x9}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6, 0x2}}, './file0\x00'}) [ 975.423106] SELinux: duplicate or incompatible mount options [ 975.432944] SELinux: duplicate or incompatible mount options 21:04:56 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x3, 0x3f, 0x5, 0x20, 0x0, 0x4, 0x80, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x12800, 0xbae, 0x0, 0x1, 0x2, 0xc69d, 0xff53, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs2/binder-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x75}}, './file0\x00'}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000300000005000208000000000c00018008000100", @ANYRES32=r2, @ANYBLOB], 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x4, 0x0, 0x5, 0x81, 0x4, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10, 0x8, 0x1f, 0x80}}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000300)={@multicast1, @broadcast, 0x0}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={0x0, @in={0x2, 0x4e22, @multicast1}, @xdp={0x2c, 0x14, 0x0, 0xd}, @xdp={0x2c, 0x17}, 0xff, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)='gre0\x00', 0x0, 0x5, 0x5}) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r10, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r11, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)={0x19c, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0xfffffffc, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x4040040}, 0x40044) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:56 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x1, 0x1, 0x400}, 0x0, 0xfffffffffffffdff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:56 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:04:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0xf, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20008080) r1 = shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x81, 0x7, 0x400, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmdt(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:04:56 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 988.495755] FAULT_INJECTION: forcing a failure. [ 988.495755] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 988.496874] CPU: 0 PID: 6802 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 988.497480] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 988.498205] Call Trace: [ 988.498447] dump_stack+0x107/0x167 [ 988.498772] should_fail.cold+0x5/0xa [ 988.499119] __alloc_pages_nodemask+0x182/0x600 [ 988.499534] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 988.500059] ? do_syscall_64+0x33/0x40 [ 988.500417] ? __unwind_start+0x523/0x7e0 [ 988.500788] alloc_pages_current+0x187/0x280 [ 988.501199] ? lock_acquire+0x197/0x470 [ 988.501556] push_pipe+0x2b5/0x6d0 [ 988.501879] iov_iter_get_pages+0x6b4/0xf40 [ 988.502268] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 988.502716] bio_iov_iter_get_pages+0x22a/0x1200 [ 988.503140] ? bvec_alloc+0x17e/0x2f0 [ 988.503483] ? bio_alloc_bioset+0x2a1/0x600 [ 988.503866] ? bio_add_pc_page+0x100/0x100 [ 988.504241] ? bvec_alloc+0x210/0x2f0 [ 988.504581] ? iov_iter_npages+0x1fd/0xa70 [ 988.504982] iomap_dio_bio_actor+0x77a/0xef0 [ 988.505385] iomap_dio_actor+0x36f/0x560 [ 988.505750] iomap_apply+0x289/0x810 [ 988.506081] ? iomap_dio_rw+0x90/0x90 [ 988.506422] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 988.506940] ? delete_from_page_cache_batch+0xa30/0xa30 [ 988.507412] ? mark_held_locks+0x9e/0xe0 [ 988.507783] ? filemap_check_errors+0xa5/0x150 [ 988.508195] __iomap_dio_rw+0x6cd/0x1110 [ 988.508553] ? iomap_dio_rw+0x90/0x90 [ 988.508914] ? iomap_dio_bio_actor+0xef0/0xef0 [ 988.509331] ? down_read+0x10f/0x430 [ 988.509661] ? down_write+0x160/0x160 [ 988.510004] iomap_dio_rw+0x31/0x90 [ 988.510330] ext4_file_read_iter+0x2c7/0x4c0 [ 988.510725] generic_file_splice_read+0x455/0x6d0 [ 988.511152] ? pipe_to_user+0x170/0x170 [ 988.511513] ? fsnotify_perm.part.0+0x22d/0x620 [ 988.511928] ? security_file_permission+0xb1/0xe0 [ 988.512356] ? pipe_to_user+0x170/0x170 [ 988.512709] do_splice_to+0x10e/0x160 [ 988.513063] splice_direct_to_actor+0x2fe/0x980 [ 988.513479] ? pipe_to_sendpage+0x380/0x380 [ 988.513864] ? do_splice_to+0x160/0x160 [ 988.514218] ? security_file_permission+0xb1/0xe0 [ 988.514651] do_splice_direct+0x1c4/0x290 [ 988.515022] ? splice_direct_to_actor+0x980/0x980 [ 988.515448] ? avc_policy_seqno+0x9/0x70 [ 988.515814] ? security_file_permission+0xb1/0xe0 [ 988.516250] do_sendfile+0x553/0x11e0 [ 988.516597] ? do_pwritev+0x270/0x270 [ 988.516953] ? wait_for_completion_io+0x270/0x270 [ 988.517387] ? rcu_read_lock_any_held+0x75/0xa0 [ 988.517796] ? vfs_write+0x354/0xb10 [ 988.525720] __x64_sys_sendfile64+0x1d1/0x210 [ 988.526707] ? __ia32_sys_sendfile+0x220/0x220 [ 988.527710] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 988.528863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 988.530003] do_syscall_64+0x33/0x40 [ 988.530817] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 988.531947] RIP: 0033:0x7fb1ac5e0b19 [ 988.532760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 988.536821] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 988.538501] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 988.540061] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 988.541631] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 988.543189] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 988.544749] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:05:09 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:05:09 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:05:09 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/45) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000100)=""/194) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) 21:05:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffff694, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) r3 = signalfd(r1, &(0x7f00000001c0), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0xae, 0x56, 0x81, 0x0, 0x9d, 0x2900, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x6}, 0x80, 0xfffffffffffffffa, 0x0, 0x9, 0x100, 0x0, 0x80, 0x0, 0x3, 0x0, 0x854}, r2, 0x5, r3, 0x9) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x10000, 0x5}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:09 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000080)=@md5={0x1, "b463cd19e1f604338c60c273b1244536"}, 0x11, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x3, 0x2, 0x0, 0xba, 0x854f}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='personality\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) lseek(r2, 0x7, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 24) 21:05:09 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:05:09 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:09 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ftruncate(r0, 0x5) 21:05:09 executing program 0: ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x109140, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x4ad00, 0x0) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup2(r2, r4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001580)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pread64(r5, &(0x7f00000015c0)=""/83, 0x53, 0x2000000000000001) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x90000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"/627, @ANYRES32=r1, @ANYBLOB='\b\x00%\x00', @ANYRES32=0x0, @ANYBLOB="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"], 0x12c0}, 0x1, 0x0, 0x0, 0x4008880}, 0x0) 21:05:09 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:09 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000080)=@md5={0x1, "b463cd19e1f604338c60c273b1244536"}, 0x11, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x3, 0x2, 0x0, 0xba, 0x854f}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='personality\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) lseek(r2, 0x7, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:09 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, 0x0, 0x0, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:09 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:09 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x2, 0x0, 0x400, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="60394a8f2490cb90180000005d9c356ac5448a461a971ce77dd7fdeb0cf8add1785c12667b3b8b2b3226262b9ecaaee7e7e138c66e4b93981410c5297018bf4eece15f98a188e4d8b27838a290266faeb5498b969c06d85e1ff79f6283e20df9382819485bc9bd9609725113440d42175043f8bef3d47c49a9a53143adac9da455dc154bd35bd1605a58f3024e298a9aa4f2acc3b2442ffc6e02c546d7c350af550394eab13c82ab1401bc3db6ac12e7d300f85b95fe89ee6647d5465580abf7941070c14fccbba8a36bb480b02e07b71c949aa4aa5eaca77240dcd03c604cf851a483812474", @ANYRES32=r0, @ANYBLOB="05000000000000002e00"]) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat(r2, &(0x7f0000000080)='./file0\x00', 0x800, 0x18) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='lo\x00') shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:22 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:05:22 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8011, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x88440, 0x101) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x40000) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x4200000048) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f00000000c0)) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)=0x3) 21:05:22 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 25) 21:05:22 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) sendmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{}, {&(0x7f0000000180)="5a930cc899daab014ac4b6605f380a153f9d1fb6ad6cce245c23fb1ccf09c39996b50b342685781298fa3b06886f00da15e102fe2cb06d65d1a21abac42224d0251810f6817ab9da7f809d943acec16c22e774580c2d6945", 0x58}], 0x2, 0x0, 0x0, 0x40004}, 0x4) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:05:22 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1002.095020] FAULT_INJECTION: forcing a failure. [ 1002.095020] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1002.095036] CPU: 0 PID: 6869 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1002.095043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1002.095048] Call Trace: [ 1002.095065] dump_stack+0x107/0x167 [ 1002.095079] should_fail.cold+0x5/0xa [ 1002.095095] __alloc_pages_nodemask+0x182/0x600 [ 1002.095110] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 21:05:22 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1002.095120] ? do_syscall_64+0x33/0x40 [ 1002.095141] ? __unwind_start+0x523/0x7e0 [ 1002.095156] alloc_pages_current+0x187/0x280 [ 1002.095169] ? lock_acquire+0x197/0x470 [ 1002.095183] push_pipe+0x2b5/0x6d0 21:05:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000080)={0x55cb, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:22 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x10001, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x2, 0x122001) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) [ 1002.095205] iov_iter_get_pages+0x6b4/0xf40 [ 1002.095220] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1002.095242] bio_iov_iter_get_pages+0x22a/0x1200 [ 1002.095257] ? bvec_alloc+0x17e/0x2f0 [ 1002.095270] ? bio_alloc_bioset+0x2a1/0x600 [ 1002.095281] ? bio_add_pc_page+0x100/0x100 [ 1002.095292] ? bvec_alloc+0x210/0x2f0 21:05:22 executing program 6: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1002.095305] ? iov_iter_npages+0x1fd/0xa70 [ 1002.095321] iomap_dio_bio_actor+0x77a/0xef0 21:05:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x6ed4, 0x2, 0x7, 0x6, 0x4e, "1fc6db9051b377e59e6a99838190121b737b41", 0x2688, 0x400}) [ 1002.095344] iomap_dio_actor+0x36f/0x560 21:05:23 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1002.095360] iomap_apply+0x289/0x810 [ 1002.095372] ? iomap_dio_rw+0x90/0x90 [ 1002.095385] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1002.095404] ? delete_from_page_cache_batch+0xa30/0xa30 21:05:23 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1002.095415] ? mark_held_locks+0x9e/0xe0 [ 1002.095435] ? filemap_check_errors+0xa5/0x150 [ 1002.095450] __iomap_dio_rw+0x6cd/0x1110 [ 1002.095460] ? iomap_dio_rw+0x90/0x90 [ 1002.095484] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1002.095502] ? down_read+0x10f/0x430 [ 1002.095514] ? down_write+0x160/0x160 [ 1002.095530] iomap_dio_rw+0x31/0x90 [ 1002.095543] ext4_file_read_iter+0x2c7/0x4c0 [ 1002.095558] generic_file_splice_read+0x455/0x6d0 [ 1002.095570] ? pipe_to_user+0x170/0x170 [ 1002.095588] ? fsnotify_perm.part.0+0x22d/0x620 [ 1002.095604] ? security_file_permission+0xb1/0xe0 [ 1002.095616] ? pipe_to_user+0x170/0x170 [ 1002.095628] do_splice_to+0x10e/0x160 [ 1002.095641] splice_direct_to_actor+0x2fe/0x980 [ 1002.095656] ? pipe_to_sendpage+0x380/0x380 [ 1002.095669] ? do_splice_to+0x160/0x160 [ 1002.095682] ? security_file_permission+0xb1/0xe0 [ 1002.095698] do_splice_direct+0x1c4/0x290 [ 1002.095710] ? splice_direct_to_actor+0x980/0x980 [ 1002.095720] ? avc_policy_seqno+0x9/0x70 [ 1002.095736] ? security_file_permission+0xb1/0xe0 [ 1002.095755] do_sendfile+0x553/0x11e0 [ 1002.095773] ? do_pwritev+0x270/0x270 [ 1002.095787] ? wait_for_completion_io+0x270/0x270 [ 1002.095800] ? rcu_read_lock_any_held+0x75/0xa0 [ 1002.095810] ? vfs_write+0x354/0xb10 [ 1002.095826] __x64_sys_sendfile64+0x1d1/0x210 [ 1002.095843] ? __ia32_sys_sendfile+0x220/0x220 [ 1002.095857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1002.095868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1002.095881] do_syscall_64+0x33/0x40 [ 1002.095892] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1002.095900] RIP: 0033:0x7fb1ac5e0b19 [ 1002.095912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.095918] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1002.095931] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1002.095938] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1002.095944] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.095951] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1002.095957] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:05:36 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 1) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:05:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 26) [ 1015.980176] FAULT_INJECTION: forcing a failure. [ 1015.980176] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1015.981343] CPU: 1 PID: 6916 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1015.982110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1015.982857] Call Trace: [ 1015.983105] dump_stack+0x107/0x167 [ 1015.983437] should_fail.cold+0x5/0xa [ 1015.983790] __alloc_pages_nodemask+0x182/0x600 [ 1015.984214] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1015.984746] ? do_syscall_64+0x33/0x40 21:05:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000000)) 21:05:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:05:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:05:36 executing program 6: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:36 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000080)=""/197) [ 1015.985112] ? __unwind_start+0x523/0x7e0 [ 1015.985517] alloc_pages_current+0x187/0x280 [ 1015.985917] ? lock_acquire+0x197/0x470 [ 1015.986286] push_pipe+0x2b5/0x6d0 [ 1015.986620] iov_iter_get_pages+0x6b4/0xf40 [ 1015.987015] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1015.987470] bio_iov_iter_get_pages+0x22a/0x1200 [ 1015.987899] ? bvec_alloc+0x17e/0x2f0 [ 1015.988244] ? bio_alloc_bioset+0x2a1/0x600 [ 1015.988644] ? bio_add_pc_page+0x100/0x100 [ 1015.988657] ? bvec_alloc+0x210/0x2f0 [ 1015.988671] ? iov_iter_npages+0x1fd/0xa70 [ 1015.988690] iomap_dio_bio_actor+0x77a/0xef0 [ 1015.988716] iomap_dio_actor+0x36f/0x560 [ 1015.988734] iomap_apply+0x289/0x810 [ 1015.988747] ? iomap_dio_rw+0x90/0x90 [ 1015.988763] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1015.988782] ? delete_from_page_cache_batch+0xa30/0xa30 21:05:36 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x201, 0x403}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1015.988794] ? mark_held_locks+0x9e/0xe0 21:05:36 executing program 6: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1015.988817] ? filemap_check_errors+0xa5/0x150 [ 1015.988835] __iomap_dio_rw+0x6cd/0x1110 [ 1015.988847] ? iomap_dio_rw+0x90/0x90 [ 1015.988877] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1015.988900] ? down_read+0x10f/0x430 [ 1015.988915] ? down_write+0x160/0x160 [ 1015.988934] iomap_dio_rw+0x31/0x90 [ 1015.988951] ext4_file_read_iter+0x2c7/0x4c0 [ 1015.988970] generic_file_splice_read+0x455/0x6d0 [ 1015.988985] ? pipe_to_user+0x170/0x170 [ 1015.989007] ? fsnotify_perm.part.0+0x22d/0x620 [ 1015.989027] ? security_file_permission+0xb1/0xe0 [ 1015.989043] ? pipe_to_user+0x170/0x170 [ 1015.989058] do_splice_to+0x10e/0x160 21:05:36 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1015.989075] splice_direct_to_actor+0x2fe/0x980 [ 1015.989093] ? pipe_to_sendpage+0x380/0x380 [ 1015.989110] ? do_splice_to+0x160/0x160 [ 1015.989125] ? security_file_permission+0xb1/0xe0 [ 1015.989147] do_splice_direct+0x1c4/0x290 [ 1015.989162] ? splice_direct_to_actor+0x980/0x980 [ 1015.989174] ? avc_policy_seqno+0x9/0x70 [ 1015.989195] ? security_file_permission+0xb1/0xe0 [ 1015.989218] do_sendfile+0x553/0x11e0 [ 1015.989251] ? do_pwritev+0x270/0x270 [ 1015.989268] ? wait_for_completion_io+0x270/0x270 [ 1015.989285] ? rcu_read_lock_any_held+0x75/0xa0 [ 1015.989296] ? vfs_write+0x354/0xb10 [ 1015.989316] __x64_sys_sendfile64+0x1d1/0x210 [ 1015.989331] ? __ia32_sys_sendfile+0x220/0x220 [ 1015.989348] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 21:05:36 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1015.989362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1015.989377] do_syscall_64+0x33/0x40 [ 1015.989391] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1015.989401] RIP: 0033:0x7fb1ac5e0b19 [ 1015.989415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1015.989424] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1015.989440] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1015.989448] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1015.989456] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1015.989464] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 21:05:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:05:36 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 27) 21:05:36 executing program 6: r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1015.989472] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1016.123324] FAULT_INJECTION: forcing a failure. [ 1016.123324] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.123389] CPU: 1 PID: 6930 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1016.123405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:05:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x9) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x5, 0x4, 0x0, 0x40, 0x18, "39cc0af474240341"}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder1\x00', 0x800, 0x0) pidfd_getfd(r0, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x280000048) [ 1016.123412] Call Trace: [ 1016.123441] dump_stack+0x107/0x167 [ 1016.123469] should_fail.cold+0x5/0xa [ 1016.123503] ? kvmalloc_node+0x119/0x170 [ 1016.123534] should_failslab+0x5/0x20 [ 1016.123566] __kmalloc_node+0x76/0x420 [ 1016.123599] kvmalloc_node+0x119/0x170 [ 1016.123614] seq_read_iter+0x9d6/0x12b0 [ 1016.123642] seq_read+0x3dd/0x5b0 [ 1016.123657] ? seq_read_iter+0x12b0/0x12b0 [ 1016.123674] ? find_held_lock+0x2c/0x110 [ 1016.123696] ? _cond_resched+0x12/0x80 [ 1016.123718] ? fsnotify_perm.part.0+0x22d/0x620 [ 1016.123736] ? seq_read_iter+0x12b0/0x12b0 [ 1016.123752] proc_reg_read+0x22a/0x300 [ 1016.123768] ? proc_reg_write+0x300/0x300 [ 1016.123782] vfs_read+0x228/0x620 [ 1016.123803] __x64_sys_pread64+0x201/0x260 [ 1016.123819] ? ksys_pread64+0x1b0/0x1b0 [ 1016.123838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1016.123852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1016.123869] do_syscall_64+0x33/0x40 [ 1016.123883] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1016.123892] RIP: 0033:0x7f1796040b19 [ 1016.123907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1016.123916] RSP: 002b:00007f1793574188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1016.123932] RAX: ffffffffffffffda RBX: 00007f17961540e0 RCX: 00007f1796040b19 [ 1016.123941] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000005 [ 1016.123950] RBP: 00007f17935741d0 R08: 0000000000000000 R09: 0000000000000000 [ 1016.123959] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 1016.123967] R13: 00007ffe3f30942f R14: 00007f1793574300 R15: 0000000000022000 [ 1016.231996] FAULT_INJECTION: forcing a failure. [ 1016.231996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1016.245819] CPU: 0 PID: 6941 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1016.245825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1016.245829] Call Trace: [ 1016.245848] dump_stack+0x107/0x167 [ 1016.245861] should_fail.cold+0x5/0xa [ 1016.245878] __alloc_pages_nodemask+0x182/0x600 [ 1016.245893] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1016.245903] ? do_syscall_64+0x33/0x40 [ 1016.245924] ? __unwind_start+0x523/0x7e0 [ 1016.245940] alloc_pages_current+0x187/0x280 [ 1016.245952] ? lock_acquire+0x197/0x470 [ 1016.245965] push_pipe+0x2b5/0x6d0 [ 1016.245983] iov_iter_get_pages+0x6b4/0xf40 [ 1016.245998] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1016.246020] bio_iov_iter_get_pages+0x22a/0x1200 [ 1016.246035] ? bvec_alloc+0x17e/0x2f0 [ 1016.246049] ? bio_alloc_bioset+0x2a1/0x600 [ 1016.246060] ? bio_add_pc_page+0x100/0x100 [ 1016.246071] ? bvec_alloc+0x210/0x2f0 [ 1016.246083] ? iov_iter_npages+0x1fd/0xa70 [ 1016.246101] iomap_dio_bio_actor+0x77a/0xef0 [ 1016.246123] iomap_dio_actor+0x36f/0x560 [ 1016.246139] iomap_apply+0x289/0x810 [ 1016.246151] ? iomap_dio_rw+0x90/0x90 [ 1016.246164] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1016.246182] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1016.246197] ? mark_held_locks+0x9e/0xe0 [ 1016.246218] ? filemap_check_errors+0xa5/0x150 [ 1016.246233] __iomap_dio_rw+0x6cd/0x1110 [ 1016.246243] ? iomap_dio_rw+0x90/0x90 [ 1016.246266] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1016.246286] ? down_read+0x10f/0x430 [ 1016.246298] ? down_write+0x160/0x160 [ 1016.246313] iomap_dio_rw+0x31/0x90 [ 1016.246327] ext4_file_read_iter+0x2c7/0x4c0 [ 1016.246345] generic_file_splice_read+0x455/0x6d0 [ 1016.246357] ? pipe_to_user+0x170/0x170 [ 1016.246375] ? fsnotify_perm.part.0+0x22d/0x620 [ 1016.246392] ? security_file_permission+0xb1/0xe0 [ 1016.246405] ? pipe_to_user+0x170/0x170 [ 1016.246430] do_splice_to+0x10e/0x160 [ 1016.246444] splice_direct_to_actor+0x2fe/0x980 [ 1016.246459] ? pipe_to_sendpage+0x380/0x380 [ 1016.246473] ? do_splice_to+0x160/0x160 [ 1016.246485] ? security_file_permission+0xb1/0xe0 [ 1016.246501] do_splice_direct+0x1c4/0x290 [ 1016.246513] ? splice_direct_to_actor+0x980/0x980 [ 1016.246523] ? avc_policy_seqno+0x9/0x70 [ 1016.246540] ? security_file_permission+0xb1/0xe0 [ 1016.246559] do_sendfile+0x553/0x11e0 [ 1016.246577] ? do_pwritev+0x270/0x270 [ 1016.246591] ? wait_for_completion_io+0x270/0x270 [ 1016.246604] ? rcu_read_lock_any_held+0x75/0xa0 [ 1016.246614] ? vfs_write+0x354/0xb10 [ 1016.246630] __x64_sys_sendfile64+0x1d1/0x210 [ 1016.246644] ? __ia32_sys_sendfile+0x220/0x220 [ 1016.246667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1016.246678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1016.246691] do_syscall_64+0x33/0x40 [ 1016.246702] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1016.246710] RIP: 0033:0x7fb1ac5e0b19 [ 1016.246722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1016.246728] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1016.246741] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1016.246748] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1016.246755] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1016.246761] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1016.246768] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:05:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 28) 21:05:52 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 2) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:52 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:05:52 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:05:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:05:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0xa14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x8, 0x1, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x440080, 0x11e) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) syz_open_dev$ptys(0xc, 0x3, 0x1) 21:05:52 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0xb1, 0x4, 0x40, 0x0, 0x0, 0x48009, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x200, 0x0, 0x5, 0x6, 0x8, 0x2, 0x800, 0x0, 0x9, 0x0, 0x4f13fe6b}, 0x0, 0x10, r2, 0x2) r3 = shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(r3) shmdt(r3) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) bind$bt_l2cap(r2, &(0x7f0000000100)={0x1f, 0x3, @any, 0x3ff}, 0xe) [ 1031.450809] FAULT_INJECTION: forcing a failure. [ 1031.450809] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.451837] CPU: 0 PID: 6969 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1031.452429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.453167] Call Trace: 21:05:52 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1031.453408] dump_stack+0x107/0x167 [ 1031.454074] should_fail.cold+0x5/0xa [ 1031.454412] ? create_object.isra.0+0x3a/0xa20 [ 1031.454812] should_failslab+0x5/0x20 [ 1031.457288] kmem_cache_alloc+0x5b/0x310 [ 1031.458235] create_object.isra.0+0x3a/0xa20 [ 1031.458620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.459065] kmem_cache_alloc_node+0x169/0x330 [ 1031.459487] create_task_io_context+0x2c/0x430 [ 1031.459894] submit_bio_checks+0x1382/0x1730 [ 1031.460290] ? alloc_pages_current+0x18f/0x280 [ 1031.460688] ? lock_acquire+0x197/0x470 [ 1031.461037] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1031.461606] ? push_pipe+0x404/0x6d0 [ 1031.461944] submit_bio_noacct+0x82/0x1010 [ 1031.462332] ? blk_queue_enter+0xc30/0xc30 [ 1031.462712] submit_bio+0xf3/0x4e0 [ 1031.463026] ? submit_bio_noacct+0x1010/0x1010 [ 1031.464510] ? bio_add_pc_page+0x100/0x100 [ 1031.464879] ? bvec_alloc+0x210/0x2f0 [ 1031.465217] iomap_dio_submit_bio+0x295/0x360 [ 1031.465645] iomap_dio_bio_actor+0x4b3/0xef0 [ 1031.466047] iomap_dio_actor+0x36f/0x560 [ 1031.466407] iomap_apply+0x289/0x810 [ 1031.466746] ? iomap_dio_rw+0x90/0x90 [ 1031.467082] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1031.467604] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1031.468068] ? mark_held_locks+0x9e/0xe0 [ 1031.468433] ? filemap_check_errors+0xa5/0x150 [ 1031.468847] __iomap_dio_rw+0x6cd/0x1110 [ 1031.469201] ? iomap_dio_rw+0x90/0x90 [ 1031.469578] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1031.470002] ? down_read+0x10f/0x430 [ 1031.470329] ? down_write+0x160/0x160 [ 1031.470667] iomap_dio_rw+0x31/0x90 [ 1031.472069] ext4_file_read_iter+0x2c7/0x4c0 [ 1031.472459] generic_file_splice_read+0x455/0x6d0 [ 1031.472894] ? pipe_to_user+0x170/0x170 [ 1031.473251] ? fsnotify_perm.part.0+0x22d/0x620 [ 1031.473693] ? security_file_permission+0xb1/0xe0 [ 1031.474132] ? pipe_to_user+0x170/0x170 [ 1031.474482] do_splice_to+0x10e/0x160 [ 1031.474821] splice_direct_to_actor+0x2fe/0x980 [ 1031.475244] ? pipe_to_sendpage+0x380/0x380 [ 1031.475625] ? do_splice_to+0x160/0x160 [ 1031.475977] ? security_file_permission+0xb1/0xe0 [ 1031.476414] do_splice_direct+0x1c4/0x290 [ 1031.476778] ? splice_direct_to_actor+0x980/0x980 [ 1031.477207] ? avc_policy_seqno+0x9/0x70 [ 1031.477598] ? security_file_permission+0xb1/0xe0 [ 1031.478026] do_sendfile+0x553/0x11e0 [ 1031.479453] ? do_pwritev+0x270/0x270 [ 1031.479790] ? wait_for_completion_io+0x270/0x270 [ 1031.480213] ? rcu_read_lock_any_held+0x75/0xa0 [ 1031.480631] ? vfs_write+0x354/0xb10 [ 1031.480965] __x64_sys_sendfile64+0x1d1/0x210 [ 1031.481368] ? __ia32_sys_sendfile+0x220/0x220 [ 1031.481768] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.482157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.482547] do_syscall_64+0x33/0x40 [ 1031.482824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.483202] RIP: 0033:0x7fb1ac5e0b19 [ 1031.483484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.484901] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1031.485589] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1031.486211] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1031.486842] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.487462] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1031.488098] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1031.498674] FAULT_INJECTION: forcing a failure. [ 1031.498674] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.499814] CPU: 1 PID: 6965 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1031.500427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.501167] Call Trace: [ 1031.501419] dump_stack+0x107/0x167 [ 1031.502569] should_fail.cold+0x5/0xa [ 1031.502893] ? create_object.isra.0+0x3a/0xa20 [ 1031.503284] should_failslab+0x5/0x20 [ 1031.503606] kmem_cache_alloc+0x5b/0x310 [ 1031.503958] create_object.isra.0+0x3a/0xa20 [ 1031.504329] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.504759] __kmalloc_node+0x1ae/0x420 [ 1031.505103] kvmalloc_node+0x119/0x170 [ 1031.505433] seq_read_iter+0x9d6/0x12b0 [ 1031.505885] seq_read+0x3dd/0x5b0 [ 1031.506280] ? seq_read_iter+0x12b0/0x12b0 [ 1031.506641] ? find_held_lock+0x2c/0x110 [ 1031.506997] ? _cond_resched+0x12/0x80 [ 1031.507334] ? fsnotify_perm.part.0+0x22d/0x620 [ 1031.507729] ? seq_read_iter+0x12b0/0x12b0 [ 1031.508087] proc_reg_read+0x22a/0x300 [ 1031.508424] ? proc_reg_write+0x300/0x300 [ 1031.508773] vfs_read+0x228/0x620 [ 1031.509073] __x64_sys_pread64+0x201/0x260 [ 1031.509431] ? ksys_pread64+0x1b0/0x1b0 [ 1031.509893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.510429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.510865] do_syscall_64+0x33/0x40 [ 1031.511179] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.511650] RIP: 0033:0x7f1796040b19 [ 1031.511965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.513644] RSP: 002b:00007f17935b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1031.514399] RAX: ffffffffffffffda RBX: 00007f1796153f60 RCX: 00007f1796040b19 [ 1031.514991] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000005 [ 1031.515629] RBP: 00007f17935b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.516221] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 1031.516854] R13: 00007ffe3f30942f R14: 00007f17935b6300 R15: 0000000000022000 21:05:52 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x58, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000600)={{0x0, 0x9, 0x30, 0x6, 0x400, 0x6, 0x0, 0x6, 0x3ff, 0x6, 0x5, 0x0, 0x10001, 0x6a, 0xffffffff}, 0x8, [0x0]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), 0x8, &(0x7f0000001c80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',loose,pcr=00000000000000000002,euid=', @ANYRESDEC, @ANYBLOB="2c0ea0669bde0714de17fc00"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000500)=ANY=[@ANYBLOB="37b50b7f09c124e5237bd827a5ff3c85f44cc2197d7a1336652365a1eef58b8c42f6874e14c5097a38a26b9f2741b75f9a958021021141fef703aa8daff58dc6938dc5f7b7cdefe372668b1f8ac9983fac658810693ba952f49103a13ed5a59dc648108a743a0eafa62d5518eec424887ccf890f08dc28a27068da03e30ad7cf253faa327105ba6764bbfe0a2caee0fafd85d05371be674f7604ff5f06be1c691c9f659f3609c6066ea410", @ANYRES32=r0, @ANYRES64=r1, @ANYRESOCT=r2]) chdir(&(0x7f0000000300)='./file2\x00') futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x24, 0x18, 0xc21, 0x0, 0x0, {0x20}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x5, 0x0, 0x0, @ipv4=@empty}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x10001, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:52 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:05:52 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 3) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:52 executing program 0: ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000100)=""/136) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000001c0)) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x9, 0x9b, 0xffffffff, 0x3, 0x20000000, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0xfffffffffffffffc) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') recvmmsg$unix(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/83, 0x53}, {&(0x7f00000003c0)=""/204, 0xcc}], 0x2, &(0x7f0000000500)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}], 0x1, 0x2040, &(0x7f0000000680)={0x77359400}) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x96, 0x1, 0x1f, 0x5, 0x0, 0x7fff, 0x11908, 0x5a090041efb00c3e, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000200), 0x7}, 0x1000, 0xffff, 0x1, 0x3, 0x401, 0x9, 0xffc0, 0x0, 0x3, 0x0, 0x18a}, 0xffffffffffffffff, 0xd, r4, 0x9) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000080)=""/116) [ 1031.680437] FAULT_INJECTION: forcing a failure. [ 1031.680437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1031.681525] CPU: 1 PID: 6988 Comm: syz-executor.7 Not tainted 5.10.225 #1 [ 1031.682104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.682797] Call Trace: [ 1031.683026] dump_stack+0x107/0x167 [ 1031.683335] should_fail.cold+0x5/0xa [ 1031.683663] _copy_to_user+0x2e/0x180 [ 1031.683992] simple_read_from_buffer+0xcc/0x160 [ 1031.684397] proc_fail_nth_read+0x198/0x230 [ 1031.684764] ? proc_sessionid_read+0x230/0x230 [ 1031.685153] ? security_file_permission+0xb1/0xe0 [ 1031.685874] ? proc_sessionid_read+0x230/0x230 [ 1031.686977] vfs_read+0x228/0x620 [ 1031.687972] ksys_read+0x12d/0x260 [ 1031.688869] ? vfs_write+0xb10/0xb10 [ 1031.689763] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.691125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.692341] do_syscall_64+0x33/0x40 [ 1031.693358] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.694596] RIP: 0033:0x7f1795ff369c [ 1031.695461] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1031.699825] RSP: 002b:00007f17935b6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1031.701640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1795ff369c [ 1031.703321] RDX: 000000000000000f RSI: 00007f17935b61e0 RDI: 0000000000000006 [ 1031.704993] RBP: 00007f17935b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.706689] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 1031.708354] R13: 00007ffe3f30942f R14: 00007f17935b6300 R15: 0000000000022000 21:05:52 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, 0x0, 0x0, 0x5) 21:05:52 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:05:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 29) 21:05:52 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:05:52 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x200800, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0x4, 0xb7, 0x5, 0x0, 0x100, 0x88000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x9, 0x4, 0x2, 0x5, 0x101, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x2, r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:05:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:05:52 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1031.817157] FAULT_INJECTION: forcing a failure. [ 1031.817157] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.817228] CPU: 0 PID: 7003 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1031.817235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.817239] Call Trace: [ 1031.817257] dump_stack+0x107/0x167 [ 1031.817271] should_fail.cold+0x5/0xa [ 1031.817286] ? mempool_alloc+0x148/0x360 [ 1031.817297] ? mempool_free_pages+0x20/0x20 [ 1031.817310] should_failslab+0x5/0x20 [ 1031.817323] kmem_cache_alloc+0x5b/0x310 [ 1031.817337] ? mempool_free_pages+0x20/0x20 [ 1031.817347] mempool_alloc+0x148/0x360 [ 1031.817363] ? mempool_resize+0x7d0/0x7d0 [ 1031.817382] ? mark_lock+0xf5/0x2df0 [ 1031.817396] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1031.817416] __sg_alloc_table+0x24e/0x390 [ 1031.817451] sg_alloc_table_chained+0x9b/0x1f0 [ 1031.817470] ? sg_alloc_table_chained+0x1f0/0x1f0 [ 1031.817485] scsi_alloc_sgtables+0x236/0xaf0 [ 1031.817501] ? scsi_cmd_runtime_exceeced+0x1d0/0x1d0 [ 1031.817514] ? lockdep_init_map_type+0x2c7/0x780 [ 1031.817532] sd_init_command+0x516/0x3550 [ 1031.817555] scsi_queue_rq+0xe5e/0x27f0 [ 1031.817581] blk_mq_dispatch_rq_list+0x372/0x1c40 [ 1031.817605] ? elv_rb_del+0x50/0xa0 [ 1031.817615] ? elv_rqhash_del+0x119/0x160 [ 1031.817628] ? blk_mq_dequeue_from_ctx+0x7f0/0x7f0 [ 1031.817645] ? dd_dispatch_request+0x1c0/0x990 [ 1031.817662] blk_mq_do_dispatch_sched+0x7f4/0xa00 [ 1031.817685] ? blk_mq_sched_mark_restart_hctx+0x80/0x80 [ 1031.817698] ? lock_acquire+0x197/0x470 [ 1031.817710] ? hctx_lock+0x7f/0x200 [ 1031.817726] __blk_mq_sched_dispatch_requests+0x2d7/0x450 [ 1031.817739] ? blk_mq_do_dispatch_sched+0xa00/0xa00 [ 1031.817759] blk_mq_sched_dispatch_requests+0xfb/0x180 [ 1031.817774] __blk_mq_run_hw_queue+0x12c/0x290 [ 1031.817787] ? blk_mq_start_request+0x3f0/0x3f0 [ 1031.817801] ? do_raw_spin_lock+0x121/0x260 [ 1031.817818] __blk_mq_delay_run_hw_queue+0x4f1/0x550 [ 1031.817834] blk_mq_run_hw_queue+0x170/0x2f0 [ 1031.817847] ? blk_mq_delay_run_hw_queues+0x1a0/0x1a0 [ 1031.817864] ? dd_dispatch_request+0x990/0x990 [ 1031.817875] blk_mq_sched_insert_requests+0x247/0x720 [ 1031.817893] blk_mq_flush_plug_list+0x415/0x6c0 [ 1031.817911] ? blk_mq_insert_requests+0x450/0x450 [ 1031.817927] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1031.817944] blk_flush_plug_list+0x26c/0x3c0 [ 1031.817955] ? mark_held_locks+0x9e/0xe0 [ 1031.817969] ? blk_insert_cloned_request+0x450/0x450 [ 1031.817986] blk_finish_plug+0x50/0xa0 [ 1031.817999] __iomap_dio_rw+0xca0/0x1110 [ 1031.818021] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1031.818041] ? down_read+0x10f/0x430 [ 1031.818053] ? down_write+0x160/0x160 [ 1031.818069] iomap_dio_rw+0x31/0x90 [ 1031.818083] ext4_file_read_iter+0x2c7/0x4c0 [ 1031.818098] generic_file_splice_read+0x455/0x6d0 [ 1031.818110] ? pipe_to_user+0x170/0x170 [ 1031.818129] ? fsnotify_perm.part.0+0x22d/0x620 [ 1031.818145] ? security_file_permission+0xb1/0xe0 [ 1031.818158] ? pipe_to_user+0x170/0x170 [ 1031.818169] do_splice_to+0x10e/0x160 [ 1031.818183] splice_direct_to_actor+0x2fe/0x980 [ 1031.818198] ? pipe_to_sendpage+0x380/0x380 [ 1031.818212] ? do_splice_to+0x160/0x160 [ 1031.818225] ? security_file_permission+0xb1/0xe0 [ 1031.818242] do_splice_direct+0x1c4/0x290 [ 1031.818253] ? splice_direct_to_actor+0x980/0x980 [ 1031.818263] ? avc_policy_seqno+0x9/0x70 [ 1031.818280] ? security_file_permission+0xb1/0xe0 [ 1031.818299] do_sendfile+0x553/0x11e0 [ 1031.818318] ? do_pwritev+0x270/0x270 [ 1031.818331] ? wait_for_completion_io+0x270/0x270 [ 1031.818346] ? rcu_read_lock_any_held+0x75/0xa0 [ 1031.818355] ? vfs_write+0x354/0xb10 [ 1031.818371] __x64_sys_sendfile64+0x1d1/0x210 [ 1031.818385] ? __ia32_sys_sendfile+0x220/0x220 [ 1031.818399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.818411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.818428] do_syscall_64+0x33/0x40 [ 1031.818439] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.818446] RIP: 0033:0x7fb1ac5e0b19 [ 1031.818458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.818464] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1031.818478] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1031.818485] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1031.818504] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.818511] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1031.818518] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:06:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x100010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0x5}, 0x78) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:05 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:05 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x20000293, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:06:05 executing program 1: shmctl$SHM_UNLOCK(0x0, 0xc) shmat(0x0, &(0x7f000086c000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x3}, 0x0, 0xfffffffffffffffd, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) r1 = shmget(0x1, 0x1000, 0x1000, &(0x7f000086e000/0x1000)=nil) shmat(r1, &(0x7f000086d000/0x1000)=nil, 0x1000) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000867000/0xb000)=nil, 0x3000) r2 = open(&(0x7f0000000000)='./file0\x00', 0x12080, 0x0) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000000140)=""/29) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000080)=""/146) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) mmap$IORING_OFF_SQ_RING(&(0x7f0000868000/0x3000)=nil, 0x3000, 0x2000003, 0x30, r5, 0x0) 21:06:05 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:05 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 30) 21:06:05 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:05 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, 0x0, 0x0, 0x5) [ 1044.814841] FAULT_INJECTION: forcing a failure. [ 1044.814841] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.814861] CPU: 1 PID: 7031 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1044.814869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1044.814874] Call Trace: [ 1044.814895] dump_stack+0x107/0x167 [ 1044.814911] should_fail.cold+0x5/0xa [ 1044.814928] ? ___slab_alloc+0x155/0x700 [ 1044.814944] ? create_object.isra.0+0x3a/0xa20 [ 1044.814962] should_failslab+0x5/0x20 [ 1044.814976] kmem_cache_alloc+0x5b/0x310 [ 1044.814996] create_object.isra.0+0x3a/0xa20 [ 1044.815011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1044.815031] kmem_cache_alloc_node+0x169/0x330 [ 1044.815054] create_task_io_context+0x2c/0x430 [ 1044.815073] submit_bio_checks+0x1382/0x1730 [ 1044.815089] ? alloc_pages_current+0x18f/0x280 21:06:05 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1044.815104] ? lock_acquire+0x197/0x470 [ 1044.815121] ? trace_event_raw_event_block_rq_requeue+0x560/0x560 [ 1044.815136] ? push_pipe+0x404/0x6d0 [ 1044.815162] submit_bio_noacct+0x82/0x1010 [ 1044.815184] ? blk_queue_enter+0xc30/0xc30 [ 1044.815211] submit_bio+0xf3/0x4e0 [ 1044.815226] ? submit_bio_noacct+0x1010/0x1010 [ 1044.815245] ? bio_add_pc_page+0x100/0x100 [ 1044.815258] ? bvec_alloc+0x210/0x2f0 [ 1044.815279] iomap_dio_submit_bio+0x295/0x360 [ 1044.815298] iomap_dio_bio_actor+0x4b3/0xef0 [ 1044.815327] iomap_dio_actor+0x36f/0x560 [ 1044.815348] iomap_apply+0x289/0x810 [ 1044.815362] ? iomap_dio_rw+0x90/0x90 [ 1044.815379] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1044.815401] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1044.815414] ? mark_held_locks+0x9e/0xe0 [ 1044.815442] ? filemap_check_errors+0xa5/0x150 [ 1044.815461] __iomap_dio_rw+0x6cd/0x1110 21:06:05 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, 0x0, 0x0, 0x5) 21:06:05 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) clone3(&(0x7f0000000300)={0x1180000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0, {0x1f}, &(0x7f0000000140)=""/106, 0x6a, &(0x7f00000001c0)=""/89, &(0x7f00000002c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0xa, {r0}}, 0x58) r2 = syz_open_procfs(r1, &(0x7f0000000040)='comm\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x40, 0xffff, 0x401}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) fcntl$dupfd(r3, 0x0, r4) 21:06:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x3, 0x80, 0xb8, 0x10000, 0x1, 0x3, 0x5, 0x6f, 0x40, 0x114, 0x4400000, 0x4, 0x38, 0x2, 0x1ff, 0x7, 0x416}, [{0x2, 0x1000, 0x3ff, 0x7, 0x10000, 0x3c63, 0x80, 0x401}], "5c1bafacc8", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x87d) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000000)={0x0, 0x2, 0x706}) [ 1044.815474] ? iomap_dio_rw+0x90/0x90 [ 1044.815504] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1044.815531] ? down_read+0x10f/0x430 [ 1044.815546] ? down_write+0x160/0x160 [ 1044.815567] iomap_dio_rw+0x31/0x90 [ 1044.815585] ext4_file_read_iter+0x2c7/0x4c0 [ 1044.815604] generic_file_splice_read+0x455/0x6d0 [ 1044.815620] ? pipe_to_user+0x170/0x170 [ 1044.815644] ? fsnotify_perm.part.0+0x22d/0x620 [ 1044.815664] ? security_file_permission+0xb1/0xe0 [ 1044.815681] ? pipe_to_user+0x170/0x170 [ 1044.815696] do_splice_to+0x10e/0x160 [ 1044.815713] splice_direct_to_actor+0x2fe/0x980 [ 1044.815732] ? pipe_to_sendpage+0x380/0x380 [ 1044.815750] ? do_splice_to+0x160/0x160 [ 1044.815767] ? security_file_permission+0xb1/0xe0 [ 1044.815786] do_splice_direct+0x1c4/0x290 [ 1044.815801] ? splice_direct_to_actor+0x980/0x980 [ 1044.815813] ? avc_policy_seqno+0x9/0x70 [ 1044.815834] ? security_file_permission+0xb1/0xe0 [ 1044.815857] do_sendfile+0x553/0x11e0 [ 1044.815882] ? do_pwritev+0x270/0x270 [ 1044.815899] ? wait_for_completion_io+0x270/0x270 [ 1044.815917] ? rcu_read_lock_any_held+0x75/0xa0 [ 1044.815929] ? vfs_write+0x354/0xb10 [ 1044.815949] __x64_sys_sendfile64+0x1d1/0x210 [ 1044.815966] ? __ia32_sys_sendfile+0x220/0x220 [ 1044.815984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1044.815997] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1044.816013] do_syscall_64+0x33/0x40 [ 1044.816027] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1044.816037] RIP: 0033:0x7fb1ac5e0b19 [ 1044.816052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1044.816061] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1044.816078] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1044.816086] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1044.816095] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1044.816103] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1044.816112] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:06:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:18 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x180) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:06:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x0) 21:06:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x3, 0x0, 0x9, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x100, 0x105, 0xffffffff, 0x7, 0x0, 0xfffffffe, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 31) 21:06:18 executing program 1: r0 = shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000100)=""/147) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(r0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/111) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1057.871391] FAULT_INJECTION: forcing a failure. [ 1057.871391] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.872702] CPU: 1 PID: 7068 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1057.873289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1057.874014] Call Trace: [ 1057.874248] dump_stack+0x107/0x167 [ 1057.874563] should_fail.cold+0x5/0xa [ 1057.874891] ? mempool_alloc+0x148/0x360 [ 1057.875237] ? mempool_free_pages+0x20/0x20 [ 1057.875606] should_failslab+0x5/0x20 [ 1057.875937] kmem_cache_alloc+0x5b/0x310 [ 1057.876285] ? mempool_free_pages+0x20/0x20 [ 1057.876650] mempool_alloc+0x148/0x360 [ 1057.876987] ? mempool_resize+0x7d0/0x7d0 [ 1057.877345] ? mark_lock+0xf5/0x2df0 [ 1057.877666] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1057.878135] __sg_alloc_table+0x24e/0x390 [ 1057.878503] sg_alloc_table_chained+0x9b/0x1f0 [ 1057.878894] ? sg_alloc_table_chained+0x1f0/0x1f0 [ 1057.879314] scsi_alloc_sgtables+0x236/0xaf0 [ 1057.879696] ? scsi_cmd_runtime_exceeced+0x1d0/0x1d0 [ 1057.880140] ? lockdep_init_map_type+0x2c7/0x780 [ 1057.880561] sd_init_command+0x516/0x3550 [ 1057.880933] scsi_queue_rq+0xe5e/0x27f0 [ 1057.881292] blk_mq_dispatch_rq_list+0x372/0x1c40 [ 1057.881721] ? elv_rb_del+0x50/0xa0 [ 1057.882043] ? elv_rqhash_del+0x119/0x160 [ 1057.882406] ? blk_mq_dequeue_from_ctx+0x7f0/0x7f0 [ 1057.882838] ? dd_dispatch_request+0x1c0/0x990 [ 1057.883235] blk_mq_do_dispatch_sched+0x7f4/0xa00 [ 1057.883654] ? blk_mq_sched_mark_restart_hctx+0x80/0x80 [ 1057.884113] ? lock_acquire+0x197/0x470 [ 1057.884450] ? hctx_lock+0x7f/0x200 [ 1057.884765] __blk_mq_sched_dispatch_requests+0x2d7/0x450 [ 1057.885229] ? blk_mq_do_dispatch_sched+0xa00/0xa00 21:06:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x0) [ 1057.885661] blk_mq_sched_dispatch_requests+0xfb/0x180 [ 1057.886125] __blk_mq_run_hw_queue+0x12c/0x290 [ 1057.886513] ? blk_mq_start_request+0x3f0/0x3f0 [ 1057.886911] ? do_raw_spin_lock+0x121/0x260 [ 1057.897883] __blk_mq_delay_run_hw_queue+0x4f1/0x550 [ 1057.898323] blk_mq_run_hw_queue+0x170/0x2f0 [ 1057.898697] ? blk_mq_delay_run_hw_queues+0x1a0/0x1a0 [ 1057.899138] ? dd_dispatch_request+0x990/0x990 [ 1057.899524] blk_mq_sched_insert_requests+0x247/0x720 [ 1057.899968] blk_mq_flush_plug_list+0x415/0x6c0 [ 1057.900369] ? blk_mq_insert_requests+0x450/0x450 [ 1057.900783] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1057.901274] blk_flush_plug_list+0x26c/0x3c0 21:06:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1057.901646] ? mark_held_locks+0x9e/0xe0 [ 1057.902015] ? blk_insert_cloned_request+0x450/0x450 [ 1057.902452] blk_finish_plug+0x50/0xa0 [ 1057.902781] __iomap_dio_rw+0xca0/0x1110 [ 1057.903141] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1057.903537] ? down_read+0x10f/0x430 [ 1057.903852] ? down_write+0x160/0x160 [ 1057.904178] iomap_dio_rw+0x31/0x90 [ 1057.904490] ext4_file_read_iter+0x2c7/0x4c0 [ 1057.904870] generic_file_splice_read+0x455/0x6d0 [ 1057.905276] ? pipe_to_user+0x170/0x170 [ 1057.913968] ? fsnotify_perm.part.0+0x22d/0x620 [ 1057.914367] ? security_file_permission+0xb1/0xe0 [ 1057.914774] ? pipe_to_user+0x170/0x170 [ 1057.915110] do_splice_to+0x10e/0x160 [ 1057.915436] splice_direct_to_actor+0x2fe/0x980 [ 1057.915832] ? pipe_to_sendpage+0x380/0x380 [ 1057.916199] ? do_splice_to+0x160/0x160 [ 1057.916534] ? security_file_permission+0xb1/0xe0 [ 1057.916947] do_splice_direct+0x1c4/0x290 [ 1057.917297] ? splice_direct_to_actor+0x980/0x980 [ 1057.917700] ? avc_policy_seqno+0x9/0x70 [ 1057.918073] ? security_file_permission+0xb1/0xe0 [ 1057.918493] do_sendfile+0x553/0x11e0 [ 1057.918825] ? do_pwritev+0x270/0x270 [ 1057.919148] ? wait_for_completion_io+0x270/0x270 [ 1057.919558] ? rcu_read_lock_any_held+0x75/0xa0 [ 1057.919947] ? vfs_write+0x354/0xb10 [ 1057.920269] __x64_sys_sendfile64+0x1d1/0x210 [ 1057.920648] ? __ia32_sys_sendfile+0x220/0x220 [ 1057.921040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1057.921481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1057.921932] do_syscall_64+0x33/0x40 [ 1057.922248] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1057.922684] RIP: 0033:0x7fb1ac5e0b19 [ 1057.923003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1057.924551] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1057.925205] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1057.925802] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1057.926411] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1057.927014] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1057.927614] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:06:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffe1, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)={0x2, 0x7, 0x3, 0x7, 0x17, "5f9fda32bc6efc5e"}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:18 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x0) 21:06:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:18 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000200)={0x4, &(0x7f0000000180)=[{0x80, 0x4d, &(0x7f0000000080)="7adc65f8545dc0a0012066888d4fb23ef270b190bfe6eee0d9e211d4fe51653e31e354d043c17c262973e58d8e723e001326bf1ddc9d3fbc0f79db45f0f1e3562941025116a077ddef51e5b654"}, {0x1a, 0x51, &(0x7f0000000100)="37b28df5b71930e6cad91f4e5362c888856c7d6e80c238bc553377ccdba6d40eecddc6924cfb141e28da88db7f6710110b74df0a3f58b298115b47b57739fdd74773e1c448004ce4efb73b6af1fb5adcd1"}, {0x5, 0xfa, &(0x7f00000002c0)="7da62e0b0ba99e74926af6ba4089b3ca2286c044ccb31b9157cc8fb3e439cc86b66292fbab678a63647a0e45c702f90a153f094865fe56f81c65f65ebf643366caae73dfbeb70429bc423dc0b5a7e00f87f197c62b3789d5d5e2a1f796753b5e42acb2d08de809397809486ab212706481fcf39d30da5c1a9a1662585fb3e2b656b560b106386ff9462bf0831310abe58c8f0ffb92dac64d5b03f8c9d875614a8d17715db47da65f9d58d3f01db3a5132b2a1857c62439b07985e42059a7f5d200f5cbceb3a31767ac12321cc1ed2f7e9f7300573af6567a1cef2298ff81d72f92f8f39005934865197ee0d17a0689982007c5397084fc089c94"}, {0x20, 0x1000, &(0x7f00000003c0)="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"}]}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x8, 0x6}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000000)={0x3, 0x9, 0x6fc}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/module/usbcore', 0x0, 0x1b8) copy_file_range(r2, 0x0, r0, &(0x7f0000000340)=0xffff, 0x5, 0x0) 21:06:18 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0x0, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:06:31 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:31 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) (fail_nth: 1) [ 1071.197671] FAULT_INJECTION: forcing a failure. [ 1071.197671] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.198684] CPU: 1 PID: 7112 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1071.199258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1071.199959] Call Trace: [ 1071.200193] dump_stack+0x107/0x167 [ 1071.200509] should_fail.cold+0x5/0xa [ 1071.200839] ? create_object.isra.0+0x3a/0xa20 [ 1071.201232] should_failslab+0x5/0x20 [ 1071.201559] kmem_cache_alloc+0x5b/0x310 [ 1071.201912] create_object.isra.0+0x3a/0xa20 [ 1071.205211] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1071.205645] kmem_cache_alloc+0x159/0x310 [ 1071.206006] ? mempool_free_pages+0x20/0x20 [ 1071.206384] mempool_alloc+0x148/0x360 [ 1071.206722] ? mempool_resize+0x7d0/0x7d0 [ 1071.207079] ? mark_lock+0xf5/0x2df0 [ 1071.207400] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1071.207855] __sg_alloc_table+0x24e/0x390 [ 1071.208217] sg_alloc_table_chained+0x9b/0x1f0 [ 1071.208604] ? sg_alloc_table_chained+0x1f0/0x1f0 [ 1071.209022] scsi_alloc_sgtables+0x236/0xaf0 [ 1071.209401] ? scsi_cmd_runtime_exceeced+0x1d0/0x1d0 [ 1071.209832] ? lockdep_init_map_type+0x2c7/0x780 [ 1071.210262] sd_init_command+0x516/0x3550 [ 1071.210625] scsi_queue_rq+0xe5e/0x27f0 [ 1071.210978] blk_mq_dispatch_rq_list+0x372/0x1c40 [ 1071.211397] ? elv_rb_del+0x50/0xa0 [ 1071.211704] ? elv_rqhash_del+0x119/0x160 [ 1071.212059] ? blk_mq_dequeue_from_ctx+0x7f0/0x7f0 [ 1071.212481] ? dd_dispatch_request+0x1c0/0x990 [ 1071.212877] blk_mq_do_dispatch_sched+0x7f4/0xa00 [ 1071.213294] ? blk_mq_sched_mark_restart_hctx+0x80/0x80 [ 1071.213746] ? lock_acquire+0x197/0x470 [ 1071.214094] ? hctx_lock+0x7f/0x200 [ 1071.214416] __blk_mq_sched_dispatch_requests+0x2d7/0x450 [ 1071.214884] ? blk_mq_do_dispatch_sched+0xa00/0xa00 [ 1071.215320] blk_mq_sched_dispatch_requests+0xfb/0x180 [ 1071.215768] __blk_mq_run_hw_queue+0x12c/0x290 [ 1071.216157] ? blk_mq_start_request+0x3f0/0x3f0 [ 1071.216557] ? do_raw_spin_lock+0x121/0x260 [ 1071.216930] __blk_mq_delay_run_hw_queue+0x4f1/0x550 [ 1071.217368] blk_mq_run_hw_queue+0x170/0x2f0 21:06:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 32) 21:06:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1071.217744] ? blk_mq_delay_run_hw_queues+0x1a0/0x1a0 [ 1071.234243] ? dd_dispatch_request+0x990/0x990 [ 1071.234665] blk_mq_sched_insert_requests+0x247/0x720 [ 1071.235149] blk_mq_flush_plug_list+0x415/0x6c0 [ 1071.235590] ? blk_mq_insert_requests+0x450/0x450 [ 1071.236044] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1071.236582] blk_flush_plug_list+0x26c/0x3c0 [ 1071.236992] ? mark_held_locks+0x9e/0xe0 [ 1071.237373] ? blk_insert_cloned_request+0x450/0x450 21:06:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0xfffffffffffffffe, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:31 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x5, 0x20400) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000180)={0x28, 0xcf2, 0x1}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000200)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:06:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:31 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) [ 1071.237856] blk_finish_plug+0x50/0xa0 [ 1071.238240] __iomap_dio_rw+0xca0/0x1110 [ 1071.246089] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1071.246531] ? down_read+0x10f/0x430 [ 1071.246879] ? down_write+0x160/0x160 [ 1071.247241] iomap_dio_rw+0x31/0x90 [ 1071.247584] ext4_file_read_iter+0x2c7/0x4c0 [ 1071.247998] generic_file_splice_read+0x455/0x6d0 [ 1071.248446] ? pipe_to_user+0x170/0x170 [ 1071.248828] ? fsnotify_perm.part.0+0x22d/0x620 [ 1071.249265] ? security_file_permission+0xb1/0xe0 [ 1071.249708] ? pipe_to_user+0x170/0x170 [ 1071.250089] do_splice_to+0x10e/0x160 [ 1071.250449] splice_direct_to_actor+0x2fe/0x980 [ 1071.250875] ? pipe_to_sendpage+0x380/0x380 [ 1071.251276] ? do_splice_to+0x160/0x160 [ 1071.251644] ? security_file_permission+0xb1/0xe0 [ 1071.252101] do_splice_direct+0x1c4/0x290 [ 1071.252488] ? splice_direct_to_actor+0x980/0x980 [ 1071.252928] ? avc_policy_seqno+0x9/0x70 [ 1071.253303] ? security_file_permission+0xb1/0xe0 [ 1071.253720] do_sendfile+0x553/0x11e0 [ 1071.254064] ? do_pwritev+0x270/0x270 [ 1071.254393] ? wait_for_completion_io+0x270/0x270 [ 1071.254805] ? rcu_read_lock_any_held+0x75/0xa0 [ 1071.255198] ? vfs_write+0x354/0xb10 [ 1071.255522] __x64_sys_sendfile64+0x1d1/0x210 [ 1071.255905] ? __ia32_sys_sendfile+0x220/0x220 [ 1071.256296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1071.256738] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1071.257183] do_syscall_64+0x33/0x40 [ 1071.257498] entry_SYSCALL_64_after_hwframe+0x67/0xd1 21:06:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) [ 1071.257931] RIP: 0033:0x7fb1ac5e0b19 [ 1071.258288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.266950] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1071.267659] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1071.268303] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1071.268953] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.269598] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1071.270273] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1071.287377] FAULT_INJECTION: forcing a failure. [ 1071.287377] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.288474] CPU: 0 PID: 7111 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1071.289105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1071.289870] Call Trace: [ 1071.294131] dump_stack+0x107/0x167 [ 1071.294492] should_fail.cold+0x5/0xa [ 1071.294855] ? kvmalloc_node+0x119/0x170 [ 1071.295246] should_failslab+0x5/0x20 [ 1071.295614] __kmalloc_node+0x76/0x420 [ 1071.295980] kvmalloc_node+0x119/0x170 [ 1071.296348] seq_read_iter+0x9d6/0x12b0 [ 1071.296752] seq_read+0x3dd/0x5b0 [ 1071.297083] ? seq_read_iter+0x12b0/0x12b0 [ 1071.297494] ? find_held_lock+0x2c/0x110 [ 1071.297900] ? _cond_resched+0x12/0x80 [ 1071.298303] ? fsnotify_perm.part.0+0x22d/0x620 [ 1071.298762] ? seq_read_iter+0x12b0/0x12b0 [ 1071.299173] proc_reg_read+0x22a/0x300 [ 1071.299551] ? proc_reg_write+0x300/0x300 [ 1071.299965] vfs_read+0x228/0x620 [ 1071.300309] __x64_sys_pread64+0x201/0x260 [ 1071.300716] ? ksys_pread64+0x1b0/0x1b0 [ 1071.301118] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1071.301612] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1071.302124] do_syscall_64+0x33/0x40 [ 1071.302482] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1071.302976] RIP: 0033:0x7fa841c0cb19 [ 1071.303340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.305064] RSP: 002b:00007fa83f182188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1071.305799] RAX: ffffffffffffffda RBX: 00007fa841d1ff60 RCX: 00007fa841c0cb19 [ 1071.306499] RDX: 0000000000000049 RSI: 0000000020000080 RDI: 0000000000000003 [ 1071.307169] RBP: 00007fa83f1821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.307835] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 1071.308509] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 21:06:32 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8, 0xd, 0x8, 0x2, 0x0, 0x7fff, 0x8041, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xf1, 0x1, @perf_config_ext={0x4, 0x3}, 0x10000, 0xf6, 0xfffff982, 0x9, 0x4, 0x6, 0xb681, 0x0, 0x659, 0x0, 0x2}, 0xffffffffffffffff, 0x8, r0, 0x9) flock(r0, 0xa) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000866000/0x4000)=nil, 0x5000) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:32 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) (fail_nth: 2) 21:06:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1071.441113] FAULT_INJECTION: forcing a failure. [ 1071.441113] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.441127] CPU: 1 PID: 7136 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1071.441134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:06:32 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) (fail_nth: 3) 21:06:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r3 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r3) [ 1071.441138] Call Trace: [ 1071.441157] dump_stack+0x107/0x167 [ 1071.441174] should_fail.cold+0x5/0xa 21:06:32 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, 0x0, &(0x7f0000000300)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 33) 21:06:32 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:32 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1071.441189] ? create_object.isra.0+0x3a/0xa20 [ 1071.441203] should_failslab+0x5/0x20 [ 1071.441215] kmem_cache_alloc+0x5b/0x310 [ 1071.441230] create_object.isra.0+0x3a/0xa20 [ 1071.441242] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1071.441256] __kmalloc_node+0x1ae/0x420 21:06:32 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1071.441275] kvmalloc_node+0x119/0x170 [ 1071.441288] seq_read_iter+0x9d6/0x12b0 [ 1071.441309] seq_read+0x3dd/0x5b0 [ 1071.441322] ? seq_read_iter+0x12b0/0x12b0 [ 1071.441335] ? find_held_lock+0x2c/0x110 [ 1071.441353] ? _cond_resched+0x12/0x80 [ 1071.441371] ? fsnotify_perm.part.0+0x22d/0x620 [ 1071.441386] ? seq_read_iter+0x12b0/0x12b0 [ 1071.441399] proc_reg_read+0x22a/0x300 [ 1071.441412] ? proc_reg_write+0x300/0x300 21:06:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100000001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf5, 0xd6, 0x44, 0x7, 0x0, 0x6, 0x842, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x2830, 0x8bad, 0x1, 0x0, 0x4, 0x7, 0x8, 0x0, 0xf6b, 0x0, 0x7}, r1, 0x2, r0, 0x9) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1071.441423] vfs_read+0x228/0x620 [ 1071.441440] __x64_sys_pread64+0x201/0x260 [ 1071.441452] ? ksys_pread64+0x1b0/0x1b0 [ 1071.441467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1071.441479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1071.441492] do_syscall_64+0x33/0x40 [ 1071.441504] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1071.441512] RIP: 0033:0x7fa841c0cb19 [ 1071.441524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.441531] RSP: 002b:00007fa83f182188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1071.441544] RAX: ffffffffffffffda RBX: 00007fa841d1ff60 RCX: 00007fa841c0cb19 [ 1071.441551] RDX: 0000000000000049 RSI: 0000000020000080 RDI: 0000000000000003 [ 1071.441557] RBP: 00007fa83f1821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.441564] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 1071.441571] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 [ 1071.531520] FAULT_INJECTION: forcing a failure. [ 1071.531520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1071.531538] CPU: 0 PID: 7146 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1071.531547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1071.531552] Call Trace: [ 1071.531574] dump_stack+0x107/0x167 [ 1071.531590] should_fail.cold+0x5/0xa [ 1071.531611] _copy_to_iter+0x264/0x12d0 [ 1071.531640] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1071.531659] ? __virt_addr_valid+0x170/0x5d0 [ 1071.531676] ? __check_object_size+0x319/0x440 [ 1071.531698] seq_read_iter+0x71a/0x12b0 [ 1071.531726] seq_read+0x3dd/0x5b0 [ 1071.531741] ? seq_read_iter+0x12b0/0x12b0 [ 1071.531757] ? find_held_lock+0x2c/0x110 [ 1071.531790] ? _cond_resched+0x12/0x80 [ 1071.531830] ? fsnotify_perm.part.0+0x22d/0x620 [ 1071.531868] ? seq_read_iter+0x12b0/0x12b0 [ 1071.531899] proc_reg_read+0x22a/0x300 [ 1071.531929] ? proc_reg_write+0x300/0x300 [ 1071.531956] vfs_read+0x228/0x620 [ 1071.531995] __x64_sys_pread64+0x201/0x260 [ 1071.532025] ? ksys_pread64+0x1b0/0x1b0 [ 1071.532062] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1071.532087] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1071.532117] do_syscall_64+0x33/0x40 [ 1071.532138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1071.532154] RIP: 0033:0x7fa841c0cb19 [ 1071.532192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.532208] RSP: 002b:00007fa83f182188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1071.532240] RAX: ffffffffffffffda RBX: 00007fa841d1ff60 RCX: 00007fa841c0cb19 [ 1071.532259] RDX: 0000000000000049 RSI: 0000000020000080 RDI: 0000000000000003 [ 1071.532278] RBP: 00007fa83f1821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.532298] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 1071.532318] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 [ 1071.586804] FAULT_INJECTION: forcing a failure. [ 1071.586804] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.586820] CPU: 1 PID: 7157 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1071.586827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1071.586831] Call Trace: [ 1071.586848] dump_stack+0x107/0x167 [ 1071.586862] should_fail.cold+0x5/0xa [ 1071.586877] ? mempool_alloc+0x148/0x360 [ 1071.586888] ? mempool_free_pages+0x20/0x20 [ 1071.586901] should_failslab+0x5/0x20 [ 1071.586914] kmem_cache_alloc+0x5b/0x310 [ 1071.586927] ? mempool_free_pages+0x20/0x20 [ 1071.586938] mempool_alloc+0x148/0x360 [ 1071.586953] ? mempool_resize+0x7d0/0x7d0 [ 1071.586966] ? lock_downgrade+0x6d0/0x6d0 [ 1071.586979] ? ext4_map_blocks+0x87c/0x1910 [ 1071.587006] bio_alloc_bioset+0x36e/0x600 [ 1071.587019] ? bvec_alloc+0x2f0/0x2f0 [ 1071.587034] ? iov_iter_npages+0x1fd/0xa70 [ 1071.587050] iomap_dio_bio_actor+0x518/0xef0 [ 1071.587073] iomap_dio_actor+0x36f/0x560 [ 1071.587091] iomap_apply+0x289/0x810 [ 1071.587103] ? iomap_dio_rw+0x90/0x90 [ 1071.587117] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1071.587134] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1071.587145] ? mark_held_locks+0x9e/0xe0 [ 1071.587169] ? filemap_check_errors+0xa5/0x150 [ 1071.587184] __iomap_dio_rw+0x6cd/0x1110 [ 1071.587195] ? iomap_dio_rw+0x90/0x90 [ 1071.587219] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1071.587240] ? down_read+0x10f/0x430 [ 1071.587253] ? down_write+0x160/0x160 [ 1071.587269] iomap_dio_rw+0x31/0x90 [ 1071.587282] ext4_file_read_iter+0x2c7/0x4c0 [ 1071.587298] generic_file_splice_read+0x455/0x6d0 [ 1071.587310] ? pipe_to_user+0x170/0x170 [ 1071.587328] ? fsnotify_perm.part.0+0x22d/0x620 [ 1071.587344] ? security_file_permission+0xb1/0xe0 [ 1071.587357] ? pipe_to_user+0x170/0x170 [ 1071.587369] do_splice_to+0x10e/0x160 [ 1071.587382] splice_direct_to_actor+0x2fe/0x980 [ 1071.587398] ? pipe_to_sendpage+0x380/0x380 [ 1071.587412] ? do_splice_to+0x160/0x160 [ 1071.587425] ? security_file_permission+0xb1/0xe0 [ 1071.587444] do_splice_direct+0x1c4/0x290 [ 1071.587456] ? splice_direct_to_actor+0x980/0x980 [ 1071.587467] ? avc_policy_seqno+0x9/0x70 [ 1071.587484] ? security_file_permission+0xb1/0xe0 [ 1071.587504] do_sendfile+0x553/0x11e0 [ 1071.587523] ? do_pwritev+0x270/0x270 [ 1071.587537] ? wait_for_completion_io+0x270/0x270 [ 1071.587552] ? rcu_read_lock_any_held+0x75/0xa0 [ 1071.587561] ? vfs_write+0x354/0xb10 [ 1071.587578] __x64_sys_sendfile64+0x1d1/0x210 [ 1071.587591] ? __ia32_sys_sendfile+0x220/0x220 [ 1071.587605] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1071.587617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1071.587630] do_syscall_64+0x33/0x40 [ 1071.587641] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1071.587649] RIP: 0033:0x7fb1ac5e0b19 [ 1071.587662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1071.587668] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1071.587681] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1071.587688] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1071.587695] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1071.587701] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1071.587708] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:06:45 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) (fail_nth: 4) 21:06:45 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 34) 21:06:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:45 executing program 1: shmat(0xffffffffffffffff, &(0x7f000086a000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:06:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x44004, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000000)) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000100)={0x9, 0x204, 0x402}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = socket$inet6(0xa, 0x2, 0x1ff) sendmsg$inet(r3, &(0x7f0000000400)={&(0x7f0000000780)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000840)=[{&(0x7f00000002c0)="fd660f323e70d6bd43794126cb615b07781913f30e104e522dc8d29da928b4725283d7917109d7e53f0464e38e168ebf00cfc119329eed6ed112bd38733bc9d607ce101eafce4acf5653500c2112f8c76afe020a4407dda83bd89d117692521c8e981f0f2a3ec3cc2881dc", 0x6b}, {&(0x7f0000000340)="cabcb20fe89964b181357d0ecee02d720218e7a98acdd8733a6cdb16c8986b2d7741ba3ffb06416a72f7a7acc64f7a1238ee4e3998c6d038de5c9db0b897d3529649", 0x42}, {&(0x7f0000000440)="9962066c0caa82180fcf78ae24581a29cf7a49aa1f4688d9fd924977a3c82c38d46fab3a45496715bcec50724474303cbf22ee668b4b19c160189e5ece0a89b8324b47248b2b072a", 0x48}, {&(0x7f00000004c0)="ced46d32e001ca394e93473fc25dc3d4c5858977ed7597e602886d8bf186aa19d2cb5cdac56b2a3315f7d48891024e8d048034eff7bdeaff3d636bd085854861f062cd2737abfa3574855eb60b829c43d7e8a276fbca3bd4f427ed1670d9d93956fbf10f39f9e0a70539f30e85f1eb6ce3849f4cae9fd3dba70792cdd6fb6f1ed343fd76d6fd45f090969a63ae205fc1ff9e2f8bf8cb1ffc863fa756dfff9fec3afee60dfe340ad5bf842e28bf98052452e94baeb7c9378d80767f", 0xbb}, {&(0x7f0000000580)="02ba80cd43afdefb4e75c8436fb42c2c37c3afa258c11a5c2da796e12b6770e8c6e4f6ec292652b02b45f73e03ba4f024335529e16e0a49d410328940184cee65106432f195e8711802437f34b1357da36144add6471065459cfb6fe4b14349e48b0c08530e5f2854cdf341fb6057d", 0x6f}, {&(0x7f0000000600)="53cb6365e2e20b7fb06edf7fb4918855bd1631ea781a4c21f263c5081628a208d7010125a6b632efbaf2ef4fb1fa996eaed54eb2a93a3b129237a02e3c3c3b3440cf14050347092ef93301c6ab2e1a9fde360877dd1fa8abc0e60bf6b06411fdddd412bf90089b325e62a9589b225b2997066d40aaa7996accdc92f763001197b4a4fde8", 0x84}, {&(0x7f00000000c0)="e87dfa5ccb3a362b5841e0816abde107fb59a9f85b8c7db2cd7732dd2c4942acd0ab45513e94599f39db964be28ef3cf671471f8f4ffdc163e25b0", 0x3b}, {&(0x7f0000000200)="e17664222652e439a3f88d40809e03effd862411c6e7c05489b168ba613087257e87ccc269a7e0c8c8fca02505d0710a", 0x30}], 0x8, &(0x7f00000007c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}], 0x78}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r4 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r4, 0x2285, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x42042, 0x100) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000000)=0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000180)=ANY=[@ANYBLOB="0062819d0ba070255b1f00000100c8fd18000000", @ANYRES32=r6, @ANYBLOB="9d9b310004bd70e7ec8649012cd26c736082e0382d7539b525f1eda5d04a54fd594ed9efcfc0e750b0bc068e0e8f04d37357047cafb8cdf4dcebecebbfaa5c7a97d7484e1d2e98f164e7da39f99809071c9f547d59e7aa2bff"]) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x2, 0x2, 0x72a, 0x0, 0x7}) kcmp(r7, 0x0, 0x0, r8, r9) 21:06:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1084.863795] FAULT_INJECTION: forcing a failure. [ 1084.863795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1084.865675] CPU: 0 PID: 7177 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1084.870331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1084.871043] Call Trace: [ 1084.871282] dump_stack+0x107/0x167 [ 1084.871608] should_fail.cold+0x5/0xa [ 1084.871947] _copy_to_user+0x2e/0x180 [ 1084.872290] simple_read_from_buffer+0xcc/0x160 [ 1084.872703] proc_fail_nth_read+0x198/0x230 [ 1084.873081] ? proc_sessionid_read+0x230/0x230 [ 1084.873483] ? security_file_permission+0xb1/0xe0 [ 1084.882608] ? proc_sessionid_read+0x230/0x230 [ 1084.883009] vfs_read+0x228/0x620 [ 1084.883321] ksys_read+0x12d/0x260 [ 1084.883633] ? vfs_write+0xb10/0xb10 [ 1084.883965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1084.884426] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1084.884877] do_syscall_64+0x33/0x40 [ 1084.885205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1084.885649] RIP: 0033:0x7fa841bbf69c [ 1084.885976] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1084.887582] RSP: 002b:00007fa83f182170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1084.888250] RAX: ffffffffffffffda RBX: 0000000000000049 RCX: 00007fa841bbf69c [ 1084.888871] RDX: 000000000000000f RSI: 00007fa83f1821e0 RDI: 0000000000000004 [ 1084.889490] RBP: 00007fa83f1821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.890594] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 21:06:45 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 1084.891250] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 [ 1084.892694] FAULT_INJECTION: forcing a failure. [ 1084.892694] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.893903] CPU: 1 PID: 7180 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1084.894586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1084.895361] Call Trace: [ 1084.895617] dump_stack+0x107/0x167 [ 1084.895959] should_fail.cold+0x5/0xa [ 1084.896363] ? create_object.isra.0+0x3a/0xa20 [ 1084.896784] should_failslab+0x5/0x20 [ 1084.897138] kmem_cache_alloc+0x5b/0x310 [ 1084.897594] ? ext4_sb_block_valid+0x382/0x680 [ 1084.898021] create_object.isra.0+0x3a/0xa20 [ 1084.898538] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1084.899012] kmem_cache_alloc+0x159/0x310 [ 1084.899451] ? mempool_free_pages+0x20/0x20 [ 1084.899849] mempool_alloc+0x148/0x360 [ 1084.900215] ? mempool_resize+0x7d0/0x7d0 [ 1084.900645] ? lock_downgrade+0x6d0/0x6d0 [ 1084.901025] ? ext4_map_blocks+0x87c/0x1910 [ 1084.901541] bio_alloc_bioset+0x36e/0x600 [ 1084.901926] ? bvec_alloc+0x2f0/0x2f0 [ 1084.902336] ? iov_iter_npages+0x1fd/0xa70 [ 1084.902726] iomap_dio_bio_actor+0x518/0xef0 [ 1084.903141] iomap_dio_actor+0x36f/0x560 [ 1084.903623] iomap_apply+0x289/0x810 [ 1084.903960] ? iomap_dio_rw+0x90/0x90 [ 1084.904413] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1084.904932] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1084.905453] ? mark_held_locks+0x9e/0xe0 [ 1084.905834] ? filemap_check_errors+0xa5/0x150 [ 1084.906310] __iomap_dio_rw+0x6cd/0x1110 [ 1084.906679] ? iomap_dio_rw+0x90/0x90 [ 1084.907039] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1084.907537] ? down_read+0x10f/0x430 [ 1084.907872] ? down_write+0x160/0x160 [ 1084.908268] iomap_dio_rw+0x31/0x90 [ 1084.908607] ext4_file_read_iter+0x2c7/0x4c0 [ 1084.909006] generic_file_splice_read+0x455/0x6d0 [ 1084.909486] ? pipe_to_user+0x170/0x170 [ 1084.909857] ? fsnotify_perm.part.0+0x22d/0x620 [ 1084.910337] ? security_file_permission+0xb1/0xe0 [ 1084.910775] ? pipe_to_user+0x170/0x170 [ 1084.911133] do_splice_to+0x10e/0x160 [ 1084.911550] splice_direct_to_actor+0x2fe/0x980 [ 1084.911972] ? pipe_to_sendpage+0x380/0x380 [ 1084.912409] ? do_splice_to+0x160/0x160 [ 1084.912766] ? security_file_permission+0xb1/0xe0 [ 1084.913206] do_splice_direct+0x1c4/0x290 [ 1084.913628] ? splice_direct_to_actor+0x980/0x980 [ 1084.914056] ? avc_policy_seqno+0x9/0x70 [ 1084.914489] ? security_file_permission+0xb1/0xe0 [ 1084.914928] do_sendfile+0x553/0x11e0 [ 1084.915330] ? do_pwritev+0x270/0x270 [ 1084.915678] ? wait_for_completion_io+0x270/0x270 [ 1084.916111] ? rcu_read_lock_any_held+0x75/0xa0 [ 1084.916595] ? vfs_write+0x354/0xb10 [ 1084.916937] __x64_sys_sendfile64+0x1d1/0x210 [ 1084.917385] ? __ia32_sys_sendfile+0x220/0x220 [ 1084.917793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1084.918325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1084.918790] do_syscall_64+0x33/0x40 [ 1084.919125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1084.919624] RIP: 0033:0x7fb1ac5e0b19 [ 1084.919959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.921664] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1084.922398] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1084.923023] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1084.923697] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.924370] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1084.924999] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:06:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:45 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:06:45 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x40) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fstatfs(r0, &(0x7f0000000100)=""/188) 21:06:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:58 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 35) 21:06:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x220000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x9, 0x20, 0x402}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000080)=ANY=[]) 21:06:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x200000c9, 0x5) 21:06:58 executing program 7: r0 = io_uring_setup(0x5303, &(0x7f0000000180)={0x0, 0x8f4a, 0x20, 0x3, 0x2de}) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001480)={{'\x00', 0x2}, {0x5}, 0x10, 0x0, 0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)="3a65391496c72b15c684d8d9648a8483772250b9bd19ede7d31917764c5240ec9490d90c252a6a59633684e0b2314a9c7c36095260dafbed70a9c33d3def38cf91406b02462ce855df13", 0x4a, 0x0, &(0x7f0000000380)={0x2, 0xe0, {0x0, 0xc, 0x82, "902f6217fa78263966f100ef11c89309899892df884facc7f3d0f2509dd2859bff0b5277d8fe6f636c8defb1298cea91ee676290004b17ce916dc72be5b15791edd83254aff1841d5ec281f85b0fa72841473a5bcd472f792fd9d40b10f53cc5803c6f4f1a719a350f26ed27cf637bb8eb4e0908a9dbac497f8091b4d608a2e36634", 0x51, "2b5920465ced6acfa7467a91a58b4c841b10332da1c57276c0182c45620917d8c25ce8a63bbe9be66ffd8824c0d3ba001b53193f0d553fc1f512ef2352ff4e9b64b9c9c1f7f6eeff8c2d993cf56f445691"}, 0x1000, "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"}, 0x10ec}) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000866000/0x4000)=nil, 0x2000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) shmget(0x2, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000000c0)={0x9, 0x3ff}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=""/143}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0xffff, 0x836, 0x1}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000100)) syz_open_pts(0xffffffffffffffff, 0x181) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000140)={0x1ff, 0x9, 0x52}) 21:06:58 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) r1 = shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(r1) shmdt(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r3 = shmget(0x1, 0x6000, 0x800, &(0x7f0000ffa000/0x6000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000080)=""/156) r4 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) shmat(r4, &(0x7f0000868000/0x1000)=nil, 0x5000) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1097.989559] FAULT_INJECTION: forcing a failure. [ 1097.989559] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.994677] CPU: 0 PID: 7209 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1097.995315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1097.996079] Call Trace: [ 1097.996338] dump_stack+0x107/0x167 [ 1097.996688] should_fail.cold+0x5/0xa [ 1097.997055] ? mempool_alloc+0x148/0x360 [ 1097.997441] ? mempool_free_pages+0x20/0x20 [ 1097.997848] should_failslab+0x5/0x20 [ 1097.998215] kmem_cache_alloc+0x5b/0x310 [ 1097.998618] ? mempool_free_pages+0x20/0x20 [ 1097.999017] mempool_alloc+0x148/0x360 [ 1097.999391] ? mempool_resize+0x7d0/0x7d0 [ 1097.999784] ? lock_downgrade+0x6d0/0x6d0 [ 1098.000168] ? ext4_map_blocks+0x87c/0x1910 [ 1098.000604] bio_alloc_bioset+0x36e/0x600 [ 1098.001002] ? bvec_alloc+0x2f0/0x2f0 [ 1098.001369] ? iov_iter_npages+0x1fd/0xa70 [ 1098.001779] iomap_dio_bio_actor+0x518/0xef0 [ 1098.002215] iomap_dio_actor+0x36f/0x560 [ 1098.002626] iomap_apply+0x289/0x810 [ 1098.002984] ? iomap_dio_rw+0x90/0x90 [ 1098.003352] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1098.003901] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1098.004403] ? mark_held_locks+0x9e/0xe0 [ 1098.004802] ? filemap_check_errors+0xa5/0x150 [ 1098.005246] __iomap_dio_rw+0x6cd/0x1110 [ 1098.005633] ? iomap_dio_rw+0x90/0x90 [ 1098.006019] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1098.006479] ? down_read+0x10f/0x430 [ 1098.006843] ? down_write+0x160/0x160 [ 1098.007218] iomap_dio_rw+0x31/0x90 [ 1098.007571] ext4_file_read_iter+0x2c7/0x4c0 [ 1098.007992] generic_file_splice_read+0x455/0x6d0 [ 1098.008450] ? pipe_to_user+0x170/0x170 [ 1098.008844] ? fsnotify_perm.part.0+0x22d/0x620 [ 1098.009294] ? security_file_permission+0xb1/0xe0 [ 1098.009757] ? pipe_to_user+0x170/0x170 [ 1098.010141] do_splice_to+0x10e/0x160 [ 1098.010555] splice_direct_to_actor+0x2fe/0x980 [ 1098.011008] ? pipe_to_sendpage+0x380/0x380 [ 1098.011428] ? do_splice_to+0x160/0x160 [ 1098.011812] ? security_file_permission+0xb1/0xe0 [ 1098.012283] do_splice_direct+0x1c4/0x290 [ 1098.012683] ? splice_direct_to_actor+0x980/0x980 [ 1098.013141] ? avc_policy_seqno+0x9/0x70 [ 1098.013515] ? security_file_permission+0xb1/0xe0 [ 1098.013975] do_sendfile+0x553/0x11e0 [ 1098.014356] ? do_pwritev+0x270/0x270 [ 1098.014740] ? wait_for_completion_io+0x270/0x270 [ 1098.015204] ? rcu_read_lock_any_held+0x75/0xa0 [ 1098.015651] ? vfs_write+0x354/0xb10 [ 1098.016013] __x64_sys_sendfile64+0x1d1/0x210 [ 1098.016447] ? __ia32_sys_sendfile+0x220/0x220 [ 1098.016894] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1098.017395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1098.017890] do_syscall_64+0x33/0x40 [ 1098.017906] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1098.017916] RIP: 0033:0x7fb1ac5e0b19 21:06:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000100)=""/81, 0x51, 0x9) 21:06:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:06:58 executing program 0: ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) kcmp(r2, 0x0, 0x0, r3, r4) getpgrp(r2) r5 = syz_open_dev$mouse(&(0x7f0000000000), 0x5, 0x1) openat(r5, &(0x7f0000000080)='./file0\x00', 0x0, 0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r7, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {}, {}, {}]}) pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'veth0_to_hsr\x00'}) [ 1098.017930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:06:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:06:58 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1098.017939] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1098.017956] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1098.017964] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1098.017973] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.017982] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 21:06:58 executing program 6: clone3(&(0x7f0000000300)={0x22c1080, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x34}, &(0x7f0000000180)=""/36, 0x24, &(0x7f00000001c0)=""/234, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x9}, 0x58) r1 = fork() r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r2, 0x2285, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) kcmp(r5, 0x0, 0x0, r6, r7) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r6, 0x8010661b, &(0x7f0000000440)) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0x9, 0x1, 0x7f, 0x0, 0x5, 0x20088, 0xf, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x4, 0x5b4, 0x81, 0x8, 0x9d8a, 0x6, 0x5, 0x0, 0x6, 0x0, 0x6d}, r5, 0xa, 0xffffffffffffffff, 0x1) syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_flowlabel\x00') pread64(r0, &(0x7f0000000100)=""/99, 0x5d, 0x0) 21:06:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:06:58 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1098.017992] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:07:11 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:07:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:07:11 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') pread64(r0, &(0x7f0000000080)=""/71, 0x47, 0x4) 21:07:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:11 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/107) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000868000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000080)=""/113) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 36) 21:07:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x8200) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x2, 0x8, 0x3}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x3, 0x9e, [0x2, 0x273, 0x737, 0x3f, 0x10001, 0x8], 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f0000000140)=""/158}, &(0x7f0000000200)=0x78) 21:07:11 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x45e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x10100, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 1111.022074] FAULT_INJECTION: forcing a failure. [ 1111.022074] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.023238] CPU: 0 PID: 7277 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1111.023246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1111.023250] Call Trace: [ 1111.023267] dump_stack+0x107/0x167 [ 1111.023280] should_fail.cold+0x5/0xa [ 1111.023294] ? kmem_cache_alloc+0x2a6/0x310 [ 1111.023307] ? create_object.isra.0+0x3a/0xa20 [ 1111.023320] should_failslab+0x5/0x20 [ 1111.023331] kmem_cache_alloc+0x5b/0x310 [ 1111.023342] ? mempool_alloc+0x155/0x360 [ 1111.023356] create_object.isra.0+0x3a/0xa20 [ 1111.023368] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1111.023382] kmem_cache_alloc+0x159/0x310 [ 1111.023400] bvec_alloc+0x148/0x2f0 [ 1111.023413] bio_alloc_bioset+0x40a/0x600 [ 1111.023425] ? bvec_alloc+0x2f0/0x2f0 [ 1111.023440] ? iov_iter_npages+0x1fd/0xa70 [ 1111.023457] iomap_dio_bio_actor+0x518/0xef0 [ 1111.023480] iomap_dio_actor+0x36f/0x560 [ 1111.023497] iomap_apply+0x289/0x810 [ 1111.023509] ? iomap_dio_rw+0x90/0x90 [ 1111.023522] ? trace_event_raw_event_iomap_apply+0x430/0x430 21:07:11 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) recvmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000140), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/81, 0x51}, {&(0x7f0000000240)=""/84, 0x54}, {&(0x7f0000000000)=""/49, 0x31}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/112, 0x70}], 0x5}, 0x2000) 21:07:11 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:07:11 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:11 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x81) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 37) [ 1111.023539] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1111.023552] ? mark_held_locks+0x9e/0xe0 [ 1111.023572] ? filemap_check_errors+0xa5/0x150 [ 1111.023588] __iomap_dio_rw+0x6cd/0x1110 [ 1111.023598] ? iomap_dio_rw+0x90/0x90 [ 1111.023621] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1111.023642] ? down_read+0x10f/0x430 [ 1111.023654] ? down_write+0x160/0x160 [ 1111.023669] iomap_dio_rw+0x31/0x90 [ 1111.023683] ext4_file_read_iter+0x2c7/0x4c0 [ 1111.023698] generic_file_splice_read+0x455/0x6d0 [ 1111.023710] ? pipe_to_user+0x170/0x170 [ 1111.023728] ? fsnotify_perm.part.0+0x22d/0x620 [ 1111.023744] ? security_file_permission+0xb1/0xe0 [ 1111.023757] ? pipe_to_user+0x170/0x170 [ 1111.023769] do_splice_to+0x10e/0x160 [ 1111.023782] splice_direct_to_actor+0x2fe/0x980 [ 1111.023797] ? pipe_to_sendpage+0x380/0x380 [ 1111.023811] ? do_splice_to+0x160/0x160 [ 1111.023823] ? security_file_permission+0xb1/0xe0 [ 1111.023840] do_splice_direct+0x1c4/0x290 [ 1111.023851] ? splice_direct_to_actor+0x980/0x980 [ 1111.023861] ? avc_policy_seqno+0x9/0x70 [ 1111.023878] ? security_file_permission+0xb1/0xe0 [ 1111.023896] do_sendfile+0x553/0x11e0 [ 1111.023915] ? do_pwritev+0x270/0x270 [ 1111.023929] ? wait_for_completion_io+0x270/0x270 [ 1111.023943] ? rcu_read_lock_any_held+0x75/0xa0 [ 1111.023954] ? vfs_write+0x354/0xb10 [ 1111.023969] __x64_sys_sendfile64+0x1d1/0x210 [ 1111.023982] ? __ia32_sys_sendfile+0x220/0x220 [ 1111.023996] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1111.024008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1111.024021] do_syscall_64+0x33/0x40 [ 1111.024032] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1111.024040] RIP: 0033:0x7fb1ac5e0b19 [ 1111.024052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1111.024058] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1111.024072] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1111.024078] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1111.024085] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1111.024091] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1111.024098] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1111.164286] FAULT_INJECTION: forcing a failure. [ 1111.164286] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.164306] CPU: 1 PID: 7293 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1111.164319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1111.164324] Call Trace: [ 1111.164351] dump_stack+0x107/0x167 [ 1111.164372] should_fail.cold+0x5/0xa [ 1111.164400] ? bvec_alloc+0x148/0x2f0 [ 1111.164426] should_failslab+0x5/0x20 [ 1111.164446] kmem_cache_alloc+0x5b/0x310 [ 1111.164477] bvec_alloc+0x148/0x2f0 [ 1111.164505] bio_alloc_bioset+0x40a/0x600 [ 1111.164528] ? bvec_alloc+0x2f0/0x2f0 [ 1111.164552] ? iov_iter_npages+0x1fd/0xa70 [ 1111.164580] iomap_dio_bio_actor+0x518/0xef0 [ 1111.164617] iomap_dio_actor+0x36f/0x560 [ 1111.164647] iomap_apply+0x289/0x810 [ 1111.164664] ? iomap_dio_rw+0x90/0x90 [ 1111.164691] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1111.164721] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1111.164749] ? mark_held_locks+0x9e/0xe0 [ 1111.164782] ? filemap_check_errors+0xa5/0x150 [ 1111.164807] __iomap_dio_rw+0x6cd/0x1110 [ 1111.164837] ? iomap_dio_rw+0x90/0x90 [ 1111.164878] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1111.164915] ? down_read+0x10f/0x430 [ 1111.164944] ? down_write+0x160/0x160 [ 1111.164973] iomap_dio_rw+0x31/0x90 [ 1111.164995] ext4_file_read_iter+0x2c7/0x4c0 [ 1111.165024] generic_file_splice_read+0x455/0x6d0 [ 1111.165043] ? pipe_to_user+0x170/0x170 [ 1111.165076] ? fsnotify_perm.part.0+0x22d/0x620 [ 1111.165095] ? security_file_permission+0xb1/0xe0 [ 1111.165117] ? pipe_to_user+0x170/0x170 [ 1111.165142] do_splice_to+0x10e/0x160 [ 1111.165174] splice_direct_to_actor+0x2fe/0x980 [ 1111.165207] ? pipe_to_sendpage+0x380/0x380 [ 1111.165228] ? do_splice_to+0x160/0x160 [ 1111.165254] ? security_file_permission+0xb1/0xe0 [ 1111.165284] do_splice_direct+0x1c4/0x290 [ 1111.165312] ? splice_direct_to_actor+0x980/0x980 [ 1111.165328] ? avc_policy_seqno+0x9/0x70 [ 1111.165356] ? security_file_permission+0xb1/0xe0 [ 1111.165388] do_sendfile+0x553/0x11e0 [ 1111.165416] ? do_pwritev+0x270/0x270 [ 1111.165434] ? wait_for_completion_io+0x270/0x270 [ 1111.165463] ? rcu_read_lock_any_held+0x75/0xa0 [ 1111.165483] ? vfs_write+0x354/0xb10 [ 1111.165512] __x64_sys_sendfile64+0x1d1/0x210 [ 1111.165543] ? __ia32_sys_sendfile+0x220/0x220 [ 1111.165577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1111.165597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1111.165615] do_syscall_64+0x33/0x40 [ 1111.165631] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1111.165640] RIP: 0033:0x7fb1ac5e0b19 [ 1111.165661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1111.165674] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1111.165695] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1111.165704] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1111.165715] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1111.165725] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1111.165736] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:07:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:07:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x40001, 0x1, 0x1}, 0x18) r2 = fcntl$dupfd(r0, 0x406, r1) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000100), 0x3}, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x400}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000004000000ff030000000000000800000000000000000000000000000001e4ffffff000000000000000000000000000000000000000000000000000000400000000000000001000080000000000300000000000000ff0f00000000000003000000000000000000000000000000000000000000000000374abe45d46fd43a000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000004000"/256]) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6, 0x8, 0xb2, 0x4, 0x0, 0x4, 0x80002, 0xb, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0x2020, 0x5, 0x318b00ec, 0x3, 0x8, 0x6, 0x1, 0x0, 0x20, 0x0, 0x7}, 0x0, 0xf, r3, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000200)={0x0, 0x2, r5, 0xfffffffa}) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:24 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080), 0xd}, 0x0, 0x66a, 0xffffffff, 0x7, 0xa, 0x0, 0x4, 0x0, 0x4, 0x0, 0x84b2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000180)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') 21:07:24 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x400, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000001900)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) kcmp(r4, 0x0, 0x0, r5, r6) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfe, 0x20, 0x96, 0x93, 0x0, 0xd18, 0x21008, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3592, 0x4, @perf_config_ext={0x81, 0x200000000000000}, 0x80c0, 0x8, 0x0, 0x1, 0x1000, 0x5, 0x40, 0x0, 0x5, 0x0, 0x2}, r4, 0xf, r0, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000200)={0x9, 0x204, 0x402}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)=ANY=[@ANYBLOB="010016040000000000000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000000000005801127a6c653100"]) kcmp(r8, 0x0, 0x0, r9, r10) process_vm_writev(r8, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/28, 0x1c}, {&(0x7f0000001a40)=""/153, 0x99}], 0x2, &(0x7f0000001840)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000001440)=""/228, 0xe4}, {&(0x7f0000000340)=""/70, 0x46}, {&(0x7f0000001540)=""/206, 0xce}, {&(0x7f0000001640)=""/68, 0x44}, {&(0x7f0000001e00)=""/4083, 0xff3}, {&(0x7f00000016c0)=""/89, 0x59}, {&(0x7f0000001b00)=""/205, 0xcd}], 0x9, 0x0) pread64(r7, &(0x7f0000000240)=""/75, 0x4b, 0x200000048) 21:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:07:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 38) 21:07:24 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = io_uring_setup(0x75ee, &(0x7f0000000100)={0x0, 0xc69f, 0x0, 0x3, 0xd5, 0x0, r0}) pread64(r1, &(0x7f0000000180)=""/94, 0x5e, 0x200000048) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1123.795275] FAULT_INJECTION: forcing a failure. [ 1123.795275] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.796330] CPU: 1 PID: 7311 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1123.796950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1123.797643] Call Trace: [ 1123.797948] dump_stack+0x107/0x167 [ 1123.798259] should_fail.cold+0x5/0xa [ 1123.798584] ? kmem_cache_alloc+0x2a6/0x310 [ 1123.799010] ? create_object.isra.0+0x3a/0xa20 [ 1123.799400] should_failslab+0x5/0x20 [ 1123.799720] kmem_cache_alloc+0x5b/0x310 [ 1123.800109] ? mempool_alloc+0x155/0x360 [ 1123.800456] create_object.isra.0+0x3a/0xa20 [ 1123.800826] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1123.801298] kmem_cache_alloc+0x159/0x310 [ 1123.801655] bvec_alloc+0x148/0x2f0 [ 1123.802040] bio_alloc_bioset+0x40a/0x600 [ 1123.802397] ? bvec_alloc+0x2f0/0x2f0 [ 1123.806189] ? iov_iter_npages+0x1fd/0xa70 [ 1123.806553] iomap_dio_bio_actor+0x518/0xef0 [ 1123.807026] iomap_dio_actor+0x36f/0x560 [ 1123.807376] iomap_apply+0x289/0x810 [ 1123.807695] ? iomap_dio_rw+0x90/0x90 [ 1123.808084] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1123.808575] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1123.809072] ? mark_held_locks+0x9e/0xe0 [ 1123.809426] ? filemap_check_errors+0xa5/0x150 [ 1123.809813] __iomap_dio_rw+0x6cd/0x1110 [ 1123.810233] ? iomap_dio_rw+0x90/0x90 [ 1123.810570] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1123.811030] ? down_read+0x10f/0x430 [ 1123.811346] ? down_write+0x160/0x160 [ 1123.811672] iomap_dio_rw+0x31/0x90 [ 1123.812029] ext4_file_read_iter+0x2c7/0x4c0 [ 1123.812403] generic_file_splice_read+0x455/0x6d0 [ 1123.812808] ? pipe_to_user+0x170/0x170 [ 1123.813205] ? fsnotify_perm.part.0+0x22d/0x620 [ 1123.813602] ? security_file_permission+0xb1/0xe0 [ 1123.814053] ? pipe_to_user+0x170/0x170 [ 1123.814390] do_splice_to+0x10e/0x160 [ 1123.814713] splice_direct_to_actor+0x2fe/0x980 [ 1123.815202] ? pipe_to_sendpage+0x380/0x380 [ 1123.815569] ? do_splice_to+0x160/0x160 [ 1123.815953] ? security_file_permission+0xb1/0xe0 [ 1123.816365] do_splice_direct+0x1c4/0x290 [ 1123.816715] ? splice_direct_to_actor+0x980/0x980 [ 1123.817160] ? avc_policy_seqno+0x9/0x70 [ 1123.817509] ? security_file_permission+0xb1/0xe0 [ 1123.817969] do_sendfile+0x553/0x11e0 [ 1123.818301] ? do_pwritev+0x270/0x270 [ 1123.818624] ? wait_for_completion_io+0x270/0x270 [ 1123.819126] ? rcu_read_lock_any_held+0x75/0xa0 [ 1123.819516] ? vfs_write+0x354/0xb10 [ 1123.819872] __x64_sys_sendfile64+0x1d1/0x210 [ 1123.820262] ? __ia32_sys_sendfile+0x220/0x220 [ 1123.820648] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1123.821158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1123.821592] do_syscall_64+0x33/0x40 [ 1123.821951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1123.822380] RIP: 0033:0x7fb1ac5e0b19 [ 1123.822695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1123.824364] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1123.825046] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1123.825639] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1123.826275] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1123.826943] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1123.827538] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:07:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:24 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0xffffffffffffff80, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000080)=""/232) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:07:24 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/164) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pwrite64(r0, &(0x7f00000002c0)="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", 0x1000, 0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x4, 0xc, 0x1ff, 0xb8d, 0x101}) 21:07:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:07:24 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r8, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000440)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd_index=0x7, 0x9, 0x0, 0x1f, 0x0, 0x0, {0x0, r9}}, 0x8) syz_io_uring_setup(0x52ab, &(0x7f0000000340)={0x0, 0x2e3, 0x2, 0x2, 0x15f, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r3, r10, &(0x7f0000000400)=@IORING_OP_ASYNC_CANCEL={0xe, 0x6, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x3ff) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000200)={0x0, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0x108) flistxattr(r1, &(0x7f0000000100)=""/251, 0xfb) 21:07:24 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = shmget(0x0, 0x13000, 0x1000, &(0x7f000085e000/0x13000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f00000002c0)=""/83) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000140)={0x7b, 0x1, 0xfffffff7, 0x10001, 0x49, "a011c6fd8af536029e7fcafcdb3ad551d40bf5", 0x0, 0xe5}) ioctl$FIOCLEX(r3, 0x5451) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:07:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:24 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x3, 0x60000, 0x96a9d0b, 0x7}, 0x14) 21:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:07:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 39) 21:07:24 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x4, 0x5, 0x3}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x1, 0x8001}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1124.099937] FAULT_INJECTION: forcing a failure. [ 1124.099937] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.100994] CPU: 1 PID: 7358 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1124.101576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.102275] Call Trace: [ 1124.102510] dump_stack+0x107/0x167 [ 1124.102839] should_fail.cold+0x5/0xa [ 1124.103176] __alloc_pages_nodemask+0x182/0x600 [ 1124.103578] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1124.104087] ? do_syscall_64+0x33/0x40 [ 1124.104437] ? __unwind_start+0x523/0x7e0 [ 1124.104878] alloc_pages_current+0x187/0x280 [ 1124.105256] ? lock_acquire+0x197/0x470 [ 1124.105596] push_pipe+0x2b5/0x6d0 [ 1124.105908] iov_iter_get_pages+0x6b4/0xf40 [ 1124.106303] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1124.106730] bio_iov_iter_get_pages+0x22a/0x1200 [ 1124.107144] ? bvec_alloc+0x17e/0x2f0 [ 1124.107471] ? bio_alloc_bioset+0x2a1/0x600 [ 1124.107842] ? bio_add_pc_page+0x100/0x100 [ 1124.108201] ? bvec_alloc+0x210/0x2f0 [ 1124.108526] ? iov_iter_npages+0x1fd/0xa70 [ 1124.108891] iomap_dio_bio_actor+0x77a/0xef0 [ 1124.109276] iomap_dio_actor+0x36f/0x560 [ 1124.109627] iomap_apply+0x289/0x810 [ 1124.109945] ? iomap_dio_rw+0x90/0x90 [ 1124.110271] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1124.110768] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1124.111222] ? mark_held_locks+0x9e/0xe0 [ 1124.111578] ? filemap_check_errors+0xa5/0x150 [ 1124.111968] __iomap_dio_rw+0x6cd/0x1110 [ 1124.112311] ? iomap_dio_rw+0x90/0x90 [ 1124.112648] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1124.113043] ? down_read+0x10f/0x430 [ 1124.113361] ? down_write+0x160/0x160 [ 1124.113689] iomap_dio_rw+0x31/0x90 [ 1124.114002] ext4_file_read_iter+0x2c7/0x4c0 [ 1124.114379] generic_file_splice_read+0x455/0x6d0 [ 1124.114791] ? pipe_to_user+0x170/0x170 [ 1124.115150] ? fsnotify_perm.part.0+0x22d/0x620 [ 1124.115553] ? security_file_permission+0xb1/0xe0 [ 1124.115964] ? pipe_to_user+0x170/0x170 [ 1124.116305] do_splice_to+0x10e/0x160 [ 1124.116632] splice_direct_to_actor+0x2fe/0x980 [ 1124.117031] ? pipe_to_sendpage+0x380/0x380 [ 1124.117401] ? do_splice_to+0x160/0x160 [ 1124.117746] ? security_file_permission+0xb1/0xe0 [ 1124.118162] do_splice_direct+0x1c4/0x290 [ 1124.118515] ? splice_direct_to_actor+0x980/0x980 [ 1124.118937] ? avc_policy_seqno+0x9/0x70 [ 1124.119289] ? security_file_permission+0xb1/0xe0 [ 1124.119708] do_sendfile+0x553/0x11e0 [ 1124.120042] ? do_pwritev+0x270/0x270 [ 1124.120369] ? wait_for_completion_io+0x270/0x270 [ 1124.120779] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.121172] ? vfs_write+0x354/0xb10 [ 1124.121496] __x64_sys_sendfile64+0x1d1/0x210 [ 1124.121879] ? __ia32_sys_sendfile+0x220/0x220 [ 1124.122273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.122734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.123181] do_syscall_64+0x33/0x40 [ 1124.123499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.123931] RIP: 0033:0x7fb1ac5e0b19 [ 1124.124250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.125814] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 21:07:24 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x2) 21:07:24 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000869000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000000)=0x8, 0xa6, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1124.126527] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 21:07:24 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1124.126535] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 21:07:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1124.126542] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 21:07:24 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/132) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400005e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1124.126549] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 21:07:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 40) 21:07:24 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000180)={0x90, 0x7ff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x2, [0x0, 0x0]}) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000100), &(0x7f0000000140)=0x28) 21:07:25 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1124.126556] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1124.277895] FAULT_INJECTION: forcing a failure. [ 1124.277895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.279205] CPU: 1 PID: 7375 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1124.279780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.280476] Call Trace: [ 1124.280709] dump_stack+0x107/0x167 [ 1124.281022] should_fail.cold+0x5/0xa [ 1124.281356] __alloc_pages_nodemask+0x182/0x600 [ 1124.281753] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1124.282260] ? do_syscall_64+0x33/0x40 [ 1124.282602] ? __unwind_start+0x523/0x7e0 [ 1124.283235] alloc_pages_current+0x187/0x280 [ 1124.283814] ? lock_acquire+0x197/0x470 [ 1124.284228] push_pipe+0x2b5/0x6d0 [ 1124.284605] iov_iter_get_pages+0x6b4/0xf40 [ 1124.285053] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1124.285573] bio_iov_iter_get_pages+0x22a/0x1200 [ 1124.286071] ? bvec_alloc+0x17e/0x2f0 [ 1124.286456] ? bio_alloc_bioset+0x2a1/0x600 [ 1124.286896] ? bio_add_pc_page+0x100/0x100 [ 1124.287253] ? bvec_alloc+0x210/0x2f0 [ 1124.287577] ? iov_iter_npages+0x1fd/0xa70 [ 1124.287945] iomap_dio_bio_actor+0x77a/0xef0 [ 1124.288328] iomap_dio_actor+0x36f/0x560 [ 1124.288678] iomap_apply+0x289/0x810 [ 1124.288995] ? iomap_dio_rw+0x90/0x90 [ 1124.289319] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1124.289809] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1124.290256] ? mark_held_locks+0x9e/0xe0 [ 1124.290611] ? filemap_check_errors+0xa5/0x150 [ 1124.291160] __iomap_dio_rw+0x6cd/0x1110 [ 1124.291597] ? iomap_dio_rw+0x90/0x90 [ 1124.292011] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1124.292482] ? down_read+0x10f/0x430 [ 1124.292866] ? down_write+0x160/0x160 [ 1124.293269] iomap_dio_rw+0x31/0x90 [ 1124.293651] ext4_file_read_iter+0x2c7/0x4c0 [ 1124.294104] generic_file_splice_read+0x455/0x6d0 [ 1124.294593] ? pipe_to_user+0x170/0x170 [ 1124.294987] ? fsnotify_perm.part.0+0x22d/0x620 [ 1124.295387] ? security_file_permission+0xb1/0xe0 [ 1124.295795] ? pipe_to_user+0x170/0x170 [ 1124.296132] do_splice_to+0x10e/0x160 [ 1124.296459] splice_direct_to_actor+0x2fe/0x980 [ 1124.296856] ? pipe_to_sendpage+0x380/0x380 [ 1124.297225] ? do_splice_to+0x160/0x160 [ 1124.297566] ? security_file_permission+0xb1/0xe0 [ 1124.297982] do_splice_direct+0x1c4/0x290 [ 1124.298336] ? splice_direct_to_actor+0x980/0x980 [ 1124.298743] ? avc_policy_seqno+0x9/0x70 [ 1124.299600] ? security_file_permission+0xb1/0xe0 [ 1124.300111] do_sendfile+0x553/0x11e0 [ 1124.301006] ? do_pwritev+0x270/0x270 [ 1124.301627] ? wait_for_completion_io+0x270/0x270 [ 1124.302469] ? rcu_read_lock_any_held+0x75/0xa0 [ 1124.303331] ? vfs_write+0x354/0xb10 [ 1124.304011] __x64_sys_sendfile64+0x1d1/0x210 [ 1124.304814] ? __ia32_sys_sendfile+0x220/0x220 [ 1124.305636] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.306570] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.307099] do_syscall_64+0x33/0x40 [ 1124.307418] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.307851] RIP: 0033:0x7fb1ac5e0b19 [ 1124.308169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1124.309703] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1124.310348] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1124.310977] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1124.312278] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1124.313568] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1124.314580] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:07:38 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 41) 21:07:38 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000001880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x1490, 0x33, 0x8, 0x70bd2a, 0x25dfdbfe, {0xe}, [@generic="e07697cc08d3ec4cd9255d7511dbfd6e340e2ff9868a1ba125e49e25cc4546f18bb383b721cca3fe70ded2363879842853252eca46ab1b501364ab39904341f06dab0d29c2ba87553ab767a6fc69c8cb86de786227ba08bd3f25911cb53994e5cf632d297877aed70a8fcccf2be556469708dc9f45f862229470456fcd8be58d68944acf6c719285704e2671cf6e8d1517ed8e43d3c91d6b0b391b1d63c0f29106c48d1d0c9b395b914bec91cd785377bed38337992d02982558caddebf3b6e0134dbdeacd386f47e348c6cde2", @typed={0xd6, 0x6d, 0x0, 0x0, @binary="de483ac5ad2997056358a0f81e55bc1271e5460197935ab694c9fc29f8fadf359a397495e59b8a2e24ce7e71b23f8e999250857620857c5c116253d2f49c2c00c5d163dabeb069edec0a6537817e79db6ee13363e938cb47aa0b778e5f5eaf2d30f8b137b5eabc5968a918dde06ed911a6fcf0dff770a78016552706c7907869858e2360e22eaba81166d723a6c808a8bfc7688c411ebcb57cb7f788202ea5924df2117a721cddb0962b312659235c32d1c1e311a84044a37137e2bfcc2b1404d2dd98533d4399a665795c60891db151c67d"}, @nested={0x26e, 0x1e, 0x0, 0x1, [@generic="b554b73844b1dec36b80dc53b5fd029bb5d49cd214978da9f6dd01b592fe67dfa9db71b2830ab69dcfa2ab1c6260a6ea3ecd21025d913604f1e80c90e49b189c9215783f0d10b3ef54e608fb78e1cc9eeb0f1cab6bddec0804c56629c254bf618d9c8845b4b45e78637c9f888ae984da039244ce259ce3dc8bde848ac767b150712c3430b0b39bcbe4a2a853e2e6acf4a0b7b38e433df4761dcc982033f252561abec06e087489e94274dfedeeee7a618b9195f05ea42e9b8179498a662d75050e5917f5a2", @generic="5bf6f8fe01dccbc6773ace984ba7f64147823abdce95c21402d37f534e6d662cbf37f98393bb013ba564d91bbcfbce20811a9fafafce0700127975b39d00d2465e7a1274e4a1fdf51c", @typed={0x8, 0x1, 0x0, 0x0, @uid=r2}, @typed={0xc, 0x34, 0x0, 0x0, @u64=0xdbf}, @generic="587c756890f009d44cc345a9e1f2ec0b60c655cdc055cc226a6856aa24774ca9afef90379e484ae9905dd2b904484509af5a6932bfa0b0bbdbd389f583d4aa33409c384cf75109bf8fe7457d97f4dd9c87887d1f208986523dbd670b73e8d00c26bac643d7cd3b443ccb19d6ddbb36110bedb3bfde3c4a42ffde", @generic="d303f7c365d40fa868f892e23c4c7f4dd7ba55a82c31d47cfe2c248af1b3500f1f27f114ce7491b3f4f94426d464c38e3286c872ed1949259c889385c4ce62a64327e2a8576f966f8c539832681ab7c9ce7ea8b70731940f708e18c96faa0f29fd7eb1708069e6ae9f288381d48f1ce6be08a76355aee16629aa038c06a6403ae045595f37fefe570d2d40aa405e2a40d923644c", @generic="1de5a74218fea2081561cf40c05ec8f08294f19e3702f6ffa10279013bad576fe179bafc6d9a146f88a7f4626c0f0153708cc1b3186d098de66c"]}, @generic="df0dca49cd9f9b35d17efcd81569551b0a2fa632bd1ba9700f384ef9ce7a7928d1745580f8f02a923a595bbf9bf5728dc2718018689bc1273a72578dbe2a172481d49d294296d81764f0800d378ed8267534b2bb67c7e52a6edbb747250620cbac71b4684c9b5e4e05021174b660687ad5b63178f129f26ae41f8cb248d6cc74a4c9a3493aa63e6312bfc67da993d2f80b493e27637066ec56ac383c7f05427ee8811e7cd1ef3abbdb1eb78b3b1e56e987ca02c5c088d4c6c2547ff4082d3ffe10d182e0ddaa12a588bbec9748ee28825618d16756fdf6792da3751cd8e6295670c5d022bc1b06f53b1c50c9dd3e7a2ddca06d193d3477942bc355d99aedd368304061a742930bdbcb32e639b68d4345c4e8e1160c12497c27be895d9f6a371571d652109b14c6cee75ce2fde95fb218711b5ee5decaa92eda7f630a190427312e732d5cecf19045fce4a69729f6770e768a942d1187136f0b428d0896b5aef9affb87f078cfd259133ee7de01ec49f898e7b5f03366713b0a3c141d626a2047b620f930563cd9873de7174f181de575dd9d5c868686268c3bcd156fa9db684ff7386ec81917c1750c7e9d4c0bf497f673e2c5455036b2c9ed62e62a7954687b850f5d88898eea7a0aea36274c77c4af8b6469b449f762dc730763a39f7a8237f2e5309ad7010c1f76ac55e59c42ccd7f6994852f64b38ecb343c4b31e8b1fe05686a4f91fe475b274701db41198eb2b755d800be7a1bd4cb5ee96336443c7602a6c2bfa14ae1a5edef6fe4abb675ab9aa63758a13911467d0605e1daa40ce93912b18cb80f33932d6cfe1cf1a1b5898beef2645caf67f76b1dd1fbe73decb561c40d362ccacbce5ee081aa271ecd0b829552e450b223fe2916138b6597b141a6dee68aee05df8ab9566fbaf12d5f8e3b8373861cb186313f99475d57a2f42664a7bc69e1d5e9e8a7cbcdb4dfe8201dd84aaf3d690ff413051c4c5c3522cbf4368274b12e0af84b8ccffd69d8be2cf3e32b7884fb17cf8cf9a979c7efe18eb69782eada45b885b759c3a850d3671728e81310c940b3dee63ccafe9d4ebdfc1b55915161a413106140a6bcfffd27575a6ab594c6482f4ab3806f36425e25097fcfcf73e5eb6fa474607a186df218dc51d79fbd382f70b2848015313d730e5becb7e7b8531a519864f8420293c5b246dab34ff445500f88765f62ba97bbded8389d81f9769d9d5d24ba99817d54bb623903ffd57e0741528e4a37765ba0ca801428f7c66c959d1f0273f745e21150b938536ccd346788a8cd32bf87015b43a072656e59325525c5e5ff89f2c9fccf13eb8f0dfa8d72630ceaacc09c47202ac7cb1d90b9a6ca66358546f39a2c7af9c24582b1d187e7952ea8ef4e01c3907ab29855e2ce7df8b8a0336b6b1e7b59be38ec906d4b5332b81149743b1a92fe99ec16ac6effa26abcdb3fae16afbf4c982d534971f5b6750f3faf477f19549543bf0fbb508e1d6f36c6eb5223d1bb09ca6ff226065ac875619d6ba4d6b452659a4c4b803aa96aa83042a9ef55639af1afdbdb465c7cd7b7dde06399348d448c87b05c332d8f9643976aafbd513dfba14a818f8e6592b7f0b9621883a3fcb7c1912174efd6af86c8f8f7307daa2c221216762aca50506795a6d39c0879d910961e49e25b04e98533ab2bc62a30dc78b300dd2c5167c2b5e1cd2d2103d185d9f7d98475af9c4417484e316bcb2e7ac355ed264a6060751a68ee646eab6a7f0fb43c4b7924693ccf9dc72fe7ff4f0902f0e008fe2bd978db3f7ef9efdca2b8761e4dd49d844cd73d292c90c91531ffea7b2eb7c4514bac68a25ecfd04bea72d4e2088c63d5ce2323c16d4acc6f34e8f212b237923b33e579353ec3c094dbfbc19c9880f78510e09070fb18e72f4d2787c97cc3346e90f3ea1e87267f74ede2b258edbb216ca7be10eac84f211a46348a6bd3d22b01d7e3d7b58e5aeb1ef3a38c20aaba514f025b7e27952dc292ac01fed09df309149d0ecef77b7d8755aed79f306e033e1272a37ac93e0bdbde0b1d9ed2ecf8fd325f5a4984cc117b28e4c898578b396abe5ade60533ee1d7ba855eea956a128865851a4b58aadc7ba3418a1b8de6015f4226dd1aa787f0d855e15c80606d74aee5e1ada448369452a78650544691526e5c851bce00f564e979cf6ca545222963ab7eca59a036073d89b179100532e9c5651af276cee7d416c3d616eddeb45e0f15b7561ab8f0063a1a6108796cd54a9d74f9a1de31d5722f2bb347457fd5751164d064234892448d1239d02621b5936fa35e436e96e9b6c486149d3f4a76410493625e23102a77869023aac9ce1ae39d8b9fe5531e8c79ad0ee0bebd5680acd067a9cad0dfb4f0c2a946fe67991ce97333be07b70f4a256cdcc949d94f0c39498a8f5a6b48a9a1a5105b5f9a2683392c2ab1e5ade0ef6bcedc56d069d2d91ac7d04112cf19b557657bb74d107bb6ef025f150bd3345feb4a25cf639c320400dbaf929e72b18b13f9523ef1e2aeaa5fdfa3cf66e14f73fcbe93740f036523cdb3c62f3afd9b2e2668caffa9648ec9a7d90fef861297d191c26c0474df0d3b8d5a35ea255b6523567f7132d5cb2a1a2d72784276e3d1d8d805791363f95975c37676edd4e15d2bc54ec1e42965935473095e3c0d8d4fe95b69bf02145b44d979e4ab4fb6f5bd66b9f2bf08e98f37d6ea16d2c6861f805ae6d6cb7915cd8c05bd1ec161191a81d24d0e890aa25b45d78821f1484a4bdbf89c201fd0ceb7e45c41481437a8163e25b99a4acf7b92c6fa2da5f13890352387dabbfb44e5cb6df8ae4af41e999b2c3bda7ac27fd301149d3a59da2bcf4a644787ea018da61dae6ebff39f6de4035ea1d730f90d6e940a3532234e531d57a0cd66e2046fddc4cf97a7922f0e18fbad50ef25935c0c569eae8e7c1ea48f8e2c7d05d0fe19da3ece91521d5e1a3aeebd645d3503e62ff2b51e8adf8102f4dce355fbac50cdc33638aeb9135415e6cf2a663b8f8bd977ba8aabd41ffb82bbd5d6b2154f1e3e897e97ccc81e782885adc34716d51b3822299e3eaeeeffadc685dd818d8dd8c5f6c83385e60fde28d14f0f9684f147c3f28292d6a32218733f4afff40178b1d0502220caf8ed02557b92de1085be69fff6f06d77cbe4a667964f0fe4fa4faed7fec619080ec1084f6bb05fab1e7aefa61ea3d6419639dae961a827a5e8e96b712d3991c17d920394fcaeff650a21210fe53f2a97e1f3a1a724e34d740ea3fa32e6ada0338ebca298be56015272774d53f9f45808c3c25404abf9db092fbb7c73c5ef3fa9766ecd3173a94383e271983b2a45f5ad93b12269fd6f4ea8ae730477825206c5ea2a721f85b668074f4deb52b061e0987e6cd2baf726332724cef38aecdcde486faa4f267046f3fd1ad03eb79308383f95c80e0e3b1d8f551982e980073f552b88d4c924f92ba924010eb0be9110d261085e52451cb317e79c0e04bbbd4bf8564d1a1fed548c76c542c35ceb35e38693c457291fe2bb7c397a34c08e4b3bc9e76c77345d5d43b5b9e7b9489867269cf32ed1879e6eec0b3671d9f40563aab98360679af3f3f38a64a461e40dcc730119f36eda5de0c8a79b8529f1ffb7d99b7bd0062b59bd5318f71e596375d5ada7cdd97ff542dde1edec0e6dcc231f67fd0643c7d0edafd825b583e23b5f84ea7c6a03408a9c7bd7e0cb6df3ff4e48d8b4b591332f066d4c1115d99780731b8c9738e9388d8f772673cef943bdb9177009982a9d7afba69487224cc81b0fd17b8b6cc47e4eceb4acc409de08ea18f661a99a4cf3e238fcf881dc9a1d790982cc4ddffb09e7bdf1ec71a4d051dc73f4d9bf9b745c6439043729436727e78c7647f7dc76389cdbb32b3e8c045101e659cda04eb24c7faecda602931e957cf2a7d96a68c65c14fad33ad53337b08f3f509abc7302fcfa68dd7e829037c99de687f6715cb578daca4ef3f78bdd6632343ffd4e0a06f5b445e0cee92d59ef19f8e025515760766db198bd481346cd31623beeb5a69ee1cf50f33d8cfc56fe13ead6f5b983302ea14295c77e1e9eef63588916abe9fc06d5874b6b3cfafc8f03e48d7360a6a942da43f9aab02fc9d3da6720bbc015e59bd13be58888f64636a7b7ad6f88cd6a7ea216e581ada6ddc94be0ef0114f1cb81afc2680820b67b6644146efc0f4d5b7f5ddfa83b91205fae94fb5b8992380a6d296d6459e3b0f2bba48ce5d5622e0857176b6f375e5e126aa2c46944905786b56f1d22b728596c331894ee920d4616c04abacc4d0b1c25f8158421fcf4f34d8f811e168c6ed631f86f205032fbb4d15542072bf5562eae3c755b32805cbe66d5662f56b5b93a5f3a517827b68102512005a7016cf863621a6d5524aa0cbdce94d3baf54e772fdc8f559888d8e1d48816802e4d0e63fed65af37785908929eacb12a546203c227072fd3fdb9a20af48c654c65fe2f6c214fe8ebbce18ef40acc49c97a712a1de793d59a004c889a995dadeaf1dc36487640269c72f9a65cc954b6c51ef1b4721990918c0cb5b6b1832562e2b9a58d39eba7ab48cfd13a1a0807a75bb1bc9417ac7d021a087f2b28b6087fca093e818ed04a074cc0cef7d8ccb7342cdfff6599b163d6a843fe4b164d5d58413c9f6b0f662565c0f06983c4a39f8f937b34e29a5399ef1a8506fdcf00d254d72fa98213f381e7c53fa0fde7011459e464e5548cd4685c8eba32a6cc2e703b1195a8541bd8b5110bb35c805434ed0ded34d040016f8df0d053e9f12d319d39fb6f5da81bee05bceb623455be4d1728f6d9ccfae9bc874418b6df6ed4e92c59551a93dbc1988b2b72d2d199437a50d1c4595390040b12ee76ee11f704fb71a763554ef25f89baa9f859eca7f189b653bd1dc9abfcb8577fd40bcd92d95fb468e02196d29d6110c61a1d77745571f17dd6986d743c02dce5f31f06dca4ae36ace7f65dbe91b5ea237425c4818a81731b3d2291cde6f23ac58123b85bcd80b7d9a385fadad3754621e598544e67cf68597ec2bfabd3c6ca66abb0b05e587b987d8a163547e7943ce8a5d31e297e76d2692a1ccee4913faec9b52395c3dd6c738a10d8d9ca35b27f95a22303381e3884610d3d072eeadf093f60f4d331e1c03998bab104810260f1e532f02338250629af1b63354a0c3b75f7c1ef92f0a2d3a1389ab52f2fe5cd84dcf741bcaa55413f8e4ec1752780b43ea2aded3be2be557baa41da29d9c626b1e841c18fddd3ed49ad57b83cc1ef287e143286e80aef72f1b8388d04099862678ef72d135f318611dfbc422558f9a590e3c4d4c08169e2d73ee2d4c8da968ceac8a2d4adfae671f8ff2658207aa6258a8424c0ad5f1ae82f5e0d1958da432718d6387bca152521367cf894396cf36407d22d9b4f06d18c314a13244ff8977a7213357deaca666023f42f47ab4df4649656f125fe47e086f59c72699e5cb5dc46fa89841b6e9094a1a06a0f3e727c988927d8a16f19867c90c69dada817940f44ca2fc97898d48150cd14ef939fd59c500b6a39eef338f85a00dec4e6483d8d223b3662ec79f1b62c859c8009bb034e2a139729e788d9c57c5124f71591ff36c549560a6d9017ac6368df121b2a485417823b2ab3bc0e7127441cb46058aff5e46a7766dba657079be7920588eec51fa67f45d79ce7495de067f9501de6f185d002b6966d03fbb9b49b973565cde5a87a61b6b3cbb2f658195c54744a7f0361ce83de11689fe8d03bec7cd6c555929aa6ede2050ea475d98a16", @generic="d7ce042b21f0a50fa578c30a07e381988cfb736065333c598f799c0c0aea8c063d02de880a7cb5a689c853a232be0437854eefa2c81e41dfe8ef476e442664e911e8c2ba6ec02defd6e8efd50e885c587cde5f76f07ae027d0146dfedbe449367b331184f6de"]}, 0x1490}, 0x1, 0x0, 0x0, 0x24000000}, 0x20004000) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:07:38 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:38 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) 21:07:38 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pread64(r0, &(0x7f0000000100)=""/78, 0x4e, 0x9) 21:07:38 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r2, 0x2285, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="000080200310ed1ddbc0290000000000"]) kcmp(r5, 0x0, 0x0, r6, r7) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') [ 1137.311750] FAULT_INJECTION: forcing a failure. [ 1137.311750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1137.311766] CPU: 0 PID: 7398 Comm: syz-executor.4 Not tainted 5.10.225 #1 pread64(r8, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r9, &(0x7f0000000240)=""/83, 0x53, 0x200000048) kcmp(0x0, r5, 0x2, r8, r9) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:38 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x5, 0x0, 0x0, 0x400, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000003, 0x2010, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x778e, &(0x7f0000000300)={0x0, 0x0, 0x1, 0x2, 0x100001}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x6c6, &(0x7f0000000100)={0x0, 0x2564, 0x10, 0x3, 0x7}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000002c0), 0x4) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x1, 0x1, 0x1}, 0x3) syz_io_uring_submit(r0, r2, &(0x7f0000000080)=@IORING_OP_WRITEV={0x2, 0x1, 0x2000, @fd_index=0x4, 0x100, &(0x7f0000000000), 0x0, 0xc, 0x1, {0x2, r5}}, 0x5) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$incfs(0xffffffffffffffff, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xf97a4e40a1251747}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="87ce2abd7000ffdbdf250100000008000800ffffffff0800090001000000"], 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4010) sendmsg$GTP_CMD_GETPDP(r6, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000600)=ANY=[@ANYBLOB="00000000df15fe8f71949a70a420bb06d7504504bdc5ce60fdbefa59d51e0571cea3d3190425e2faf6d97223d6225d3b6f16f2fad13f01f6b31eb125c48da3e40fce3ff5c186c88e3ca42c25f87ce34357a6de41eeb4eb63ef35c4d6", @ANYRES16=r7, @ANYBLOB="20007caeff2a7bc945df285717cb68906d83bd7000fbdbdf250200000008000400000000000c000300040000004fdd00000600000003000000080008000100000008000900020008000800020000"], 0x58}, 0x1, 0x0, 0x0, 0x8884}, 0x24000080) pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:38 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1137.311774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1137.311778] Call Trace: [ 1137.311797] dump_stack+0x107/0x167 [ 1137.311810] should_fail.cold+0x5/0xa [ 1137.311827] __alloc_pages_nodemask+0x182/0x600 [ 1137.311842] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1137.311852] ? do_syscall_64+0x33/0x40 [ 1137.311874] ? __unwind_start+0x523/0x7e0 [ 1137.311890] alloc_pages_current+0x187/0x280 [ 1137.311903] ? lock_acquire+0x197/0x470 [ 1137.311917] push_pipe+0x2b5/0x6d0 [ 1137.311935] iov_iter_get_pages+0x6b4/0xf40 21:07:38 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1137.311950] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1137.311972] bio_iov_iter_get_pages+0x22a/0x1200 [ 1137.311988] ? bvec_alloc+0x17e/0x2f0 [ 1137.312001] ? bio_alloc_bioset+0x2a1/0x600 [ 1137.312012] ? bio_add_pc_page+0x100/0x100 [ 1137.312023] ? bvec_alloc+0x210/0x2f0 [ 1137.312036] ? iov_iter_npages+0x1fd/0xa70 [ 1137.312054] iomap_dio_bio_actor+0x77a/0xef0 [ 1137.312076] iomap_dio_actor+0x36f/0x560 [ 1137.312092] iomap_apply+0x289/0x810 [ 1137.312104] ? iomap_dio_rw+0x90/0x90 [ 1137.312118] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1137.312136] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1137.312151] ? mark_held_locks+0x9e/0xe0 [ 1137.312170] ? filemap_check_errors+0xa5/0x150 [ 1137.312185] __iomap_dio_rw+0x6cd/0x1110 [ 1137.312195] ? iomap_dio_rw+0x90/0x90 [ 1137.312279] ? iomap_dio_bio_actor+0xef0/0xef0 21:07:38 executing program 6: pwrite64(0xffffffffffffffff, &(0x7f0000000100)="d43e78c8b6b17b57285ad0d621e247e74692328c833d98b8d984fadc4dafb0acfb06ad8c222e365421ea82ad2f32f5ec13bc3c9ca7f2e1994c5abd569b72359557f5290e95d20ece0f9b888922eaf0b37d", 0x51, 0x7fffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1}}, '.\x00'}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000180)={0x0, 0xfff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000112, r2, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:07:38 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1137.312299] ? down_read+0x10f/0x430 [ 1137.312311] ? down_write+0x160/0x160 [ 1137.312326] iomap_dio_rw+0x31/0x90 [ 1137.312341] ext4_file_read_iter+0x2c7/0x4c0 [ 1137.312356] generic_file_splice_read+0x455/0x6d0 [ 1137.312369] ? pipe_to_user+0x170/0x170 [ 1137.312388] ? fsnotify_perm.part.0+0x22d/0x620 [ 1137.312405] ? security_file_permission+0xb1/0xe0 [ 1137.312418] ? pipe_to_user+0x170/0x170 [ 1137.312430] do_splice_to+0x10e/0x160 [ 1137.312444] splice_direct_to_actor+0x2fe/0x980 [ 1137.312459] ? pipe_to_sendpage+0x380/0x380 [ 1137.312472] ? do_splice_to+0x160/0x160 [ 1137.312485] ? security_file_permission+0xb1/0xe0 [ 1137.312502] do_splice_direct+0x1c4/0x290 [ 1137.312514] ? splice_direct_to_actor+0x980/0x980 [ 1137.312524] ? avc_policy_seqno+0x9/0x70 [ 1137.312541] ? security_file_permission+0xb1/0xe0 [ 1137.312561] do_sendfile+0x553/0x11e0 [ 1137.312580] ? do_pwritev+0x270/0x270 [ 1137.312593] ? wait_for_completion_io+0x270/0x270 [ 1137.312608] ? rcu_read_lock_any_held+0x75/0xa0 [ 1137.312618] ? vfs_write+0x354/0xb10 [ 1137.312634] __x64_sys_sendfile64+0x1d1/0x210 [ 1137.312647] ? __ia32_sys_sendfile+0x220/0x220 [ 1137.312662] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1137.312673] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1137.312686] do_syscall_64+0x33/0x40 [ 1137.312697] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1137.312706] RIP: 0033:0x7fb1ac5e0b19 [ 1137.312718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1137.312724] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1137.312737] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1137.312743] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1137.312750] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.312756] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1137.312763] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1149.971430] FAULT_INJECTION: forcing a failure. [ 1149.971430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1149.971444] CPU: 0 PID: 7445 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1149.971451] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1149.971455] Call Trace: [ 1149.971472] dump_stack+0x107/0x167 [ 1149.971485] should_fail.cold+0x5/0xa [ 1149.971502] __alloc_pages_nodemask+0x182/0x600 [ 1149.971517] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1149.971527] ? do_syscall_64+0x33/0x40 [ 1149.971549] ? __unwind_start+0x523/0x7e0 [ 1149.971564] alloc_pages_current+0x187/0x280 [ 1149.971576] ? lock_acquire+0x197/0x470 [ 1149.971589] push_pipe+0x2b5/0x6d0 [ 1149.971607] iov_iter_get_pages+0x6b4/0xf40 [ 1149.971621] ? csum_and_copy_to_iter+0x14a0/0x14a0 21:07:50 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 42) 21:07:50 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:07:50 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000080)=""/152) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:50 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) 21:07:50 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') fcntl$setpipe(r0, 0x407, 0x8) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:07:50 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000180)=0x1c) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) kcmp(0x0, 0x0, 0x4, r1, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:07:50 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, 0x0, 0x0) close(r4) 21:07:50 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4020}, 0xc0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) [ 1149.971642] bio_iov_iter_get_pages+0x22a/0x1200 21:07:50 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1149.971657] ? bvec_alloc+0x17e/0x2f0 [ 1149.971671] ? bio_alloc_bioset+0x2a1/0x600 [ 1149.971681] ? bio_add_pc_page+0x100/0x100 [ 1149.971692] ? bvec_alloc+0x210/0x2f0 [ 1149.971705] ? iov_iter_npages+0x1fd/0xa70 [ 1149.971722] iomap_dio_bio_actor+0x77a/0xef0 [ 1149.971743] iomap_dio_actor+0x36f/0x560 [ 1149.971759] iomap_apply+0x289/0x810 [ 1149.971770] ? iomap_dio_rw+0x90/0x90 [ 1149.971784] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1149.971802] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1149.971813] ? mark_held_locks+0x9e/0xe0 [ 1149.971832] ? filemap_check_errors+0xa5/0x150 [ 1149.971848] __iomap_dio_rw+0x6cd/0x1110 [ 1149.971859] ? iomap_dio_rw+0x90/0x90 [ 1149.971886] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1149.971908] ? down_read+0x10f/0x430 [ 1149.971922] ? down_write+0x160/0x160 [ 1149.971940] iomap_dio_rw+0x31/0x90 [ 1149.971956] ext4_file_read_iter+0x2c7/0x4c0 [ 1149.971973] generic_file_splice_read+0x455/0x6d0 [ 1149.971987] ? pipe_to_user+0x170/0x170 [ 1149.972008] ? fsnotify_perm.part.0+0x22d/0x620 [ 1149.972027] ? security_file_permission+0xb1/0xe0 [ 1149.972041] ? pipe_to_user+0x170/0x170 [ 1149.972055] do_splice_to+0x10e/0x160 [ 1149.972070] splice_direct_to_actor+0x2fe/0x980 [ 1149.972088] ? pipe_to_sendpage+0x380/0x380 [ 1149.972104] ? do_splice_to+0x160/0x160 [ 1149.972119] ? security_file_permission+0xb1/0xe0 [ 1149.972142] do_splice_direct+0x1c4/0x290 [ 1149.972155] ? splice_direct_to_actor+0x980/0x980 [ 1149.972167] ? avc_policy_seqno+0x9/0x70 [ 1149.972187] ? security_file_permission+0xb1/0xe0 [ 1149.972208] do_sendfile+0x553/0x11e0 [ 1149.972230] ? do_pwritev+0x270/0x270 [ 1149.972246] ? wait_for_completion_io+0x270/0x270 [ 1149.972261] ? rcu_read_lock_any_held+0x75/0xa0 [ 1149.972271] ? vfs_write+0x354/0xb10 [ 1149.972287] __x64_sys_sendfile64+0x1d1/0x210 [ 1149.972299] ? __ia32_sys_sendfile+0x220/0x220 [ 1149.972314] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1149.972325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1149.972338] do_syscall_64+0x33/0x40 [ 1149.972348] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1149.972356] RIP: 0033:0x7fb1ac5e0b19 [ 1149.972368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1149.972374] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1149.972387] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1149.972394] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1149.972400] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.972407] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1149.972414] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:08:03 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1018, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x7, 0xfff, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) io_uring_enter(0xffffffffffffffff, 0x1daa, 0x131b, 0x1, &(0x7f0000000140)={[0x6]}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:03 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 43) 21:08:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:03 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') flock(r1, 0x0) r2 = dup(r1) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) accept$inet(r3, &(0x7f0000000080), &(0x7f0000000100)=0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xff, 0x6, 0xff, 0x8, 0x0, 0x5fd, 0x2060, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa08, 0x1, @perf_bp={&(0x7f00000000c0), 0xf}, 0x180, 0x6, 0x0, 0x0, 0x0, 0x1f, 0x1, 0x0, 0x5, 0x0, 0x7ff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x8) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:03 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) 21:08:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001e00)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x19}, 0x2}, 0x1c) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000900)={{}, 0x0, 0x4, @inherit={0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000030000f30000e10005000000000000000100f0ff00000000fcffffff00000000040000fffffffc008180000000000000ffffffff000400000000000000000000ea54ffffffff040001000000002500"/96]}, @devid=r2}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000100)={r2, "15f7a36359add91ff81ecff30011e7ce"}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:03 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, 0x0, 0x0) close(r4) [ 1163.161658] FAULT_INJECTION: forcing a failure. [ 1163.161658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1163.161674] CPU: 0 PID: 7468 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1163.161681] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.161685] Call Trace: [ 1163.161703] dump_stack+0x107/0x167 [ 1163.161716] should_fail.cold+0x5/0xa [ 1163.161733] __alloc_pages_nodemask+0x182/0x600 [ 1163.161748] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1163.161759] ? do_syscall_64+0x33/0x40 [ 1163.161780] ? __unwind_start+0x523/0x7e0 21:08:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:03 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1163.161796] alloc_pages_current+0x187/0x280 [ 1163.161809] ? lock_acquire+0x197/0x470 [ 1163.161873] push_pipe+0x2b5/0x6d0 [ 1163.161895] iov_iter_get_pages+0x6b4/0xf40 [ 1163.161910] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1163.161932] bio_iov_iter_get_pages+0x22a/0x1200 [ 1163.161947] ? bvec_alloc+0x17e/0x2f0 [ 1163.161960] ? bio_alloc_bioset+0x2a1/0x600 [ 1163.161971] ? bio_add_pc_page+0x100/0x100 21:08:04 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_dev$mouse(&(0x7f0000000000), 0x8, 0x408040) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$BTRFS_IOC_RESIZE(r4, 0x50009403, &(0x7f00000003c0)={{r2}, {@void, @actul_num={@val=0x2b, 0x4, 0x45}}}) syz_open_procfs(r3, &(0x7f0000000340)='syscall\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) close_range(r1, r2, 0x2) pread64(r0, &(0x7f0000000080)=""/78, 0x4e, 0x5) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0500f3c8612d935a133e4ceec5e8ec1fb4ae5ff4ec7472b0e8684ecee4c28ff42a69e1ee1756cc3776"]) sendmsg$AUDIT_GET(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3e8, 0x400, 0x70bd28, 0x25dfdbfc, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004801}, 0x20000004) [ 1163.161982] ? bvec_alloc+0x210/0x2f0 [ 1163.161995] ? iov_iter_npages+0x1fd/0xa70 [ 1163.162014] iomap_dio_bio_actor+0x77a/0xef0 [ 1163.162037] iomap_dio_actor+0x36f/0x560 [ 1163.162054] iomap_apply+0x289/0x810 [ 1163.162065] ? iomap_dio_rw+0x90/0x90 [ 1163.162079] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1163.162098] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1163.162109] ? mark_held_locks+0x9e/0xe0 [ 1163.162129] ? filemap_check_errors+0xa5/0x150 [ 1163.162145] __iomap_dio_rw+0x6cd/0x1110 [ 1163.162156] ? iomap_dio_rw+0x90/0x90 [ 1163.162178] ? iomap_dio_bio_actor+0xef0/0xef0 21:08:04 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1163.162243] ? down_read+0x10f/0x430 [ 1163.162257] ? down_write+0x160/0x160 [ 1163.162273] iomap_dio_rw+0x31/0x90 [ 1163.162287] ext4_file_read_iter+0x2c7/0x4c0 [ 1163.162303] generic_file_splice_read+0x455/0x6d0 [ 1163.162316] ? pipe_to_user+0x170/0x170 [ 1163.162334] ? fsnotify_perm.part.0+0x22d/0x620 [ 1163.162351] ? security_file_permission+0xb1/0xe0 [ 1163.162364] ? pipe_to_user+0x170/0x170 [ 1163.162376] do_splice_to+0x10e/0x160 [ 1163.162389] splice_direct_to_actor+0x2fe/0x980 [ 1163.162404] ? pipe_to_sendpage+0x380/0x380 [ 1163.162418] ? do_splice_to+0x160/0x160 [ 1163.162431] ? security_file_permission+0xb1/0xe0 [ 1163.162448] do_splice_direct+0x1c4/0x290 [ 1163.162459] ? splice_direct_to_actor+0x980/0x980 [ 1163.162469] ? avc_policy_seqno+0x9/0x70 [ 1163.162486] ? security_file_permission+0xb1/0xe0 21:08:04 executing program 1: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/103, 0x67}, {&(0x7f0000000180)=""/120, 0x78}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x120) sendfile(0xffffffffffffffff, r0, &(0x7f0000000380)=0x5, 0x1) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1163.162505] do_sendfile+0x553/0x11e0 [ 1163.162524] ? do_pwritev+0x270/0x270 [ 1163.162537] ? wait_for_completion_io+0x270/0x270 [ 1163.162551] ? rcu_read_lock_any_held+0x75/0xa0 [ 1163.162561] ? vfs_write+0x354/0xb10 [ 1163.162577] __x64_sys_sendfile64+0x1d1/0x210 [ 1163.162590] ? __ia32_sys_sendfile+0x220/0x220 [ 1163.162604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.162615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.162627] do_syscall_64+0x33/0x40 [ 1163.162639] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1163.162646] RIP: 0033:0x7fb1ac5e0b19 [ 1163.162659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 21:08:04 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x6, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="d7f446076f66f3445d624f37802e225626381209719c9a7855aefce09ea38ad5c80b24ebbb84fa53264963d5492f71255a502b6d153065f04eafcfc7731f7c645253593148a7bea6dd61ab391313bc9242fbd7237135057bd29e918b21c0a75794150bfaccf8c3c3e7097f0b57142f4761c6c0a0", 0x74, 0x7}, {&(0x7f0000000240)="9d2c6203b78d77f8f84c2fcbe423c663ebbd0cc48de30168b7f2ceb93aebd866756edace9abfa6f0fa75ef3cfd92911a2a1f812ea714b9014cb998d5ff2f05a6f9481f1ac9f129024404fa9b8bd94bdd7ffac8ef5812749ec8085407b700183abe712f", 0x63, 0x100000000}, {&(0x7f00000005c0)="d909ef129424b77821d7944d27f08e19bcc20b4cc6429008e0bbae144f84c51b4aaaa6608c814fb48e45bde51db5f86eefef2aeb57c9466ae11597c3133487ab75b8ac882fb3923d1f857eb2849222ee880ceed69ffc5670df0a28c8307ce6ca3215d31298d43498c564c7161c06aa0b3e20cf6aa84323db4c315945100cc042425d22c9e9c60b61b2a6c1b62a417cf5ded1b07ac5543f136a9be3527afd5788d3612cd7523d5e1c74deb316a21731f1e700a22fe25284a1e43ff84c0c5e071710721a9ab7b9c36fc837e45f49d6d8ce49acdc42f60f16e4e0161cbd416382eaaf04a6bb774306ad3199011242088d06315a928b203312e5fdbdd11f57cd7eaf2eaf575930", 0x105, 0x1}], 0x1000, &(0x7f0000000440)={[{@check_relaxed}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@cruft}, {@unhide}, {@hide}, {@mode={'mode', 0x3d, 0x39}}, {@session={'session', 0x3d, 0x3}}, {@gid}], [{@fowner_gt={'fowner>', 0xee01}}, {@fsuuid={'fsuuid', 0x3d, {[0x919171f73010e4f8, 0x34, 0x62, 0x52, 0x0, 0x39, 0x36, 0x54], 0x2d, [0x38, 0x36, 0x0, 0x62], 0x2d, [0x64, 0x31, 0x30, 0x2], 0x2d, [0x66, 0x62, 0x35, 0x30], 0x2d, [0x64, 0x19, 0x32, 0x61, 0x61, 0x30, 0x36, 0x34]}}}, {@obj_role={'obj_role', 0x3d, '#@.!$\x00'}}]}) fcntl$getownex(r1, 0x10, &(0x7f0000000540)) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r2 = timerfd_create(0x7, 0x100400) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000000)=""/52, 0x34}], 0x1) 21:08:04 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1163.162665] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1163.162678] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1163.162685] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1163.162692] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.162698] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1163.162705] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:08:04 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000200)={0x0, 0x1, 0x1d, 0xb, 0x8, &(0x7f00000002c0)="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"}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x488400, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) 21:08:04 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:04 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 44) 21:08:04 executing program 6: setrlimit(0x5, &(0x7f0000000000)={0x80000001, 0x101}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:04 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, 0x0, 0x0) close(r4) [ 1163.564185] FAULT_INJECTION: forcing a failure. [ 1163.564185] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1163.565436] CPU: 0 PID: 7520 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1163.566065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.566785] Call Trace: [ 1163.567059] dump_stack+0x107/0x167 [ 1163.567396] should_fail.cold+0x5/0xa [ 1163.567747] __alloc_pages_nodemask+0x182/0x600 [ 1163.568193] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1163.568665] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1163.569227] ? policy_node+0x52/0x140 [ 1163.569566] ? write_comp_data+0xa/0x80 [ 1163.569946] alloc_pages_current+0x187/0x280 [ 1163.570353] ? lock_acquire+0x197/0x470 [ 1163.570703] push_pipe+0x2b5/0x6d0 [ 1163.571022] iov_iter_get_pages+0x6b4/0xf40 [ 1163.571445] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1163.571889] bio_iov_iter_get_pages+0x22a/0x1200 [ 1163.572340] ? bvec_alloc+0x17e/0x2f0 [ 1163.572684] ? bio_alloc_bioset+0x2a1/0x600 [ 1163.573067] ? bio_add_pc_page+0x100/0x100 [ 1163.573473] ? bvec_alloc+0x210/0x2f0 [ 1163.573809] ? iov_iter_npages+0x1fd/0xa70 [ 1163.574184] iomap_dio_bio_actor+0x77a/0xef0 [ 1163.574619] iomap_dio_actor+0x36f/0x560 [ 1163.574981] iomap_apply+0x289/0x810 [ 1163.575335] ? iomap_dio_rw+0x90/0x90 [ 1163.575703] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1163.576225] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1163.576717] ? mark_held_locks+0x9e/0xe0 [ 1163.577086] ? filemap_check_errors+0xa5/0x150 [ 1163.577517] __iomap_dio_rw+0x6cd/0x1110 [ 1163.577885] ? iomap_dio_rw+0x90/0x90 [ 1163.578249] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1163.578681] ? down_read+0x10f/0x430 [ 1163.579027] ? down_write+0x160/0x160 [ 1163.579408] iomap_dio_rw+0x31/0x90 [ 1163.579731] ext4_file_read_iter+0x2c7/0x4c0 [ 1163.580133] generic_file_splice_read+0x455/0x6d0 [ 1163.580579] ? pipe_to_user+0x170/0x170 [ 1163.580956] ? fsnotify_perm.part.0+0x22d/0x620 [ 1163.581394] ? security_file_permission+0xb1/0xe0 [ 1163.581815] ? pipe_to_user+0x170/0x170 [ 1163.582193] do_splice_to+0x10e/0x160 [ 1163.582532] splice_direct_to_actor+0x2fe/0x980 [ 1163.582967] ? pipe_to_sendpage+0x380/0x380 [ 1163.583378] ? do_splice_to+0x160/0x160 [ 1163.583739] ? security_file_permission+0xb1/0xe0 [ 1163.584193] do_splice_direct+0x1c4/0x290 [ 1163.584581] ? splice_direct_to_actor+0x980/0x980 [ 1163.585015] ? avc_policy_seqno+0x9/0x70 [ 1163.585399] ? security_file_permission+0xb1/0xe0 [ 1163.585831] do_sendfile+0x553/0x11e0 [ 1163.586190] ? do_pwritev+0x270/0x270 [ 1163.586533] ? wait_for_completion_io+0x270/0x270 [ 1163.586955] ? rcu_read_lock_any_held+0x75/0xa0 [ 1163.587482] ? vfs_write+0x354/0xb10 [ 1163.587815] __x64_sys_sendfile64+0x1d1/0x210 [ 1163.588252] ? __ia32_sys_sendfile+0x220/0x220 [ 1163.588674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.589131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.589645] do_syscall_64+0x33/0x40 [ 1163.589971] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1163.590474] RIP: 0033:0x7fb1ac5e0b19 [ 1163.590801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.592534] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1163.593247] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1163.593883] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1163.594543] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1163.595176] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1163.595899] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:08:18 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(0xffffffffffffffff) 21:08:18 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 45) 21:08:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x77, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x200, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) fcntl$dupfd(r1, 0x0, r0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1177.668637] FAULT_INJECTION: forcing a failure. [ 1177.668637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1177.670140] CPU: 0 PID: 7534 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1177.670841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1177.671781] Call Trace: [ 1177.672022] dump_stack+0x107/0x167 [ 1177.672481] should_fail.cold+0x5/0xa [ 1177.672826] __alloc_pages_nodemask+0x182/0x600 [ 1177.673303] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1177.673868] ? do_syscall_64+0x33/0x40 [ 1177.674317] ? __unwind_start+0x523/0x7e0 [ 1177.674733] alloc_pages_current+0x187/0x280 [ 1177.675117] ? lock_acquire+0x197/0x470 [ 1177.675758] push_pipe+0x2b5/0x6d0 [ 1177.676518] iov_iter_get_pages+0x6b4/0xf40 [ 1177.677322] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1177.680658] bio_iov_iter_get_pages+0x22a/0x1200 [ 1177.681576] ? bvec_alloc+0x17e/0x2f0 [ 1177.682262] ? bio_alloc_bioset+0x2a1/0x600 [ 1177.683048] ? bio_add_pc_page+0x100/0x100 [ 1177.683763] ? bvec_alloc+0x210/0x2f0 [ 1177.684102] ? iov_iter_npages+0x1fd/0xa70 [ 1177.684571] iomap_dio_bio_actor+0x77a/0xef0 [ 1177.684969] iomap_dio_actor+0x36f/0x560 [ 1177.685377] iomap_apply+0x289/0x810 [ 1177.685750] ? iomap_dio_rw+0x90/0x90 [ 1177.686087] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1177.686683] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1177.687145] ? mark_held_locks+0x9e/0xe0 [ 1177.687635] ? filemap_check_errors+0xa5/0x150 [ 1177.688042] __iomap_dio_rw+0x6cd/0x1110 [ 1177.688514] ? iomap_dio_rw+0x90/0x90 [ 1177.688863] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1177.689315] ? down_read+0x10f/0x430 [ 1177.689687] ? down_write+0x160/0x160 [ 1177.690026] iomap_dio_rw+0x31/0x90 [ 1177.690426] ext4_file_read_iter+0x2c7/0x4c0 [ 1177.690824] generic_file_splice_read+0x455/0x6d0 [ 1177.691291] ? pipe_to_user+0x170/0x170 [ 1177.691741] ? fsnotify_perm.part.0+0x22d/0x620 [ 1177.692153] ? security_file_permission+0xb1/0xe0 [ 1177.692665] ? pipe_to_user+0x170/0x170 [ 1177.693013] do_splice_to+0x10e/0x160 [ 1177.693463] splice_direct_to_actor+0x2fe/0x980 [ 1177.693875] ? pipe_to_sendpage+0x380/0x380 [ 1177.694300] ? do_splice_to+0x160/0x160 [ 1177.694695] ? security_file_permission+0xb1/0xe0 [ 1177.695120] do_splice_direct+0x1c4/0x290 [ 1177.695603] ? splice_direct_to_actor+0x980/0x980 [ 1177.696025] ? avc_policy_seqno+0x9/0x70 [ 1177.696481] ? security_file_permission+0xb1/0xe0 [ 1177.696911] do_sendfile+0x553/0x11e0 [ 1177.697326] ? do_pwritev+0x270/0x270 [ 1177.697710] ? wait_for_completion_io+0x270/0x270 [ 1177.698136] ? rcu_read_lock_any_held+0x75/0xa0 [ 1177.698624] ? vfs_write+0x354/0xb10 [ 1177.698957] __x64_sys_sendfile64+0x1d1/0x210 [ 1177.699430] ? __ia32_sys_sendfile+0x220/0x220 [ 1177.699870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1177.700370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1177.700926] do_syscall_64+0x33/0x40 [ 1177.701324] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1177.701889] RIP: 0033:0x7fb1ac5e0b19 [ 1177.702260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.703983] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1177.704756] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1177.705482] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1177.706100] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1177.706798] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 21:08:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1177.707498] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 sendmmsg$sock(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="05ac00bfbaa95196ee25f6b642452f419c4df7cb5df214707be9fffec44c3fd3ccb36fafd149aea678a13cee65628a6cde970d759b79d058ffb8443b9edefb28a167b056ef36e77bb18b2f8e31f9d596b4fcd65bf835c54de2cb6aa5d6d3f45e0b395e481346b2fc5dd8b6e57c6da9c19d6c40a2cff5e730b39006fa852415b72ba9a457787deec4109c554f84de8e7f0ba981fed0696ed9923a12f8e7336de26d2ac5199039e18a7e7912c9267a537f467507aca34c600ef5581deb76d858a026830d485267bb5bde3f631fd6054311de223dcabe4609b1e6b4104e5fb9707083b6e53aba799b459eeceecfba1578d88ef185dd34", 0xf5}, {&(0x7f00000002c0)="f0d727860d7775cde27d83be42a1b1df1334541da2891424e13efcc639033aba96e817d22e23f8b49ac76a8ba0a6b9a6ebfdcdd1c31291c250aa303585c092e9cd9e5ed4af89af42f1320435cdcadf45d1b20c2223c1b8f466d45a9e95828f19558a08bebda196b20adcb07024dc2c586b5f62f4db86047c50888d4a354b55cb7498540ed6a60cc8150d1e5b4f2c6e277c7ace3f61d7db845ca4881dadb7cbe37341ce7f1ca37a581f72094a24482745378432cd08923a60d2b560746fe95939f021ca578381b3e1ed2b0a2b0a6d03dcdd19c83027ef9196d5542cb6eb1265352a22f685c81d63360582edb54a", 0xed}, {&(0x7f0000000000)="cfc4d194ccfa113e93d475f89efc69834485bed4484587a11bc3f41bdb0eddabf73abf", 0x23}, {&(0x7f0000000180)="b220fcf56b5715aa76bc90999269ee804084fa29794e7c36d9e47d1c71aee45c3ce366113641d44fc279232dddb449849681f1d9bf3eb8fdb0f6eb8bd2b28d8f6bb41dd50db72732205bd27111", 0x4d}, {&(0x7f0000000200)}, {&(0x7f00000003c0)="66931548e6197e3e4b414b03ece332ff01a80e63384ca7416a5e27401a59d030bf375f94e3f1cd6cb186ba716013eb5f2283b9d41f856de0c1b66c1e5c007cec0dfb785395337d6ea2cf0079f1392e54f6ce027fe9960a10a22909a0fdf0469a31fe74ba22e6b612a60646c52c43514d2dcdda20f19db66de3144e553ca7bc4079aca534dad776d27f727a64569c6edf8781bd1fb975875ee1bcb9c83adc7e6959", 0xa1}, {&(0x7f0000000480)="7f87e7fc574ee54e9bc4ce17227097673b1cd203142636c5b2edd9a4093ebdbfd00655fbf4b8686f31911fa738f3389586", 0x31}, {&(0x7f00000004c0)="8d6bd06855ccc09a4b4cf0bb6f94616612fc97c9c25c247276b6f4ceaeeaa1ce1311df29025c4e31a0945058d8113390268eb3706a4199fb9d2dcd1882a1af66551e706efba17dfa6a8d48b41dde38a50f3c2239d1ddaa7a60f5bd2026cdbf6ccb85364420a3041d64575083b464561fece3d92ed650665146ac91fae3ae880777618da20fa3430a0566f2deac4202697296048fa47941ce", 0x98}], 0x8, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x60}}, {{&(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @multicast1}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000700)="b60c423b39de75eb2af6392abcf37e9f4cd00102ff332f6fcda74e2b79ecef0d6cda502d33f77e25395a253c0070747cfc68e54e29bf8897dec77d1c6ee6f3c3ca6b45b1c137b208a5adff7c9005a34e21056cc7821a9f946898a5de6787f6d24b61b94d300cf8408323a495a0d00ba855780757e5b89843aea7c40129cdbed0770e142e91fab00ea1257b73f0", 0x8d}], 0x1}}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000800)="a408886dbe66324bf3e99e1dcb28eaef0e444ebc7badce921c04a14dfe9dc5a06792a3714eb5dde7fecefe060857021261", 0x31}, {&(0x7f0000000840)="9f9b33841b882a687dc822f83657a040574b850225", 0x15}, {&(0x7f0000000880)="ce9d64fd6d01abb3069ca94b4c32e76939b3f7dc5ed6424999b420cf34feaeba938dc12d31e26affa623dbe75a6ce3cdd45a2db788ee567fb973dc9de9de410c286a1955fd6d26f02a9854c19d3cce1573597d84ba7336db1480a33ed782be95d8121cbe5afded22e2eaaddcf4b6a4472e3970791afa52f2e63c38501dba6e32", 0x80}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="5feb7c44987a97f302248571465d8777c5d72a09199a039eca572fa77fa942290fda864a89e7afc340fd162da8998553427ffcd22387d7818455c3cfb7fcbc727eeba0ffea2d0ef4df76783a3ee3d0c42ecacbdcd368f2a682775c416d84b07f37c8fad6af84893337f713327000bb3a35b87c5d8008d90ad4dd450e108af3f7948353bc7a719c3f3bbdaf436bc918fd4d5df5c6d71b57fd8cd83ba0c2eba5ce7e398e", 0xa3}, {&(0x7f00000019c0)="d2fdaa765008cdff0ccfb263f4042b8c5cb5b417c94dab4e11618f4b3ab94bcc3feb3ed0fbfd151ef27c8d9ff398938b931b6938a41c6b10067d6756bebd7f9ab55dfd6640a8d524ee501a6a5e250527de114909", 0x54}, {&(0x7f0000001a40)="dd8ec7112d1d628b184af1cb429eb4fe5dde0251cc23cf9cbd6a0242cd6a9591b6b53b96c8142c42495c7f97de375265af212b3031480cf97d4c2e77a58896f68648", 0x42}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000002e00)="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", 0x1000}], 0x9, &(0x7f0000001b80)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x6b9696c1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0xc56e}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x7239}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x81}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}], 0xf0}}, {{&(0x7f0000001c80)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000003e00)="26c91d8b84d702cc5b84205bf6ed40d314c22618c11d4949a7d04895a6c8a112c9a740efffb0049c89f4c62d51d7c8eadff8e2959807e8392de7cbdbccf3092c4986162870b06d2d2d56017890b6ec0ec80a1409c8ced6e372ec606b368f1ff22e7683c36dd606a280529ec03ffa91fd628c170578a7a25fafeecafa1ae0539c5d636128b72b5ed246801e31fbe6b2953c75c3a9c86bf428788e756ab89bd0d081b09ed95ac9fbe660dd67d6b5ddce9854a5e29550994761fc817fee3b3ca1efa048f477cf97c171dcc076efdcfc4a81e3164116078ff6f25f88706571b1ba08ac23c93a7a6c399b", 0xe8}], 0x1, &(0x7f0000003f00)=[@timestamping={{0x14, 0x1, 0x25, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xff}}], 0x60}}, {{&(0x7f0000003f80)=@qipcrtr={0x2a, 0x4, 0x7ffe}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000004000)="d1acfc7021e9d2fd8174d1a9aa78371bb702f35d7fc6ffdd8eeffc245c118b4f284a1379848edbf91db1fad9d579419afc3e057c89f8d22d5e7663ffa349f1407dd1adea21b559fa5cd8fa1d17231ed6a93137ba65caad64a352216fba5c38d5b28492fd327e4911f22cca48aff335", 0x6f}, {&(0x7f0000001d40)="6766f92c01cf9ec9bceaf76960760b84b72637312c4b67a659c0f1a42f334f5fcc4cf7a5", 0x24}, {&(0x7f0000004080)="b2488340a7db5023a969a67728c127827cffc5", 0x13}, {&(0x7f00000040c0)="63ab1846802cf2ad9de7a86212c6a44d0213ea04c5cc4ad95fde5363738064a5384b8bd92c17e742b2b52ea1ffb790d9819f7551c5113e01cedba4522018e1b36e3615cce8daad2d81acf83fa3c06d7ce4c1e9942a54473fbd3eb63bdfe7d471098dfa27d616e6831018b7ff117602fd0dcc38a4603ca41e5d079761d3dcb6b183fdac", 0x83}, {&(0x7f0000004180)="41a611e8878c765d959479c7f4a7b31743a0bf7e97ea4b256d667cc454d37945a5d6b4f04918ce31d9493698c67a81623613430a6cf43438629c27d462882f8727447663caf5b528a7d6ca85a40da193e0f7dc9b92d3e8337e7f89e6bbf2e5548d33a4db1e936788fbb839fb1e36b0bfe306b9f1a3d23ab1b62a9fbdf9b00c26c9c681677d0dfc28ec9e88db52ba", 0x8e}, {&(0x7f0000004240)="bda7b7c8fcfe702a0576ba3e48d70b4c680b5bc505f8aff5274f00", 0x1b}, {&(0x7f0000004280)="a4", 0x1}], 0x7}}, {{&(0x7f0000004340)=@nl=@unspec, 0x80, &(0x7f0000004480)=[{&(0x7f00000043c0)="b3dc69713725efa5d884b873eb75bdc349bfd05d2ee55b2c1bbde99a2e440861f3b359aa060715bd2f993a00bdc3fe", 0x2f}, {&(0x7f0000004400)="1df01a359e57e982c97108be99cb3788", 0x10}, {&(0x7f0000004440)="9d0d648034aaf3a7591c35a9e638bad2769c9a51fdb3adc757be8448db14f08ccc175969ed048285ba20dc3829c1c4f56218a35829c2f2c34669f401388b23", 0x3f}], 0x3}}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f00000044c0)="915045c4b1c572", 0x7}, {&(0x7f0000004500)="be632061285ea4ca2e6941d209", 0xd}], 0x2}}, {{&(0x7f0000004580)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x5, 0x7b, "d99c7b6d48a90c13128d96e98cdc2350f7e38a70dbb8ae32c5bcf05dda3bac43b9b4d231ea5c7173b3f467d1a010fb716480093797d0b2b485f79ddf2877af", 0x15}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000004600)="5d4610e85fe7172855837ed372f8206e620550892093f814c41ffb60d2910b74ddb81e7650e1759c82fdae802169366113e949080178500d1823c82998981b6badd9fe847d9fdc402486cb0b890d8a6bbfb3", 0x52}, {&(0x7f0000004680)="a31e474a3c566d34d3a34531703e45d30bd5981f29e46a592b296a325197dadce629bb0f28d369c54477c13adcec609e67bf1b3894db6d06f648af724fcd6a4e647409e9b5d40160c3e309c7b13e38da39258ced3c4ab7e498a284512e0debb8726278d995a46d84d4dd6b28e5b53cd28eb0531600474bef3311613fac807e", 0x7f}, {&(0x7f0000004700)="3e83a4e7ee64c6285fdfbae44d94ca0e86ee445be772e75b87cbed57b80e3cdc73ee451c0ef356182495e57ec35aacac511531ec86f643fc764c0d5237b226697fa6637fa6c01081fcc11cab80a5dd3ab0dcc11e6c8ad708c5b3269029c3b8edd06188f65d7648b8371893ebeead5f24ba5e17944991c74cf8d51f112373237860f9987140c94c574a3c1ce106f0abbfdb30e46b9a7696c7579edc76455a913a6fd320e6a8686fb33a87236bcd7833d0ab8581319203917cfffaad1b896e03e7f4c62c3c35893c9f2ee72c224307e9b672bc967c2cbfe50bbf1db83d0a4f34a3139170c204d8c1", 0xe7}, {&(0x7f0000004800)="162470035cca8b3acc59ebd779d615f64cdffd9ee630e35aa7508c0fa1f983491cb93ee12b300f9c276f1658a69931ea00507eb3a31f608480bc8e0c32e4b61b7100f36696", 0x45}, {&(0x7f0000004880)="29efa7b5c6b883586e81fa30a356b86427be836f822020c643f0dda78edf18b26b206f049a4c2e3f7ad17db28f3aab2390b5853e2be8033717a799615b899f85e77f933d9fbf68051d", 0x49}, {&(0x7f0000004900)="0dd0846d3357ada64a1aa93ee507700b8b4bcde3776be439e9baba4f8da50299e9bf83fb2c453e2c810ba50fbc53c627cf2ebc6c81a108129fd0c724d12b6d45c940e8ce4eaac92a1efc29d9f83199294a430c7b9138c54314a85ee108c1a1e7253001ae1304b000622b3c2f5cfd101524ccc33d76db1b2f022b031ddcf100562c17dab40e351e2f4e3a11f2e3ad7e655e0269773614578358506bd3168707a355341ac47128d0d93baf61e328382bb8d92f0d9dce38a027aeb635e4285cb965c80fa5eeee96737c9331e1680dab5488e1f66cb8ac73aeb681e35fcc47c2faac8e", 0xe1}, {&(0x7f0000004a00)="9a5a84362cfa2ce824c76647c01628f07f77286c99b2b3f08ed0b6d53dcf78e4a2f672ea55c3554d84e0653e8d5fe6b55ab94df0a2c067b6911cba97740af131631e2bf4bae57bd6fa0d4adfd4999c441999cf163446becc9fe6167f149f8f4462df1750cbd7e95b0fbfd8cd6a849fff63983c917716d148ea1ca5bda1aa3ca4ecd201119a5ee47bc20fb24da60060e51aae7a46c7b9ca18a5a258a24f94a0e3241f438ae33cb32689aa6a3427d79d5be5a038afab4e34be0e6d1b81", 0xbc}, {&(0x7f0000004ac0)="95b36b9e9322863897f55a8ef05ac7f1b0419de8b5e4fbcd19203388605bedc17e5fd31162f77afb4c0998601630534a7147d96eec53a9282d480b493ab9c451130938834faf042d7c8585a426dd9e69892bb0b22acf5ee52c38a27a0967219ba9ac0d835a514fcd25f182364ca19619a1d44aac38a2d81bc4cf7e11099446c40e74dd29d010c387aaa76ec448768cbc5d51d322c641e825f6a878c0da1a80bd2dfa9ed7fbfe377dd57439477208b32577c4f51cb61033dc0665a1a1e69eeef2d256103e86ab2055", 0xc8}, {&(0x7f0000004bc0)="2730086f8eb310d10beacc54ae7120c4a89b0d2afb8d2a59dbfb516dc9866b6cc927d00c0021852c31e35baa608551f7ef33740fa6eb06aecb57acd5272cefa89665c459cd5acd78aeb33c816740599741b3215b7605b4f19d4ae0", 0x5b}], 0x9, &(0x7f0000004d00)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x280000}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x48}}], 0x8, 0x8000010) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:18 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = inotify_init1(0x800) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000000200)=""/22, 0x16}, {&(0x7f00000002c0)=""/148, 0x94}, {&(0x7f0000000380)=""/175, 0xaf}, {&(0x7f0000000440)=""/20, 0x14}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f0000000580)=""/95, 0x5f}, {&(0x7f0000000600)=""/245, 0xf5}, {&(0x7f0000000700)=""/92, 0x5c}, {&(0x7f0000000780)=""/47, 0x2f}], 0xa) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000140)={0xfff8, 0x6, 0x8}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) 21:08:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:18 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$setstatus(r0, 0x4, 0x2000) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$binderfs(0xffffffffffffff9c, &(0x7f00000002c0)='./binderfs/custom1\x00', 0x0, 0x0) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="4e7d256888a35c975e1910000000", @ANYRES16=0x0, @ANYBLOB="000325bd7000fcdbdf25010000000900010073797a31000000000900030073797a32000000000900030073797a3100000000140002006272696467655f736c6176655f310000"], 0x4c}, 0x1, 0x0, 0x0, 0xc0004}, 0x4000840) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000000)) close(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x3f, 0x80, 0x7, 0x3}]}, 0x10) 21:08:18 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f00000002c0)={{r2}, "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"}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) kcmp(r3, 0x0, 0x0, r4, r5) r6 = syz_open_procfs(r3, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:18 executing program 6: syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) pread64(r0, &(0x7f0000000100)=""/73, 0x49, 0x2) 21:08:18 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) 21:08:18 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:31 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) shmat(r0, &(0x7f0000866000/0x4000)=nil, 0x2000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) 21:08:31 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:31 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 46) 21:08:31 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000100)=""/73, 0x49, 0x5) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r0}, 0x9, 0x3f, 0x5}) 21:08:31 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(0xffffffffffffffff) 21:08:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x50}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x3, 0x421, 0x9, 0x7, 0x20, "8393b638b3da6c858fcd0744339e661d52c978", 0xd9, 0x100}) 21:08:31 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000200)='net/raw6\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000140)=""/78) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) [ 1190.721959] FAULT_INJECTION: forcing a failure. [ 1190.721959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1190.724211] CPU: 1 PID: 7581 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1190.725396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1190.726825] Call Trace: [ 1190.727278] dump_stack+0x107/0x167 [ 1190.727979] should_fail.cold+0x5/0xa [ 1190.728638] __alloc_pages_nodemask+0x182/0x600 [ 1190.729441] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1190.730475] ? do_syscall_64+0x33/0x40 [ 1190.731147] ? __unwind_start+0x523/0x7e0 [ 1190.731923] alloc_pages_current+0x187/0x280 [ 1190.732680] ? lock_acquire+0x197/0x470 [ 1190.733361] push_pipe+0x2b5/0x6d0 [ 1190.733976] iov_iter_get_pages+0x6b4/0xf40 [ 1190.734833] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1190.735681] bio_iov_iter_get_pages+0x22a/0x1200 [ 1190.740133] ? bvec_alloc+0x17e/0x2f0 [ 1190.740462] ? bio_alloc_bioset+0x2a1/0x600 [ 1190.740830] ? bio_add_pc_page+0x100/0x100 [ 1190.741193] ? bvec_alloc+0x210/0x2f0 [ 1190.741517] ? iov_iter_npages+0x1fd/0xa70 [ 1190.741884] iomap_dio_bio_actor+0x77a/0xef0 [ 1190.742269] iomap_dio_actor+0x36f/0x560 [ 1190.742622] iomap_apply+0x289/0x810 [ 1190.742937] ? iomap_dio_rw+0x90/0x90 [ 1190.743262] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1190.743760] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1190.744216] ? mark_held_locks+0x9e/0xe0 [ 1190.744569] ? filemap_check_errors+0xa5/0x150 [ 1190.744958] __iomap_dio_rw+0x6cd/0x1110 [ 1190.745300] ? iomap_dio_rw+0x90/0x90 [ 1190.745636] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1190.746030] ? down_read+0x10f/0x430 [ 1190.746345] ? down_write+0x160/0x160 [ 1190.746672] iomap_dio_rw+0x31/0x90 [ 1190.746982] ext4_file_read_iter+0x2c7/0x4c0 [ 1190.747358] generic_file_splice_read+0x455/0x6d0 [ 1190.747776] ? pipe_to_user+0x170/0x170 [ 1190.748125] ? fsnotify_perm.part.0+0x22d/0x620 [ 1190.748524] ? security_file_permission+0xb1/0xe0 [ 1190.748933] ? pipe_to_user+0x170/0x170 [ 1190.749270] do_splice_to+0x10e/0x160 [ 1190.749595] splice_direct_to_actor+0x2fe/0x980 [ 1190.749991] ? pipe_to_sendpage+0x380/0x380 [ 1190.750360] ? do_splice_to+0x160/0x160 [ 1190.750696] ? security_file_permission+0xb1/0xe0 [ 1190.751109] do_splice_direct+0x1c4/0x290 [ 1190.751469] ? splice_direct_to_actor+0x980/0x980 [ 1190.751882] ? avc_policy_seqno+0x9/0x70 [ 1190.752619] ? security_file_permission+0xb1/0xe0 [ 1190.753040] do_sendfile+0x553/0x11e0 [ 1190.753380] ? do_pwritev+0x270/0x270 [ 1190.753705] ? wait_for_completion_io+0x270/0x270 [ 1190.754116] ? rcu_read_lock_any_held+0x75/0xa0 [ 1190.754508] ? vfs_write+0x354/0xb10 [ 1190.754829] __x64_sys_sendfile64+0x1d1/0x210 [ 1190.755210] ? __ia32_sys_sendfile+0x220/0x220 [ 1190.755600] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1190.756503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1190.757385] do_syscall_64+0x33/0x40 [ 1190.758030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1190.758994] RIP: 0033:0x7fb1ac5e0b19 [ 1190.759848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1190.763869] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1190.765514] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1190.767057] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1190.768613] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1190.770167] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1190.775745] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:08:31 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x400}, 0x0, 0x7, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:31 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x8, 0x200) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = dup2(r0, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000080)=""/73, 0x49, 0x5) r4 = open_tree(r2, &(0x7f0000000140)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x98, 0x0, 0x8, 0x801, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x7fff}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x86dd}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0xe866}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x40}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1ff}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 21:08:31 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:31 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000080)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) kcmp(r4, 0x0, 0x0, r5, r6) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0x6, 0x67, 0xfa, 0x0, 0x3, 0x184, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa58, 0x1, @perf_config_ext={0x9, 0x7721539f}, 0x18900, 0x1f, 0x0, 0x1, 0x100000001, 0x8001, 0x7069, 0x0, 0x46539d58, 0x0, 0x1}, r4, 0xa, r0, 0x3) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/anycast6\x00') pread64(r7, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r7, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:31 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$cgroup_type(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r1, 0x942e, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:31 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x7c, 0x9, 0xa, 0x301, 0x70bd2a, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@nested={0x24, 0x25, 0x0, 0x1, [@typed={0xe, 0x32, 0x0, 0x0, @str='net/route\x00'}, @typed={0x8, 0x78, 0x0, 0x0, @u32=0x5}, @typed={0x8, 0x18, 0x0, 0x0, @uid=r2}]}, @nested={0x18, 0x85, 0x0, 0x1, [@typed={0x14, 0xa, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @generic="c48168f681e35c203387d7113d5e1f094c520866f5c6fa0ef0f6c0cd0c807e4f3409dbb50d82ba", @typed={0x4, 0x5}, @generic]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x30000000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x58, 0x1f, 0x9, 0x0, 0x1ff, 0x104, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x6, @perf_bp={&(0x7f0000000000), 0x1}, 0x11008, 0x3, 0x8, 0x6, 0x8000, 0x0, 0x200, 0x0, 0x6744, 0x0, 0x200}, 0xffffffffffffffff, 0x5, r1, 0x9) 21:08:31 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x521000, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/keycreate\x00') lseek(r0, 0x5, 0x3) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0xeb, 0x1, 0x9, 0x0, 0x8, 0x20402, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x3, 0x0, 0x4, 0x6a311962, 0x0, 0x9feb, 0x0, 0xe5, 0x0, 0x1}, 0x0, 0x1, r0, 0xa) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd4(r0, &(0x7f00000004c0)={[0x5a7]}, 0x8, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000700)={&(0x7f0000000540)={0x198, 0x33, 0x1, 0x70bd2b, 0x25dfdbfe, {0x15}, [@generic="bea8176ccdbba4c19d1f769451e4346899df6d11c214b1956516bc1c2ab71809d3d4589fc7b81349adcb1a18ffe93b4bc5386e1ac039b6817ca9d2c099db3bd006d2374a993bfdd8ef49fee0b5bf5a1ef2f120bc4fda1973f99197a99bb30ace32192672aa2a001ad826c1b2856618f184839f57de786a938293b1af86ae86c66a71b4b3fc86b10bcfd35d107905e571dc28bd1800ac9981d10e1a49e4384d16463a9a02dd51d2f5d2914236b70c873353", @typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @nested={0xbb, 0x23, 0x0, 0x1, [@typed={0x5, 0x57, 0x0, 0x0, @str='\x00'}, @generic="2f7058b0caa7262a8f3968ec0d7924888838508838cbbffc5acf6503a45fcb8e8b857629a6bfbc306eecbc9b3d768c1a994fead14472a7d90bd598cf941d6103ade5e5654b4b58c6cf050655f1805268759906e564d38ff55ff7f1409a1364fb70edc79687aafaa58d6af755356c06d039c4e5042346ff7393e709c7dffa602f24850c817133d84a79accb55edbaddc6ad1d14711be1a727e9b9013b6578840c1c45dd44ddea2ae42891c5ab5457e2"]}]}, 0x198}, 0x1, 0x0, 0x0, 0x40000}, 0x48840) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r5 = signalfd(r0, &(0x7f0000000780)={[0xc9]}, 0x8) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, &(0x7f00000007c0)={{0x2, 0x4e}, {0x3f}, 0x81, 0x6, 0x7}) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r6, 0x40049366, &(0x7f0000000140)) fchownat(r4, &(0x7f0000000480)='./file0\x00', 0xee01, 0xee01, 0x1000) sendmsg$nl_generic(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x18c, 0x12, 0x800, 0x70bd28, 0x25dfdbfd, {0x13}, [@nested={0x27, 0x2c, 0x0, 0x1, [@generic="778b4f4f824c3bec157d3fd2c86acdb83f4fefa2d77d0538ec3bc5f9ccee4e3fc8c37f"]}, @nested={0x1c, 0x0, 0x0, 0x1, [@typed={0xe, 0x50, 0x0, 0x0, @str='net/route\x00'}, @typed={0x8, 0x43, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @nested={0xc, 0x12, 0x0, 0x1, [@typed={0x8, 0x46, 0x0, 0x0, @fd=r1}]}, @typed={0x4, 0x7b}, @generic="bd0e5ddc8b105ad433ca", @nested={0x116, 0x43, 0x0, 0x1, [@generic="fb052f0f8cdb2e96d5698c14c37e91b0462db139f5d465bef05680bdbed34a0cb5fa207b072b11366a29b9a00b037b2f8d10458bd95f14acb08a3849f06785407b40f3038c7171d3247ef80c12a20230a2d9534105f5bbecd17bfdb6830f7d011646ea580643a9a739f833ee0467efe4f2400fbe1c1a88c6124ec2a04595315ec6a7f9f047fc19dd59b66cf8584e7b7505d1ee17b3705c645d382391cba37e25b97e56684c9327eb4d96196407b051d19a57a67dc0ef5158ddd9cd6e6b2ef23af9204d950198e5c391da943957fa95e64808302cc6555e2f44c97274aa3b", @typed={0x8, 0x4, 0x0, 0x0, @fd=r0}, @typed={0x14, 0x2c, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @typed={0x8, 0x3f, 0x0, 0x0, @fd=r2}, @typed={0x4, 0x28}, @typed={0xc, 0x46, 0x0, 0x0, @u64=0x8001}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x84}, 0x4) 21:08:31 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0xc184, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000cb87dcf948dc610000000100", @ANYRES32, @ANYBLOB="02000000000000002e2f66696c653000"]) fstat(r1, &(0x7f0000000100)) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:46 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) r5 = syz_open_procfs(r4, &(0x7f0000000040)='ns\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:46 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 47) 21:08:46 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(0xffffffffffffffff) 21:08:46 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0x0, 0x7, 0x2, 0x200, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) kcmp(r4, 0x0, 0x0, r5, r6) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r7, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x93, 0x3f, 0x5, 0x8, 0x0, 0x5444, 0x88020, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000140), 0xa}, 0x50860, 0xfc, 0xffff, 0x8, 0x9, 0x438e, 0xfff, 0x0, 0x3}, r4, 0x3, r7, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x10}, 0xc) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/79, 0x4f, 0x7) r8 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r8, 0xc) shmctl$SHM_INFO(r8, 0xe, &(0x7f0000000080)=""/69) [ 1205.311317] FAULT_INJECTION: forcing a failure. [ 1205.311317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1205.313085] CPU: 0 PID: 7641 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1205.313729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1205.314500] Call Trace: [ 1205.314762] dump_stack+0x107/0x167 [ 1205.324300] should_fail.cold+0x5/0xa [ 1205.324673] __alloc_pages_nodemask+0x182/0x600 [ 1205.325121] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1205.325686] ? do_syscall_64+0x33/0x40 [ 1205.326071] ? __unwind_start+0x523/0x7e0 [ 1205.326471] alloc_pages_current+0x187/0x280 [ 1205.326890] ? lock_acquire+0x197/0x470 [ 1205.327271] push_pipe+0x2b5/0x6d0 [ 1205.327622] iov_iter_get_pages+0x6b4/0xf40 [ 1205.328049] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1205.328532] bio_iov_iter_get_pages+0x22a/0x1200 [ 1205.328998] ? bvec_alloc+0x17e/0x2f0 [ 1205.329348] ? bio_alloc_bioset+0x2a1/0x600 [ 1205.329759] ? bio_add_pc_page+0x100/0x100 [ 1205.330160] ? bvec_alloc+0x210/0x2f0 [ 1205.330521] ? iov_iter_npages+0x1fd/0xa70 [ 1205.330925] iomap_dio_bio_actor+0x77a/0xef0 [ 1205.331356] iomap_dio_actor+0x36f/0x560 [ 1205.331754] iomap_apply+0x289/0x810 [ 1205.332126] ? iomap_dio_rw+0x90/0x90 [ 1205.332490] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1205.333037] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1205.333540] ? mark_held_locks+0x9e/0xe0 [ 1205.333940] ? filemap_check_errors+0xa5/0x150 [ 1205.334382] __iomap_dio_rw+0x6cd/0x1110 [ 1205.334768] ? iomap_dio_rw+0x90/0x90 [ 1205.335149] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1205.335594] ? down_read+0x10f/0x430 [ 1205.335958] ? down_write+0x160/0x160 [ 1205.336331] iomap_dio_rw+0x31/0x90 [ 1205.336674] ext4_file_read_iter+0x2c7/0x4c0 [ 1205.337096] generic_file_splice_read+0x455/0x6d0 [ 1205.337559] ? pipe_to_user+0x170/0x170 [ 1205.337958] ? fsnotify_perm.part.0+0x22d/0x620 [ 1205.338406] ? security_file_permission+0xb1/0xe0 [ 1205.338861] ? pipe_to_user+0x170/0x170 [ 1205.339242] do_splice_to+0x10e/0x160 [ 1205.339612] splice_direct_to_actor+0x2fe/0x980 [ 1205.340075] ? pipe_to_sendpage+0x380/0x380 [ 1205.340454] ? do_splice_to+0x160/0x160 [ 1205.340808] ? security_file_permission+0xb1/0xe0 [ 1205.341235] do_splice_direct+0x1c4/0x290 [ 1205.341598] ? splice_direct_to_actor+0x980/0x980 [ 1205.342018] ? avc_policy_seqno+0x9/0x70 [ 1205.342380] ? security_file_permission+0xb1/0xe0 [ 1205.342808] do_sendfile+0x553/0x11e0 [ 1205.343151] ? do_pwritev+0x270/0x270 [ 1205.343486] ? wait_for_completion_io+0x270/0x270 [ 1205.343913] ? rcu_read_lock_any_held+0x75/0xa0 [ 1205.344372] ? vfs_write+0x354/0xb10 [ 1205.344738] __x64_sys_sendfile64+0x1d1/0x210 [ 1205.345169] ? __ia32_sys_sendfile+0x220/0x220 [ 1205.345605] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1205.346101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1205.346593] do_syscall_64+0x33/0x40 [ 1205.346953] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1205.347439] RIP: 0033:0x7fb1ac5e0b19 [ 1205.347795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.349497] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1205.350208] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1205.350875] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1205.351539] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1205.352222] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1205.352888] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:08:46 executing program 6: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='children\x00') pread64(r1, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:46 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) kcmp(r3, 0x0, 0x0, r4, r5) r6 = syz_open_procfs(r3, &(0x7f0000000040)='net/route\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/stat\x00') openat$incfs(r0, &(0x7f0000000fc0)='.pending_reads\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xf97a4e40a1251747}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r1, 0x1ac9012d727ce87, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008421}, 0x4010) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x28}}, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r1, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_LINK={0x8, 0x1, r3}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_LINK={0x8, 0x1, r7}, @GTPA_LINK={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r10, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:46 executing program 2: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000180)=0x1c) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) kcmp(0x0, 0x0, 0x4, r1, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:46 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x668083, 0x0) 21:08:46 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400, 0x0, 0xfffffffe, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000140)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000fd11cec4ab01d623d16e6092644024bc8f0c8e811df277f2d9927fbc24980d4d0ce811a710fb", @ANYRES32=r1, @ANYBLOB="ff070000000000002e2f66696c653000"]) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r3) 21:08:46 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xe03}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x9c20, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r8, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000440)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd_index=0x7, 0x9, 0x0, 0x1f, 0x0, 0x0, {0x0, r9}}, 0x8) syz_io_uring_setup(0x52ab, &(0x7f0000000340)={0x0, 0x2e3, 0x2, 0x2, 0x15f, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r3, r10, &(0x7f0000000400)=@IORING_OP_ASYNC_CANCEL={0xe, 0x6, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x3ff) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000200)={0x0, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3e}}}}, 0x108) flistxattr(r1, &(0x7f0000000100)=""/251, 0xfb) 21:08:46 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000003c0)=0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x1000002, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none}, {@dfltuid}], [{@uid_eq={'uid', 0x3d, r2}}, {@fowner_lt}]}}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x501, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x8100a0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e0f22ca0a88e037e83f2ed6b16f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000.u,cachetag=net/route\x00,loose,uname=,posixacl,aname=/,afid=0x000000000000003f,dont_appraise,smackfshat=net/route\x00,mask=MAY_APPEND,\x00']) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000180)={{r0}, {@val, @actul_num={@void, 0x1000, 0x4b}}}) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x5, 0x3, 0x0, 0x62, 0xa0601, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x2}, 0x4012, 0x0, 0x8001, 0x5, 0x0, 0x0, 0x400, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0xc, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:59 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:59 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 48) 21:08:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:08:59 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000340)=0x200) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/187, 0xbb}, {&(0x7f0000000440)=""/159, 0x9f}], 0x2, 0x842, 0x9) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000940)={0x2, 0x0, 0x14, 0x12, 0x72, &(0x7f0000000540)="a740432e11c0d3ca50a0e51a12df59a5a588d065df73097ce01d4b6ed5d0a1faf08151feba2fcf71171abdbc87ed4055950581cb2766097e72b1674a6b5813ac93c13029b020591e2f537a2af19cf4a7da45fb9e5aed5afc3f014eae718dca8c7f97cbc8a8e82366910595567520c783b748393517f63dab1101d4964a384a4d656422e9527d94769d710a70e472fd347b4b0605fda503d4d97016d61b8a09254e7a53be6affec4c5f8e4e82afed609d807d062f1d5c5f1d4a7f47154af66073b9b6b9b2cfb34177d63d7a3001aa8f1ae781f6a03b87158a53637b806ea1d7d26a2858c18086d0ad6456ef9b1a5259481cda46e586fb19b2bdd0a2243b08c26a68c1893c794512e773c31496ca324869380d70bb95506862a262d3456013d69939dd37cf3a46ff7ea593e27f4757e2cd0174fa8be20da03aa3571607f52c400a2ae1310b3c5a0edeefccec6b5a5d08c88f3ef017d20c454aba14efe7500e913fb8b5eeff9dffd928cb0ab42e29eeed6bfcc6922678017cb628b678421c34c9ba747e1d5653e5a948ae790ca15acf610100cf84cf6bd77529145c403aa69f5f1609856f3df87bd3711c5701827999c5c8ccc495ac698c3c2bad2f2117816387edeb8c92820d05dcd4160162cc9d5fb068d3cfbbc53f2de120093ef7d3027be72a1c743e50b5c3c952e6cdd00386ac1a51351647c3559dcb45a5c9760c1ad888fe2ed937657046ad8ac5a7fd74b8e5d09db151af72d016819afbdd936221c0844a646cf55f6f08a650800fca05ef2a09cc5a3e5f7204b9d8d576991e65e37dde5c2848c7853e97f80cf655a2327db4fe9ba8442969084c0464878d4db3e1d160af08d26c01d7a5d695ea9f2f01c6a9b337c8881ace73a77bba4617798affcae8deed4ec44d55477293d1e673002f5d8a5ebff54a45bc5c631cf916c377fa6e7cf5c330f834efc5f5a47c8e8631d69b47395c0523c92a527712726b05721044264560988c3d958df2cd314285973748e63f3624c1a9784ab1edd5eb97ac05e8ad16cdf5b90e43d4a47f9114afdc4500af6375237a3cf5b998a3c2fca3eb8e90d269cc89d5b1c242ea2ad3f34c26f97b75087b350955c2d063f8090cbc476a19588a546a037f26128e58d8750d940cb1db6ccc5a0c31e78493fab4fb9039a6c7fd74f5b300dff9d5673c2c653438b73cc6fb376f2d4e815749b5dd997ade3b401f675c3281a3ae1b3478279b2317e62a3a99bd798e0252400879f8bee590159c42ed14ff5855147325204e2896c1e1e197ea53e7d9a65af68116ebe7ee682d6f68b440f001869fcb3a53e9e5821ed502360b33b348cb40350fafb86b75d64068daffef4a04c1c8047b421d27992e60feb0230bf2be043f11431b83a985a2cb00025abd547b158f22926066e28cf27c67e9ade551c424e5b8fdb8dbd24e557ba417b8"}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x81, 0xfffffffe}}, './file0\x00'}) sendmsg$NL80211_CMD_GET_SURVEY(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x8, 0x14}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x24004000}, 0x8004) ioctl$FIONCLEX(r0, 0x5450) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:08:59 executing program 2: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/107) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000868000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000080)=""/113) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x28a740, 0x80) flock(r0, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x7, 0x1, 0x3, 0x0, 0xfffffffffffffff8, 0x20000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000080)}, 0x31e84, 0x5, 0xfff, 0x1, 0x351, 0x1f, 0xffff, 0x0, 0x3, 0x0, 0x46}, 0x0, 0x4, r1, 0xb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000002c0)) pipe(&(0x7f0000000180)) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:59 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) creat(&(0x7f0000000000)='./file0\x00', 0x8) 21:08:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 1) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1219.102283] FAULT_INJECTION: forcing a failure. [ 1219.102283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1219.102300] CPU: 1 PID: 7698 Comm: syz-executor.4 Not tainted 5.10.225 #1 21:08:59 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1219.102308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:08:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 2) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1219.102313] Call Trace: [ 1219.102333] dump_stack+0x107/0x167 [ 1219.102349] should_fail.cold+0x5/0xa [ 1219.102368] __alloc_pages_nodemask+0x182/0x600 [ 1219.102387] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1219.102399] ? do_syscall_64+0x33/0x40 [ 1219.102425] ? __unwind_start+0x523/0x7e0 [ 1219.102444] alloc_pages_current+0x187/0x280 [ 1219.102459] ? lock_acquire+0x197/0x470 [ 1219.102474] push_pipe+0x2b5/0x6d0 [ 1219.102495] iov_iter_get_pages+0x6b4/0xf40 [ 1219.102514] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1219.102541] bio_iov_iter_get_pages+0x22a/0x1200 [ 1219.102561] ? bvec_alloc+0x17e/0x2f0 [ 1219.102577] ? bio_alloc_bioset+0x2a1/0x600 [ 1219.102590] ? bio_add_pc_page+0x100/0x100 [ 1219.102603] ? bvec_alloc+0x210/0x2f0 [ 1219.102619] ? iov_iter_npages+0x1fd/0xa70 [ 1219.102637] iomap_dio_bio_actor+0x77a/0xef0 [ 1219.102664] iomap_dio_actor+0x36f/0x560 [ 1219.102683] iomap_apply+0x289/0x810 21:08:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x88800) ioctl$int_in(r0, 0x73, &(0x7f0000000100)=0x5) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:08:59 executing program 6: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/route\x00') r2 = gettid() setpriority(0x1, r2, 0x2) pread64(r1, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:08:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, 0x0, 0x0) 21:08:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 1) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1219.102697] ? iomap_dio_rw+0x90/0x90 21:09:00 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 49) [ 1219.102714] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1219.102735] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1219.102748] ? mark_held_locks+0x9e/0xe0 21:09:00 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/100) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) ioctl$SG_IO(r2, 0x2285, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000157000018000000bf3ba7d9dd067e75103b0790e89b150a5f3d508b2b2bf4ef8e2d0d0d6ed544a6857ffeb92397246fdd2732959fdb36d76ebc34abd21c3369c288479f5551fe9f78d346", @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) kcmp(r5, 0x0, 0x0, r6, r7) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xfe, 0x5, 0x0, 0x8, 0x0, 0x40, 0x40004, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x10000, 0x1, @perf_config_ext={0x200, 0x10000}, 0x9, 0x80000000, 0x3, 0x5, 0x100, 0x5, 0x8, 0x0, 0x8, 0x0, 0x100000001}, r5, 0x0, r0, 0x1) [ 1219.102774] ? filemap_check_errors+0xa5/0x150 21:09:00 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 2) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1219.102791] __iomap_dio_rw+0x6cd/0x1110 [ 1219.102807] ? iomap_dio_rw+0x90/0x90 [ 1219.102834] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1219.102856] ? down_read+0x10f/0x430 [ 1219.102871] ? down_write+0x160/0x160 [ 1219.102889] iomap_dio_rw+0x31/0x90 [ 1219.102907] ext4_file_read_iter+0x2c7/0x4c0 [ 1219.102925] generic_file_splice_read+0x455/0x6d0 [ 1219.102939] ? pipe_to_user+0x170/0x170 [ 1219.102962] ? fsnotify_perm.part.0+0x22d/0x620 [ 1219.102982] ? security_file_permission+0xb1/0xe0 [ 1219.102998] ? pipe_to_user+0x170/0x170 [ 1219.103012] do_splice_to+0x10e/0x160 [ 1219.103029] splice_direct_to_actor+0x2fe/0x980 [ 1219.103048] ? pipe_to_sendpage+0x380/0x380 [ 1219.103064] ? do_splice_to+0x160/0x160 [ 1219.103078] ? security_file_permission+0xb1/0xe0 [ 1219.103098] do_splice_direct+0x1c4/0x290 21:09:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 3) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000080)={0x401, {0x21, 0xffffffff, 0x800, 0x4, 0xfffffffffffffffa}}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0xffffffffffffffff, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = fork() perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x5, 0x3d, 0x2, 0x7, 0x0, 0x1fc00000000000, 0x24102, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x14000000000, 0x81}, 0x40148, 0x1, 0x3, 0x9, 0x90a2, 0x7, 0x8001, 0x0, 0xfffffd4c, 0x0, 0x4}, r2, 0x0, r1, 0x3) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) mknodat$loop(r3, &(0x7f00000001c0)='./file0\x00', 0x80, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_DEV_REPLACE(r5, 0xca289435, &(0x7f00000002c0)={0x1, 0xffffffff, @status={[0x40, 0x1, 0x8000, 0x5, 0x4, 0x2]}, [0x2, 0x100000000, 0x4, 0x480, 0x7b, 0x4, 0x3f, 0x6, 0x1000, 0x8, 0x28000000000000, 0x0, 0x0, 0x2, 0x6, 0x9, 0x7fff, 0x7f, 0xad11, 0x10000, 0x6, 0xffffffff, 0xcd0f, 0x5, 0x6, 0x3, 0x0, 0x5, 0xffffffff, 0x8, 0x0, 0xfff, 0x7, 0x1, 0x3, 0x4, 0x80000000, 0xfffffffffffffff9, 0x1, 0x5, 0x9, 0x8, 0xffffffff, 0x6754, 0x1000, 0x9, 0x1, 0x3, 0x7ff, 0x54, 0x9, 0xff, 0x10000, 0x276, 0x7, 0x8, 0x2, 0x7f, 0x7, 0xb96a, 0xffffffffffff7fff, 0x8001, 0x2, 0x7]}) ioctl$TCSETSW2(r4, 0x402c542c, &(0x7f0000000000)={0x85a, 0x8, 0x400, 0xfffffffa, 0x3f, "ef7a8faf279ec9cb6db7c634211eee0e7452a3", 0x6}) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000100)) [ 1219.103117] ? splice_direct_to_actor+0x980/0x980 [ 1219.103129] ? avc_policy_seqno+0x9/0x70 [ 1219.103150] ? security_file_permission+0xb1/0xe0 [ 1219.103174] do_sendfile+0x553/0x11e0 [ 1219.103196] ? do_pwritev+0x270/0x270 [ 1219.103213] ? wait_for_completion_io+0x270/0x270 [ 1219.103230] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.103241] ? vfs_write+0x354/0xb10 [ 1219.103260] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.103276] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.103293] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.103306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.103321] do_syscall_64+0x33/0x40 [ 1219.103335] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.103344] RIP: 0033:0x7fb1ac5e0b19 [ 1219.103358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.103366] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.103381] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1219.103388] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1219.103394] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.103402] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1219.103410] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1219.106616] FAULT_INJECTION: forcing a failure. [ 1219.106616] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.106629] CPU: 0 PID: 7701 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1219.106635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.106639] Call Trace: [ 1219.106658] dump_stack+0x107/0x167 [ 1219.106672] should_fail.cold+0x5/0xa [ 1219.106689] ? alloc_pipe_info+0x10a/0x590 [ 1219.106705] should_failslab+0x5/0x20 [ 1219.106720] kmem_cache_alloc_trace+0x55/0x320 [ 1219.106740] alloc_pipe_info+0x10a/0x590 [ 1219.106754] ? __lock_acquire+0xbb1/0x5b00 [ 1219.106770] splice_direct_to_actor+0x774/0x980 [ 1219.106786] ? _cond_resched+0x12/0x80 [ 1219.106800] ? inode_security+0x107/0x140 [ 1219.106811] ? pipe_to_sendpage+0x380/0x380 [ 1219.106824] ? avc_policy_seqno+0x9/0x70 [ 1219.106837] ? selinux_file_permission+0x92/0x520 [ 1219.106851] ? do_splice_to+0x160/0x160 [ 1219.106866] ? security_file_permission+0xb1/0xe0 [ 1219.106883] do_splice_direct+0x1c4/0x290 [ 1219.106894] ? splice_direct_to_actor+0x980/0x980 [ 1219.106904] ? avc_policy_seqno+0x9/0x70 [ 1219.106920] ? security_file_permission+0xb1/0xe0 [ 1219.106937] do_sendfile+0x553/0x11e0 [ 1219.106955] ? do_pwritev+0x270/0x270 [ 1219.106968] ? wait_for_completion_io+0x270/0x270 [ 1219.106981] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.106992] ? vfs_write+0x354/0xb10 [ 1219.107008] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.107022] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.107036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.107047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.107060] do_syscall_64+0x33/0x40 [ 1219.107071] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.107079] RIP: 0033:0x7fad5ec00b19 [ 1219.107090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.107096] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.107108] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1219.107115] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1219.107121] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.107127] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1219.107134] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1219.237539] FAULT_INJECTION: forcing a failure. [ 1219.237539] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.237555] CPU: 0 PID: 7716 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1219.237562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.237565] Call Trace: [ 1219.237583] dump_stack+0x107/0x167 [ 1219.237595] should_fail.cold+0x5/0xa [ 1219.237610] ? create_object.isra.0+0x3a/0xa20 [ 1219.237624] should_failslab+0x5/0x20 [ 1219.237635] kmem_cache_alloc+0x5b/0x310 [ 1219.237649] create_object.isra.0+0x3a/0xa20 [ 1219.237661] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.237677] kmem_cache_alloc_trace+0x151/0x320 [ 1219.237694] alloc_pipe_info+0x10a/0x590 [ 1219.237706] ? __lock_acquire+0xbb1/0x5b00 [ 1219.237720] splice_direct_to_actor+0x774/0x980 [ 1219.237736] ? _cond_resched+0x12/0x80 [ 1219.237748] ? inode_security+0x107/0x140 [ 1219.237756] ? pipe_to_sendpage+0x380/0x380 [ 1219.237767] ? avc_policy_seqno+0x9/0x70 [ 1219.237777] ? selinux_file_permission+0x92/0x520 [ 1219.237788] ? do_splice_to+0x160/0x160 [ 1219.237801] ? security_file_permission+0xb1/0xe0 [ 1219.237817] do_splice_direct+0x1c4/0x290 [ 1219.237828] ? splice_direct_to_actor+0x980/0x980 [ 1219.237837] ? avc_policy_seqno+0x9/0x70 [ 1219.237853] ? security_file_permission+0xb1/0xe0 [ 1219.237869] do_sendfile+0x553/0x11e0 [ 1219.237887] ? do_pwritev+0x270/0x270 [ 1219.237900] ? wait_for_completion_io+0x270/0x270 [ 1219.237913] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.237922] ? vfs_write+0x354/0xb10 [ 1219.237937] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.237950] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.237963] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.237974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.237986] do_syscall_64+0x33/0x40 [ 1219.237998] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.238005] RIP: 0033:0x7fad5ec00b19 [ 1219.238017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.238024] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.238037] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1219.238044] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1219.238051] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.238057] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1219.238064] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1219.285935] FAULT_INJECTION: forcing a failure. [ 1219.285935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1219.285955] CPU: 1 PID: 7728 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1219.285965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.285971] Call Trace: [ 1219.285991] dump_stack+0x107/0x167 [ 1219.286006] should_fail.cold+0x5/0xa [ 1219.286026] __alloc_pages_nodemask+0x182/0x600 [ 1219.286044] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1219.286056] ? do_syscall_64+0x33/0x40 [ 1219.286082] ? __unwind_start+0x523/0x7e0 [ 1219.286100] alloc_pages_current+0x187/0x280 [ 1219.286120] ? lock_acquire+0x197/0x470 [ 1219.286136] push_pipe+0x2b5/0x6d0 [ 1219.286157] iov_iter_get_pages+0x6b4/0xf40 [ 1219.286175] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1219.286201] bio_iov_iter_get_pages+0x22a/0x1200 [ 1219.286220] ? bvec_alloc+0x17e/0x2f0 [ 1219.286236] ? bio_alloc_bioset+0x2a1/0x600 [ 1219.286249] ? bio_add_pc_page+0x100/0x100 [ 1219.286262] ? bvec_alloc+0x210/0x2f0 [ 1219.286278] ? iov_iter_npages+0x1fd/0xa70 [ 1219.286300] iomap_dio_bio_actor+0x77a/0xef0 [ 1219.286328] iomap_dio_actor+0x36f/0x560 [ 1219.286347] iomap_apply+0x289/0x810 [ 1219.286361] ? iomap_dio_rw+0x90/0x90 [ 1219.286377] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1219.286400] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1219.286413] ? mark_held_locks+0x9e/0xe0 [ 1219.286437] ? filemap_check_errors+0xa5/0x150 [ 1219.286455] __iomap_dio_rw+0x6cd/0x1110 [ 1219.286467] ? iomap_dio_rw+0x90/0x90 [ 1219.286496] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1219.286521] ? down_read+0x10f/0x430 [ 1219.286535] ? down_write+0x160/0x160 [ 1219.286555] iomap_dio_rw+0x31/0x90 [ 1219.286573] ext4_file_read_iter+0x2c7/0x4c0 [ 1219.286590] generic_file_splice_read+0x455/0x6d0 [ 1219.286604] ? pipe_to_user+0x170/0x170 [ 1219.286623] ? fsnotify_perm.part.0+0x22d/0x620 [ 1219.286641] ? security_file_permission+0xb1/0xe0 [ 1219.286656] ? pipe_to_user+0x170/0x170 [ 1219.286670] do_splice_to+0x10e/0x160 [ 1219.286687] splice_direct_to_actor+0x2fe/0x980 [ 1219.286705] ? pipe_to_sendpage+0x380/0x380 [ 1219.286722] ? do_splice_to+0x160/0x160 [ 1219.286737] ? security_file_permission+0xb1/0xe0 [ 1219.286756] do_splice_direct+0x1c4/0x290 [ 1219.286770] ? splice_direct_to_actor+0x980/0x980 [ 1219.286783] ? avc_policy_seqno+0x9/0x70 [ 1219.286803] ? security_file_permission+0xb1/0xe0 [ 1219.286827] do_sendfile+0x553/0x11e0 [ 1219.286849] ? do_pwritev+0x270/0x270 [ 1219.286865] ? wait_for_completion_io+0x270/0x270 [ 1219.286883] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.286895] ? vfs_write+0x354/0xb10 [ 1219.286915] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.286931] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.286950] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.286965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.286983] do_syscall_64+0x33/0x40 [ 1219.286997] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.287006] RIP: 0033:0x7fb1ac5e0b19 [ 1219.287020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.287028] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.287044] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1219.287052] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1219.287061] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.287069] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1219.287077] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1219.344303] FAULT_INJECTION: forcing a failure. [ 1219.344303] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.344319] CPU: 0 PID: 7730 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1219.344325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.344330] Call Trace: [ 1219.344349] dump_stack+0x107/0x167 [ 1219.344363] should_fail.cold+0x5/0xa [ 1219.344381] ? alloc_pipe_info+0x10a/0x590 [ 1219.344398] should_failslab+0x5/0x20 [ 1219.344413] kmem_cache_alloc_trace+0x55/0x320 [ 1219.344431] alloc_pipe_info+0x10a/0x590 [ 1219.344446] ? __lock_acquire+0xbb1/0x5b00 [ 1219.344463] splice_direct_to_actor+0x774/0x980 [ 1219.344480] ? _cond_resched+0x12/0x80 [ 1219.344494] ? inode_security+0x107/0x140 [ 1219.344565] ? pipe_to_sendpage+0x380/0x380 [ 1219.344580] ? avc_policy_seqno+0x9/0x70 [ 1219.344592] ? selinux_file_permission+0x92/0x520 [ 1219.344605] ? do_splice_to+0x160/0x160 [ 1219.344621] ? security_file_permission+0xb1/0xe0 [ 1219.344639] do_splice_direct+0x1c4/0x290 [ 1219.344651] ? splice_direct_to_actor+0x980/0x980 [ 1219.344661] ? avc_policy_seqno+0x9/0x70 [ 1219.344679] ? security_file_permission+0xb1/0xe0 [ 1219.344701] do_sendfile+0x553/0x11e0 [ 1219.344721] ? do_pwritev+0x270/0x270 [ 1219.344736] ? wait_for_completion_io+0x270/0x270 [ 1219.344752] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.344763] ? vfs_write+0x354/0xb10 [ 1219.344782] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.344797] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.344814] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.344826] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.344839] do_syscall_64+0x33/0x40 [ 1219.344850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.344858] RIP: 0033:0x7fbe22abab19 [ 1219.344870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.344876] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.344890] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1219.344897] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1219.344905] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.344914] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1219.344921] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1219.437081] FAULT_INJECTION: forcing a failure. [ 1219.437081] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.437096] CPU: 0 PID: 7740 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1219.437104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.437108] Call Trace: [ 1219.437129] dump_stack+0x107/0x167 [ 1219.437142] should_fail.cold+0x5/0xa [ 1219.437157] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1219.437172] should_failslab+0x5/0x20 [ 1219.437184] __kmalloc_node+0x76/0x420 [ 1219.437198] ? lock_downgrade+0x6d0/0x6d0 [ 1219.437212] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1219.437226] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1219.437238] ? trace_hardirqs_on+0x5b/0x180 [ 1219.437252] kmem_cache_alloc_trace+0x169/0x320 [ 1219.437269] alloc_pipe_info+0x10a/0x590 [ 1219.437279] ? __lock_acquire+0xbb1/0x5b00 [ 1219.437293] splice_direct_to_actor+0x774/0x980 [ 1219.437309] ? _cond_resched+0x12/0x80 [ 1219.437321] ? inode_security+0x107/0x140 [ 1219.437330] ? pipe_to_sendpage+0x380/0x380 [ 1219.437341] ? avc_policy_seqno+0x9/0x70 [ 1219.437352] ? selinux_file_permission+0x92/0x520 [ 1219.437363] ? do_splice_to+0x160/0x160 [ 1219.437376] ? security_file_permission+0xb1/0xe0 [ 1219.437392] do_splice_direct+0x1c4/0x290 [ 1219.437404] ? splice_direct_to_actor+0x980/0x980 [ 1219.437414] ? avc_policy_seqno+0x9/0x70 [ 1219.437430] ? security_file_permission+0xb1/0xe0 [ 1219.437448] do_sendfile+0x553/0x11e0 [ 1219.437467] ? do_pwritev+0x270/0x270 [ 1219.437481] ? wait_for_completion_io+0x270/0x270 [ 1219.437495] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.437505] ? vfs_write+0x354/0xb10 [ 1219.437521] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.437535] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.437549] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.437560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.437573] do_syscall_64+0x33/0x40 [ 1219.437584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.437592] RIP: 0033:0x7fad5ec00b19 [ 1219.437604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.437611] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.437624] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1219.437631] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1219.437638] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.437645] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1219.437652] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1219.440785] FAULT_INJECTION: forcing a failure. [ 1219.440785] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.440798] CPU: 1 PID: 7736 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1219.440804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1219.440808] Call Trace: [ 1219.440823] dump_stack+0x107/0x167 [ 1219.440835] should_fail.cold+0x5/0xa [ 1219.440848] ? create_object.isra.0+0x3a/0xa20 [ 1219.440860] should_failslab+0x5/0x20 [ 1219.440872] kmem_cache_alloc+0x5b/0x310 [ 1219.440886] create_object.isra.0+0x3a/0xa20 [ 1219.440898] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1219.440913] kmem_cache_alloc_trace+0x151/0x320 [ 1219.440930] alloc_pipe_info+0x10a/0x590 [ 1219.440940] ? __lock_acquire+0xbb1/0x5b00 [ 1219.440954] splice_direct_to_actor+0x774/0x980 [ 1219.440968] ? _cond_resched+0x12/0x80 [ 1219.440978] ? inode_security+0x107/0x140 [ 1219.440987] ? pipe_to_sendpage+0x380/0x380 [ 1219.440998] ? avc_policy_seqno+0x9/0x70 [ 1219.441007] ? selinux_file_permission+0x92/0x520 [ 1219.441018] ? do_splice_to+0x160/0x160 [ 1219.441031] ? security_file_permission+0xb1/0xe0 [ 1219.441047] do_splice_direct+0x1c4/0x290 [ 1219.441059] ? splice_direct_to_actor+0x980/0x980 [ 1219.441069] ? avc_policy_seqno+0x9/0x70 [ 1219.441085] ? security_file_permission+0xb1/0xe0 [ 1219.441101] do_sendfile+0x553/0x11e0 [ 1219.441124] ? do_pwritev+0x270/0x270 [ 1219.441137] ? wait_for_completion_io+0x270/0x270 [ 1219.441150] ? rcu_read_lock_any_held+0x75/0xa0 [ 1219.441160] ? vfs_write+0x354/0xb10 [ 1219.441175] __x64_sys_sendfile64+0x1d1/0x210 [ 1219.441188] ? __ia32_sys_sendfile+0x220/0x220 [ 1219.441201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1219.441212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1219.441224] do_syscall_64+0x33/0x40 [ 1219.441236] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1219.441244] RIP: 0033:0x7fbe22abab19 [ 1219.441257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.441263] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1219.441276] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1219.441282] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1219.441289] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1219.441296] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1219.441302] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1232.935007] FAULT_INJECTION: forcing a failure. [ 1232.935007] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.936091] CPU: 0 PID: 7755 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1232.936701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.937420] Call Trace: [ 1232.937669] dump_stack+0x107/0x167 [ 1232.938003] should_fail.cold+0x5/0xa [ 1232.938354] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1232.938835] should_failslab+0x5/0x20 [ 1232.939181] __kmalloc_node+0x76/0x420 [ 1232.939536] ? lock_downgrade+0x6d0/0x6d0 [ 1232.939916] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1232.940389] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1232.940834] ? trace_hardirqs_on+0x5b/0x180 [ 1232.941219] kmem_cache_alloc_trace+0x169/0x320 [ 1232.941636] alloc_pipe_info+0x10a/0x590 [ 1232.941994] ? __lock_acquire+0xbb1/0x5b00 [ 1232.942372] splice_direct_to_actor+0x774/0x980 [ 1232.942787] ? _cond_resched+0x12/0x80 [ 1232.943133] ? inode_security+0x107/0x140 [ 1232.943496] ? pipe_to_sendpage+0x380/0x380 [ 1232.943877] ? avc_policy_seqno+0x9/0x70 [ 1232.944235] ? selinux_file_permission+0x92/0x520 [ 1232.944711] ? do_splice_to+0x160/0x160 [ 1232.945090] ? security_file_permission+0xb1/0xe0 [ 1232.945556] do_splice_direct+0x1c4/0x290 [ 1232.945949] ? splice_direct_to_actor+0x980/0x980 [ 1232.946399] ? avc_policy_seqno+0x9/0x70 [ 1232.946787] ? security_file_permission+0xb1/0xe0 [ 1232.947251] do_sendfile+0x553/0x11e0 [ 1232.947623] ? do_pwritev+0x270/0x270 [ 1232.947985] ? wait_for_completion_io+0x270/0x270 [ 1232.948462] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.948904] ? vfs_write+0x354/0xb10 [ 1232.949270] __x64_sys_sendfile64+0x1d1/0x210 [ 1232.949702] ? __ia32_sys_sendfile+0x220/0x220 [ 1232.950143] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.950642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.951136] do_syscall_64+0x33/0x40 [ 1232.951494] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.951976] RIP: 0033:0x7fbe22abab19 [ 1232.952338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.954025] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1232.954729] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1232.955393] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1232.956049] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1232.956725] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1232.957390] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1232.980333] FAULT_INJECTION: forcing a failure. [ 1232.980333] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.981540] CPU: 0 PID: 7765 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1232.982175] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1232.982938] Call Trace: [ 1232.983196] dump_stack+0x107/0x167 [ 1232.983548] should_fail.cold+0x5/0xa [ 1232.983918] ? create_object.isra.0+0x3a/0xa20 [ 1232.984368] should_failslab+0x5/0x20 [ 1232.984740] kmem_cache_alloc+0x5b/0x310 [ 1232.985125] ? create_object.isra.0+0x3ad/0xa20 [ 1232.985577] create_object.isra.0+0x3a/0xa20 [ 1232.986001] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1232.986485] __kmalloc_node+0x1ae/0x420 [ 1232.986875] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1232.987361] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1232.987832] ? trace_hardirqs_on+0x5b/0x180 [ 1232.988251] kmem_cache_alloc_trace+0x169/0x320 [ 1232.988708] alloc_pipe_info+0x10a/0x590 [ 1232.989090] ? __lock_acquire+0xbb1/0x5b00 [ 1232.989497] splice_direct_to_actor+0x774/0x980 [ 1232.989940] ? _cond_resched+0x12/0x80 [ 1232.990308] ? inode_security+0x107/0x140 [ 1232.990698] ? pipe_to_sendpage+0x380/0x380 [ 1232.991109] ? avc_policy_seqno+0x9/0x70 [ 1232.991495] ? selinux_file_permission+0x92/0x520 [ 1232.991950] ? do_splice_to+0x160/0x160 [ 1232.992340] ? security_file_permission+0xb1/0xe0 [ 1232.992817] do_splice_direct+0x1c4/0x290 [ 1232.993216] ? splice_direct_to_actor+0x980/0x980 [ 1232.993671] ? avc_policy_seqno+0x9/0x70 [ 1232.994065] ? security_file_permission+0xb1/0xe0 [ 1232.994529] do_sendfile+0x553/0x11e0 [ 1232.994908] ? do_pwritev+0x270/0x270 [ 1232.995277] ? wait_for_completion_io+0x270/0x270 [ 1232.995736] ? rcu_read_lock_any_held+0x75/0xa0 [ 1232.996173] ? vfs_write+0x354/0xb10 [ 1232.996554] __x64_sys_sendfile64+0x1d1/0x210 [ 1232.996980] ? __ia32_sys_sendfile+0x220/0x220 [ 1232.997416] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1232.997912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1232.998400] do_syscall_64+0x33/0x40 [ 1232.998752] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1232.999228] RIP: 0033:0x7fad5ec00b19 [ 1232.999578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.001285] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1233.002003] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1233.002669] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1233.003338] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.004003] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1233.004687] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 21:09:13 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, 0x0, 0x0) 21:09:13 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8}, 0x1c) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_pts(0xffffffffffffffff, 0x10d940) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSBRK(r2, 0x5427) ioctl$TIOCNXCL(r1, 0x540d) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:09:13 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 3) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:09:13 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 50) 21:09:13 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 4) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:13 executing program 1: syz_io_uring_setup(0x3a75, &(0x7f0000000140)={0x0, 0x9c1b, 0x0, 0x4, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r2, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r2, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x1e, 0x100c0, 0x12345}, 0x6e2) shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) shmctl$IPC_RMID(0x0, 0x0) 21:09:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x8001, 0xffffffff, 0x7, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0xb) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xc1, 0x2, 0x40, 0x80, 0x0, 0x0, 0x3000b, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080), 0x6}, 0x80, 0x100, 0x2, 0x7, 0x100000001, 0xffffffff, 0x9, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:13 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x8000) r1 = syz_open_procfs(0x0, &(0x7f0000002340)='net/ptype\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) dup(r1) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/9, 0x9}, {&(0x7f0000000100)=""/10, 0xa}, {&(0x7f0000000140)=""/127, 0x7f}, {&(0x7f00000012c0)=""/4096, 0x1000}], 0x5, 0x4, 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x60, r3, 0x10, 0x70bd29, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000002480)={&(0x7f0000002300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002440)={&(0x7f0000002380)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fedbdf253e0000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263655f6d61635f69735f6d756c7469636173740005008300000000000e0081006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263655f6d61635f69735f6d756c746963617374000500830000000000"], 0x9c}, 0x1, 0x0, 0x0, 0x80}, 0x3f2704c8d4efffc1) openat(r1, &(0x7f00000022c0)='./file0\x00', 0x400000, 0x122) 21:09:13 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x5, 0x1000}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:13 executing program 0: ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x9}, 0x10020, 0x0, 0xffffffff, 0x3, 0x82bc, 0x80000000, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x4, 0x4c2, 0x8, 0x3c, 0xb, "fdc54cef57725a9e"}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000080)={'caif0\x00'}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1233.041058] FAULT_INJECTION: forcing a failure. [ 1233.041058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1233.042177] CPU: 1 PID: 7772 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1233.042798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1233.043574] Call Trace: [ 1233.043826] dump_stack+0x107/0x167 [ 1233.044178] should_fail.cold+0x5/0xa [ 1233.048562] __alloc_pages_nodemask+0x182/0x600 [ 1233.048999] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1233.049553] ? do_syscall_64+0x33/0x40 [ 1233.049928] ? __unwind_start+0x523/0x7e0 [ 1233.050317] alloc_pages_current+0x187/0x280 [ 1233.050741] ? lock_acquire+0x197/0x470 [ 1233.051097] push_pipe+0x2b5/0x6d0 [ 1233.051406] iov_iter_get_pages+0x6b4/0xf40 [ 1233.051804] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1233.052272] bio_iov_iter_get_pages+0x22a/0x1200 [ 1233.052741] ? bvec_alloc+0x17e/0x2f0 [ 1233.053103] ? bio_alloc_bioset+0x2a1/0x600 [ 1233.053499] ? bio_add_pc_page+0x100/0x100 [ 1233.053906] ? bvec_alloc+0x210/0x2f0 [ 1233.054264] ? iov_iter_npages+0x1fd/0xa70 [ 1233.054665] iomap_dio_bio_actor+0x77a/0xef0 [ 1233.055104] iomap_dio_actor+0x36f/0x560 [ 1233.055489] iomap_apply+0x289/0x810 [ 1233.055836] ? iomap_dio_rw+0x90/0x90 [ 1233.056207] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1233.056762] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1233.057259] ? mark_held_locks+0x9e/0xe0 [ 1233.057645] ? filemap_check_errors+0xa5/0x150 [ 1233.058082] __iomap_dio_rw+0x6cd/0x1110 [ 1233.058474] ? iomap_dio_rw+0x90/0x90 [ 1233.058841] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1233.059272] ? down_read+0x10f/0x430 [ 1233.059629] ? down_write+0x160/0x160 [ 1233.059990] iomap_dio_rw+0x31/0x90 [ 1233.060341] ext4_file_read_iter+0x2c7/0x4c0 [ 1233.060772] generic_file_splice_read+0x455/0x6d0 [ 1233.061214] ? pipe_to_user+0x170/0x170 [ 1233.061607] ? fsnotify_perm.part.0+0x22d/0x620 [ 1233.062041] ? security_file_permission+0xb1/0xe0 [ 1233.062487] ? pipe_to_user+0x170/0x170 [ 1233.062870] do_splice_to+0x10e/0x160 [ 1233.063229] splice_direct_to_actor+0x2fe/0x980 [ 1233.063665] ? pipe_to_sendpage+0x380/0x380 [ 1233.064079] ? do_splice_to+0x160/0x160 [ 1233.064468] ? security_file_permission+0xb1/0xe0 [ 1233.064930] do_splice_direct+0x1c4/0x290 [ 1233.065319] ? splice_direct_to_actor+0x980/0x980 [ 1233.065760] ? avc_policy_seqno+0x9/0x70 [ 1233.066145] ? security_file_permission+0xb1/0xe0 [ 1233.066602] do_sendfile+0x553/0x11e0 [ 1233.066966] ? do_pwritev+0x270/0x270 [ 1233.067324] ? wait_for_completion_io+0x270/0x270 [ 1233.067770] ? rcu_read_lock_any_held+0x75/0xa0 [ 1233.068193] ? vfs_write+0x354/0xb10 [ 1233.068566] __x64_sys_sendfile64+0x1d1/0x210 [ 1233.068985] ? __ia32_sys_sendfile+0x220/0x220 [ 1233.069413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1233.069913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1233.070397] do_syscall_64+0x33/0x40 [ 1233.070744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1233.071215] RIP: 0033:0x7fb1ac5e0b19 [ 1233.071567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.077232] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1233.077924] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1233.078579] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1233.079234] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1233.079879] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1233.080558] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:09:13 executing program 6: r0 = fork() r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) sched_setaffinity(r0, 0x8, &(0x7f0000000980)=0x1) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="ba0000000000002e2f66696c65310000", @ANYBLOB="9ccad84cb242367b914cd94ebf7cbfc3047c9db3cf349b91db0cfc3ebf5d55a828d0145f7b7eebb48026ae07c6a0b57b511d39c7768fbe005174309d9056867dd1e7e1d4aebb58773a0ef8750e9764d44ded715d9ec31c7370e07292105d19883c", @ANYRESOCT=r0]) kcmp(r4, 0x0, 0x0, r5, r6) r7 = syz_open_procfs(r4, &(0x7f0000000040)='net/route\x00') setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x6, 0x7f4, [0x0, 0x20000100, 0x20000374, 0x2000052a], 0x0, &(0x7f0000000000), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x86c) pread64(r7, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:09:13 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x6, &(0x7f00007fd000/0x800000)=nil, 0x5) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1245.815611] FAULT_INJECTION: forcing a failure. [ 1245.815611] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.816731] CPU: 0 PID: 7807 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1245.817325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.818044] Call Trace: [ 1245.818284] dump_stack+0x107/0x167 [ 1245.818607] should_fail.cold+0x5/0xa [ 1245.818947] ? __iomap_dio_rw+0x1ee/0x1110 [ 1245.819323] should_failslab+0x5/0x20 [ 1245.819660] kmem_cache_alloc_trace+0x55/0x320 [ 1245.820066] __iomap_dio_rw+0x1ee/0x1110 [ 1245.820430] ? lock_release+0x680/0x680 [ 1245.820809] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1245.821222] ? down_read+0x10f/0x430 [ 1245.821551] ? down_write+0x160/0x160 [ 1245.821894] iomap_dio_rw+0x31/0x90 [ 1245.822219] ext4_file_read_iter+0x2c7/0x4c0 [ 1245.822611] generic_file_splice_read+0x455/0x6d0 [ 1245.823036] ? pipe_to_user+0x170/0x170 [ 1245.823395] ? fsnotify_perm.part.0+0x22d/0x620 [ 1245.823809] ? security_file_permission+0xb1/0xe0 [ 1245.824234] ? pipe_to_user+0x170/0x170 [ 1245.828611] do_splice_to+0x10e/0x160 [ 1245.828945] splice_direct_to_actor+0x2fe/0x980 [ 1245.829354] ? pipe_to_sendpage+0x380/0x380 [ 1245.829733] ? do_splice_to+0x160/0x160 [ 1245.830081] ? security_file_permission+0xb1/0xe0 [ 1245.830510] do_splice_direct+0x1c4/0x290 [ 1245.830871] ? splice_direct_to_actor+0x980/0x980 [ 1245.831295] ? avc_policy_seqno+0x9/0x70 [ 1245.831379] FAULT_INJECTION: forcing a failure. [ 1245.831379] name failslab, interval 1, probability 0, space 0, times 0 [ 1245.831653] ? security_file_permission+0xb1/0xe0 [ 1245.833029] do_sendfile+0x553/0x11e0 [ 1245.833371] ? do_pwritev+0x270/0x270 [ 1245.833706] ? wait_for_completion_io+0x270/0x270 [ 1245.834129] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.834534] ? vfs_write+0x354/0xb10 [ 1245.834864] __x64_sys_sendfile64+0x1d1/0x210 [ 1245.835256] ? __ia32_sys_sendfile+0x220/0x220 [ 1245.835655] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.836110] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.836570] do_syscall_64+0x33/0x40 [ 1245.836899] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1245.837349] RIP: 0033:0x7fad5ec00b19 [ 1245.837675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.839262] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1245.839922] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1245.840560] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1245.841178] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.841790] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1245.842405] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1245.843044] CPU: 1 PID: 7814 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1245.843628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:09:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xd}, 0x10, 0x0, 0xffffffff, 0x7, 0x800000000000000, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 51) 21:09:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 5) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:26 executing program 6: sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="20fcff000d0a04020000000000000000070000070900010073797a3000000000"], 0x20}, 0x1, 0x0, 0x0, 0x8051}, 0x800) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:09:26 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000080)) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x2, 0xf, 0x7c, 0x7, 0x0, 0x100000001, 0x20300, 0x63b6ad8e60660d48, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x1, 0xbfce, 0xc8fa, 0x6, 0x400, 0x2, 0x22, 0x0, 0x81, 0x0, 0x6}, 0xffffffffffffffff, 0xd, r0, 0x5) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:09:26 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pread64(r1, &(0x7f0000000080)=""/83, 0x53, 0x200080048) 21:09:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 4) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:09:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, 0x0, 0x0) [ 1245.844329] Call Trace: [ 1245.852746] dump_stack+0x107/0x167 [ 1245.853061] should_fail.cold+0x5/0xa [ 1245.853382] ? create_object.isra.0+0x3a/0xa20 [ 1245.853767] should_failslab+0x5/0x20 [ 1245.854087] kmem_cache_alloc+0x5b/0x310 [ 1245.854431] create_object.isra.0+0x3a/0xa20 [ 1245.854801] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1245.855227] __kmalloc+0x16e/0x390 [ 1245.855532] alloc_pipe_info+0x1e5/0x590 [ 1245.855871] ? __lock_acquire+0xbb1/0x5b00 [ 1245.856229] splice_direct_to_actor+0x774/0x980 [ 1245.856641] ? _cond_resched+0x12/0x80 [ 1245.856971] ? inode_security+0x107/0x140 [ 1245.857318] ? pipe_to_sendpage+0x380/0x380 [ 1245.857680] ? avc_policy_seqno+0x9/0x70 [ 1245.858021] ? selinux_file_permission+0x92/0x520 [ 1245.858425] ? do_splice_to+0x160/0x160 [ 1245.858766] ? security_file_permission+0xb1/0xe0 [ 1245.859177] do_splice_direct+0x1c4/0x290 [ 1245.859526] ? splice_direct_to_actor+0x980/0x980 [ 1245.859928] ? avc_policy_seqno+0x9/0x70 [ 1245.860281] ? security_file_permission+0xb1/0xe0 [ 1245.860716] do_sendfile+0x553/0x11e0 [ 1245.861048] ? do_pwritev+0x270/0x270 [ 1245.861371] ? wait_for_completion_io+0x270/0x270 [ 1245.861778] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.862167] ? vfs_write+0x354/0xb10 [ 1245.862486] __x64_sys_sendfile64+0x1d1/0x210 [ 1245.862864] ? __ia32_sys_sendfile+0x220/0x220 [ 1245.863251] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.863689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.864121] do_syscall_64+0x33/0x40 [ 1245.864434] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1245.864882] RIP: 0033:0x7fbe22abab19 [ 1245.865195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.866731] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1245.867367] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1245.867961] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1245.868564] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.869160] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1245.869755] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1245.880084] FAULT_INJECTION: forcing a failure. 21:09:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 6) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1245.880084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1245.881161] CPU: 1 PID: 7810 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1245.881735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.882431] Call Trace: [ 1245.882657] dump_stack+0x107/0x167 [ 1245.882969] should_fail.cold+0x5/0xa [ 1245.883297] __alloc_pages_nodemask+0x182/0x600 [ 1245.883694] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1245.884205] ? do_syscall_64+0x33/0x40 [ 1245.884554] ? __unwind_start+0x523/0x7e0 [ 1245.884913] alloc_pages_current+0x187/0x280 [ 1245.885285] ? lock_acquire+0x197/0x470 [ 1245.885624] push_pipe+0x2b5/0x6d0 [ 1245.885933] iov_iter_get_pages+0x6b4/0xf40 [ 1245.886303] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1245.886727] bio_iov_iter_get_pages+0x22a/0x1200 [ 1245.887132] ? bvec_alloc+0x17e/0x2f0 [ 1245.887457] ? bio_alloc_bioset+0x2a1/0x600 [ 1245.887821] ? bio_add_pc_page+0x100/0x100 [ 1245.888183] ? bvec_alloc+0x210/0x2f0 [ 1245.888514] ? iov_iter_npages+0x1fd/0xa70 [ 1245.888894] iomap_dio_bio_actor+0x77a/0xef0 [ 1245.889279] iomap_dio_actor+0x36f/0x560 [ 1245.889636] iomap_apply+0x289/0x810 [ 1245.889963] ? iomap_dio_rw+0x90/0x90 [ 1245.890299] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1245.890805] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1245.891270] ? mark_held_locks+0x9e/0xe0 [ 1245.891637] ? filemap_check_errors+0xa5/0x150 [ 1245.892039] __iomap_dio_rw+0x6cd/0x1110 [ 1245.892391] ? iomap_dio_rw+0x90/0x90 [ 1245.892757] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1245.893152] ? down_read+0x10f/0x430 [ 1245.893469] ? down_write+0x160/0x160 [ 1245.893804] iomap_dio_rw+0x31/0x90 [ 1245.894116] ext4_file_read_iter+0x2c7/0x4c0 [ 1245.894495] generic_file_splice_read+0x455/0x6d0 [ 1245.894904] ? pipe_to_user+0x170/0x170 [ 1245.895248] ? fsnotify_perm.part.0+0x22d/0x620 [ 1245.895646] ? security_file_permission+0xb1/0xe0 [ 1245.896054] ? pipe_to_user+0x170/0x170 [ 1245.896392] do_splice_to+0x10e/0x160 [ 1245.896747] splice_direct_to_actor+0x2fe/0x980 [ 1245.897150] ? pipe_to_sendpage+0x380/0x380 [ 1245.897520] ? do_splice_to+0x160/0x160 [ 1245.897859] ? security_file_permission+0xb1/0xe0 [ 1245.898274] do_splice_direct+0x1c4/0x290 [ 1245.898626] ? splice_direct_to_actor+0x980/0x980 [ 1245.899031] ? avc_policy_seqno+0x9/0x70 [ 1245.899384] ? security_file_permission+0xb1/0xe0 [ 1245.899800] do_sendfile+0x553/0x11e0 [ 1245.900147] ? do_pwritev+0x270/0x270 [ 1245.900474] ? wait_for_completion_io+0x270/0x270 [ 1245.900903] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.901294] ? vfs_write+0x354/0xb10 [ 1245.901616] __x64_sys_sendfile64+0x1d1/0x210 [ 1245.901996] ? __ia32_sys_sendfile+0x220/0x220 [ 1245.902386] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.902827] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.903268] do_syscall_64+0x33/0x40 [ 1245.903583] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1245.904014] RIP: 0033:0x7fb1ac5e0b19 [ 1245.904331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.905888] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1245.906528] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1245.907124] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1245.907721] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.908317] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1245.908935] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 21:09:26 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r3, @ANYBLOB='\b\x00%'], 0x2c}}, 0x0) pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:09:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x9, 0x204, 0x406}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f00000001c0)={0x5, &(0x7f0000000540)=[{0x83a8, 0xd8, &(0x7f00000000c0)="18b9f388325de3a2c63fbd15e761a1763a4403ef226d8b2fe6d95e9daa66d3b626a2a759f99311fbc7b39f15ea36cbae2595f9cf757399e0cc907d9357d0fe06c212a70c5049002fd74b18a3e03888e7923a2bb86a0c772361c535f571e63bd105bd892577b95b6b09f709daefb7e8fe1159e87a75756570fef870ce5f95b9eb75d2cd4789f2efcf0b58971ff1633b7c48ddd5919325cca02314bd6e0ba49d3e62a4c1766ca8cd5f42b28bcef3e4398422f58847ba8b158978ec5acb8aebbb4a03e4b4a1b5582829349127f95703a164f7cd0dcf49f8c920"}, {0x81, 0x26, &(0x7f0000000000)="c2349c8460ad55612e7f9f1f3e5bfd042ad9fe574995d8280a2882882a833673e58b0ca75556", 0x1, 0x1}, {0x7, 0xd2, &(0x7f00000002c0)="d9386dea862fc95109cdf7b887ad62187c53c573e10be2eb0cf08040c888399bed00575b484e5e8d49c7463ec53e7fa63f8c74e736505132cf44c195130707799078c5340e49aafe85cf7dd83d3b8d354c1f5b52510096b498969fbf525a3d10de7cd500faaa5c0287157e2c5fbac0b20f82ebf6ddb2044520c87352cca6da194d844420ba331ff3825e75f81930507fe1d72fad2db31b0bd27bef7195ac50e8fc6a84d19ad2a499d0f2a5ea268ed0e61a17651f73505dfce168b277926757260c9498705cdea8dc018e3ccc3ab1c70f442a"}, {0xaf7, 0xab, &(0x7f00000003c0)="c2809e6b016ae868b85114c6fb56ed69c372e2aaa3a0ebf3c8269ce21a5e6b289eed691d83ead92b5a2b14c6a59c395d1c7c656a48680988fa4f6ff7bb7f5bc3b5a43b1e5248f80f87d78b8caa57b2a11e98aa93fe7e26d12e62e3477f5746687068ad34d496837eaafb68a8f0cabdc92330b7362d6ca8dc75e7a160ec73c102ac4a93a8b0604a3fd53d9009be0412cfd0701df5e254a6fbc0b68bbfb9d29593032efb0574f7138cf6acde", 0x0, 0x1}, {0x3, 0x85, &(0x7f0000000480)="6439e60dc46c4c10480a09ceea16b886238ad18fea3366fd424cccecc14a9784ca92a254726d02f003757c24a3f93a4555644da7cfd69905e10748047633e61ed2383cc87da5f27d0cb4f57a574334433ccf10fe3ba20a79cb0ad4d73213ec202a3d47112b78f7e8e5333d00674ece8f3ba118b919fd77d754d7696e2b3d247eaf1d4d1cad", 0x0, 0x1}]}) [ 1245.932285] FAULT_INJECTION: forcing a failure. [ 1245.932285] name failslab, interval 1, probability 0, space 0, times 0 21:09:26 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0xffffffffffffffff, &(0x7f0000866000/0x2000)=nil, 0x5000) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 7) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:26 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 5) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1245.932298] CPU: 1 PID: 7822 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1245.932305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1245.932308] Call Trace: [ 1245.932322] dump_stack+0x107/0x167 [ 1245.932334] should_fail.cold+0x5/0xa [ 1245.932348] ? create_object.isra.0+0x3a/0xa20 [ 1245.932362] should_failslab+0x5/0x20 [ 1245.932375] kmem_cache_alloc+0x5b/0x310 [ 1245.932392] create_object.isra.0+0x3a/0xa20 [ 1245.932405] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1245.932420] kmem_cache_alloc_trace+0x151/0x320 [ 1245.932438] __iomap_dio_rw+0x1ee/0x1110 [ 1245.932454] ? lock_release+0x680/0x680 [ 1245.932471] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1245.932491] ? down_read+0x10f/0x430 [ 1245.932503] ? down_write+0x160/0x160 [ 1245.932527] iomap_dio_rw+0x31/0x90 [ 1245.932541] ext4_file_read_iter+0x2c7/0x4c0 [ 1245.932556] generic_file_splice_read+0x455/0x6d0 [ 1245.932569] ? pipe_to_user+0x170/0x170 [ 1245.932587] ? fsnotify_perm.part.0+0x22d/0x620 [ 1245.932605] ? security_file_permission+0xb1/0xe0 [ 1245.932618] ? pipe_to_user+0x170/0x170 [ 1245.932631] do_splice_to+0x10e/0x160 [ 1245.932645] splice_direct_to_actor+0x2fe/0x980 [ 1245.932660] ? pipe_to_sendpage+0x380/0x380 [ 1245.932675] ? do_splice_to+0x160/0x160 [ 1245.932688] ? security_file_permission+0xb1/0xe0 [ 1245.932706] do_splice_direct+0x1c4/0x290 [ 1245.932718] ? splice_direct_to_actor+0x980/0x980 21:09:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 52) [ 1245.932728] ? avc_policy_seqno+0x9/0x70 [ 1245.932746] ? security_file_permission+0xb1/0xe0 [ 1245.932764] do_sendfile+0x553/0x11e0 [ 1245.933308] ? do_pwritev+0x270/0x270 [ 1245.933323] ? wait_for_completion_io+0x270/0x270 [ 1245.933337] ? rcu_read_lock_any_held+0x75/0xa0 [ 1245.933348] ? vfs_write+0x354/0xb10 21:09:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) [ 1245.933364] __x64_sys_sendfile64+0x1d1/0x210 [ 1245.933379] ? __ia32_sys_sendfile+0x220/0x220 [ 1245.933393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1245.933404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1245.933418] do_syscall_64+0x33/0x40 [ 1245.933429] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1245.933437] RIP: 0033:0x7fad5ec00b19 21:09:26 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) read$usbmon(r2, &(0x7f0000000180)=""/79, 0x4f) openat(r1, &(0x7f0000000100)='./file0\x00', 0x400000, 0x18) [ 1245.933448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1245.933455] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1245.933468] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1245.933475] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1245.933482] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1245.933489] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1245.933496] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 21:09:26 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0x0, 0x2000, 0x80, &(0x7f0000866000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) shmget(0x3, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1246.018811] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1246.028782] FAULT_INJECTION: forcing a failure. [ 1246.028782] name failslab, interval 1, probability 0, space 0, times 0 21:09:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) [ 1246.028796] CPU: 1 PID: 7828 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1246.028803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.028807] Call Trace: [ 1246.028825] dump_stack+0x107/0x167 [ 1246.028838] should_fail.cold+0x5/0xa [ 1246.028854] ? __iomap_dio_rw+0x1ee/0x1110 [ 1246.028869] should_failslab+0x5/0x20 [ 1246.028884] kmem_cache_alloc_trace+0x55/0x320 [ 1246.028900] __iomap_dio_rw+0x1ee/0x1110 [ 1246.028918] ? lock_release+0x680/0x680 [ 1246.028935] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1246.028958] ? down_read+0x10f/0x430 [ 1246.028971] ? down_write+0x160/0x160 [ 1246.028989] iomap_dio_rw+0x31/0x90 [ 1246.029003] ext4_file_read_iter+0x2c7/0x4c0 [ 1246.029019] generic_file_splice_read+0x455/0x6d0 [ 1246.029031] ? pipe_to_user+0x170/0x170 [ 1246.029051] ? fsnotify_perm.part.0+0x22d/0x620 [ 1246.029068] ? security_file_permission+0xb1/0xe0 [ 1246.029082] ? pipe_to_user+0x170/0x170 [ 1246.029095] do_splice_to+0x10e/0x160 [ 1246.029113] splice_direct_to_actor+0x2fe/0x980 [ 1246.029128] ? pipe_to_sendpage+0x380/0x380 [ 1246.029142] ? do_splice_to+0x160/0x160 [ 1246.029156] ? security_file_permission+0xb1/0xe0 [ 1246.029176] do_splice_direct+0x1c4/0x290 [ 1246.029190] ? splice_direct_to_actor+0x980/0x980 [ 1246.029204] ? avc_policy_seqno+0x9/0x70 [ 1246.029226] ? security_file_permission+0xb1/0xe0 [ 1246.029246] do_sendfile+0x553/0x11e0 [ 1246.029266] ? do_pwritev+0x270/0x270 [ 1246.029281] ? wait_for_completion_io+0x270/0x270 [ 1246.029296] ? rcu_read_lock_any_held+0x75/0xa0 [ 1246.029310] ? vfs_write+0x354/0xb10 [ 1246.029330] __x64_sys_sendfile64+0x1d1/0x210 [ 1246.029345] ? __ia32_sys_sendfile+0x220/0x220 [ 1246.029360] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.029375] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.029388] do_syscall_64+0x33/0x40 [ 1246.029402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.029412] RIP: 0033:0x7fad5ec00b19 [ 1246.029426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.029436] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1246.029455] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1246.029465] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1246.029475] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1246.029485] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1246.029495] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1246.030526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1246.076321] FAULT_INJECTION: forcing a failure. [ 1246.076321] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.076334] CPU: 0 PID: 7837 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1246.076341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.076346] Call Trace: [ 1246.076362] dump_stack+0x107/0x167 [ 1246.076375] should_fail.cold+0x5/0xa [ 1246.076395] ? alloc_pipe_info+0x1e5/0x590 [ 1246.076409] should_failslab+0x5/0x20 [ 1246.076421] __kmalloc+0x72/0x390 [ 1246.076434] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1246.076449] alloc_pipe_info+0x1e5/0x590 [ 1246.076462] ? __lock_acquire+0xbb1/0x5b00 [ 1246.076477] splice_direct_to_actor+0x774/0x980 [ 1246.076492] ? _cond_resched+0x12/0x80 [ 1246.076504] ? inode_security+0x107/0x140 [ 1246.076524] ? pipe_to_sendpage+0x380/0x380 [ 1246.076536] ? avc_policy_seqno+0x9/0x70 [ 1246.076547] ? selinux_file_permission+0x92/0x520 [ 1246.076558] ? do_splice_to+0x160/0x160 [ 1246.076573] ? security_file_permission+0xb1/0xe0 [ 1246.076589] do_splice_direct+0x1c4/0x290 [ 1246.076601] ? splice_direct_to_actor+0x980/0x980 [ 1246.076611] ? avc_policy_seqno+0x9/0x70 [ 1246.076629] ? security_file_permission+0xb1/0xe0 [ 1246.076647] do_sendfile+0x553/0x11e0 [ 1246.076665] ? do_pwritev+0x270/0x270 [ 1246.076679] ? wait_for_completion_io+0x270/0x270 [ 1246.076694] ? rcu_read_lock_any_held+0x75/0xa0 [ 1246.076704] ? vfs_write+0x354/0xb10 [ 1246.076720] __x64_sys_sendfile64+0x1d1/0x210 [ 1246.076733] ? __ia32_sys_sendfile+0x220/0x220 [ 1246.076748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.076759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.076773] do_syscall_64+0x33/0x40 [ 1246.076785] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.076793] RIP: 0033:0x7fbe22abab19 [ 1246.076805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.076812] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1246.076825] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1246.076833] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1246.076840] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1246.076847] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1246.076854] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1246.121316] FAULT_INJECTION: forcing a failure. [ 1246.121316] name failslab, interval 1, probability 0, space 0, times 0 [ 1246.121330] CPU: 1 PID: 7840 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1246.121337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.121341] Call Trace: [ 1246.121357] dump_stack+0x107/0x167 [ 1246.121370] should_fail.cold+0x5/0xa [ 1246.121385] ? create_object.isra.0+0x3a/0xa20 [ 1246.121400] should_failslab+0x5/0x20 [ 1246.121412] kmem_cache_alloc+0x5b/0x310 [ 1246.121428] create_object.isra.0+0x3a/0xa20 [ 1246.121440] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1246.121456] kmem_cache_alloc_trace+0x151/0x320 [ 1246.121474] __iomap_dio_rw+0x1ee/0x1110 [ 1246.121491] ? lock_release+0x680/0x680 [ 1246.121509] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1246.121531] ? down_read+0x10f/0x430 [ 1246.121547] ? down_write+0x160/0x160 [ 1246.121567] iomap_dio_rw+0x31/0x90 [ 1246.121582] ext4_file_read_iter+0x2c7/0x4c0 [ 1246.121598] generic_file_splice_read+0x455/0x6d0 [ 1246.121610] ? pipe_to_user+0x170/0x170 [ 1246.121630] ? fsnotify_perm.part.0+0x22d/0x620 [ 1246.121647] ? security_file_permission+0xb1/0xe0 [ 1246.121664] ? pipe_to_user+0x170/0x170 [ 1246.121676] do_splice_to+0x10e/0x160 [ 1246.121690] splice_direct_to_actor+0x2fe/0x980 [ 1246.121705] ? pipe_to_sendpage+0x380/0x380 [ 1246.121720] ? do_splice_to+0x160/0x160 [ 1246.121733] ? security_file_permission+0xb1/0xe0 [ 1246.121751] do_splice_direct+0x1c4/0x290 [ 1246.121763] ? splice_direct_to_actor+0x980/0x980 [ 1246.121774] ? avc_policy_seqno+0x9/0x70 [ 1246.121791] ? security_file_permission+0xb1/0xe0 [ 1246.121812] do_sendfile+0x553/0x11e0 [ 1246.121832] ? do_pwritev+0x270/0x270 [ 1246.121846] ? wait_for_completion_io+0x270/0x270 [ 1246.121861] ? rcu_read_lock_any_held+0x75/0xa0 [ 1246.121872] ? vfs_write+0x354/0xb10 [ 1246.121889] __x64_sys_sendfile64+0x1d1/0x210 [ 1246.121903] ? __ia32_sys_sendfile+0x220/0x220 [ 1246.121918] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.121930] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.121943] do_syscall_64+0x33/0x40 [ 1246.121955] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.121963] RIP: 0033:0x7fad5ec00b19 [ 1246.121975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.121982] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1246.121995] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1246.122003] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1246.122010] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1246.122017] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1246.122025] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1246.152684] FAULT_INJECTION: forcing a failure. [ 1246.152684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1246.152697] CPU: 1 PID: 7842 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1246.152705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1246.152709] Call Trace: [ 1246.152723] dump_stack+0x107/0x167 [ 1246.152737] should_fail.cold+0x5/0xa [ 1246.152753] __alloc_pages_nodemask+0x182/0x600 [ 1246.152768] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1246.152778] ? do_syscall_64+0x33/0x40 [ 1246.152799] ? __unwind_start+0x523/0x7e0 [ 1246.152815] alloc_pages_current+0x187/0x280 [ 1246.152827] ? lock_acquire+0x197/0x470 [ 1246.152841] push_pipe+0x2b5/0x6d0 [ 1246.152858] iov_iter_get_pages+0x6b4/0xf40 [ 1246.152874] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1246.152895] bio_iov_iter_get_pages+0x22a/0x1200 [ 1246.152911] ? bvec_alloc+0x17e/0x2f0 [ 1246.152924] ? bio_alloc_bioset+0x2a1/0x600 [ 1246.152935] ? bio_add_pc_page+0x100/0x100 [ 1246.152947] ? bvec_alloc+0x210/0x2f0 [ 1246.152961] ? iov_iter_npages+0x1fd/0xa70 [ 1246.152977] iomap_dio_bio_actor+0x77a/0xef0 [ 1246.153001] iomap_dio_actor+0x36f/0x560 [ 1246.153017] iomap_apply+0x289/0x810 [ 1246.153029] ? iomap_dio_rw+0x90/0x90 [ 1246.153044] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1246.153068] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1246.153081] ? mark_held_locks+0x9e/0xe0 [ 1246.153108] ? filemap_check_errors+0xa5/0x150 [ 1246.153126] __iomap_dio_rw+0x6cd/0x1110 [ 1246.153138] ? iomap_dio_rw+0x90/0x90 [ 1246.153167] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1246.153191] ? down_read+0x10f/0x430 [ 1246.153206] ? down_write+0x160/0x160 [ 1246.153224] iomap_dio_rw+0x31/0x90 [ 1246.153241] ext4_file_read_iter+0x2c7/0x4c0 [ 1246.153258] generic_file_splice_read+0x455/0x6d0 [ 1246.153272] ? pipe_to_user+0x170/0x170 [ 1246.153294] ? fsnotify_perm.part.0+0x22d/0x620 [ 1246.153314] ? security_file_permission+0xb1/0xe0 [ 1246.153329] ? pipe_to_user+0x170/0x170 [ 1246.153343] do_splice_to+0x10e/0x160 [ 1246.153359] splice_direct_to_actor+0x2fe/0x980 [ 1246.153377] ? pipe_to_sendpage+0x380/0x380 [ 1246.153393] ? do_splice_to+0x160/0x160 [ 1246.153409] ? security_file_permission+0xb1/0xe0 [ 1246.153429] do_splice_direct+0x1c4/0x290 [ 1246.153441] ? splice_direct_to_actor+0x980/0x980 [ 1246.153451] ? avc_policy_seqno+0x9/0x70 [ 1246.153468] ? security_file_permission+0xb1/0xe0 [ 1246.153487] do_sendfile+0x553/0x11e0 [ 1246.153506] ? do_pwritev+0x270/0x270 [ 1246.153519] ? wait_for_completion_io+0x270/0x270 [ 1246.153534] ? rcu_read_lock_any_held+0x75/0xa0 [ 1246.153544] ? vfs_write+0x354/0xb10 [ 1246.153560] __x64_sys_sendfile64+0x1d1/0x210 [ 1246.153574] ? __ia32_sys_sendfile+0x220/0x220 [ 1246.153588] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1246.153602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1246.153616] do_syscall_64+0x33/0x40 [ 1246.153628] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1246.153636] RIP: 0033:0x7fb1ac5e0b19 [ 1246.153648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1246.153655] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1246.153668] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1246.153676] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1246.153683] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1246.153689] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1246.153697] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1258.934483] FAULT_INJECTION: forcing a failure. [ 1258.934483] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.934500] CPU: 1 PID: 7864 Comm: syz-executor.3 Not tainted 5.10.225 #1 [ 1258.934507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1258.934511] Call Trace: [ 1258.934529] dump_stack+0x107/0x167 [ 1258.934543] should_fail.cold+0x5/0xa [ 1258.934558] ? mempool_alloc+0x148/0x360 [ 1258.934569] ? mempool_free_pages+0x20/0x20 [ 1258.934583] should_failslab+0x5/0x20 [ 1258.934596] kmem_cache_alloc+0x5b/0x310 [ 1258.934610] ? mempool_free_pages+0x20/0x20 [ 1258.934621] mempool_alloc+0x148/0x360 [ 1258.934638] ? mempool_resize+0x7d0/0x7d0 [ 1258.934651] ? lock_downgrade+0x6d0/0x6d0 [ 1258.934664] ? ext4_map_blocks+0x87c/0x1910 [ 1258.934690] bio_alloc_bioset+0x36e/0x600 [ 1258.934704] ? bvec_alloc+0x2f0/0x2f0 [ 1258.934719] ? iov_iter_npages+0x1fd/0xa70 [ 1258.934737] iomap_dio_bio_actor+0x518/0xef0 [ 1258.934760] iomap_dio_actor+0x36f/0x560 [ 1258.934778] iomap_apply+0x289/0x810 [ 1258.934791] ? iomap_dio_rw+0x90/0x90 [ 1258.934805] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1258.934825] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1258.934836] ? mark_held_locks+0x9e/0xe0 [ 1258.934859] ? filemap_check_errors+0xa5/0x150 [ 1258.934874] __iomap_dio_rw+0x6cd/0x1110 [ 1258.934884] ? iomap_dio_rw+0x90/0x90 [ 1258.934909] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1258.934930] ? down_read+0x10f/0x430 [ 1258.934942] ? down_write+0x160/0x160 [ 1258.934958] iomap_dio_rw+0x31/0x90 [ 1258.934972] ext4_file_read_iter+0x2c7/0x4c0 [ 1258.934987] generic_file_splice_read+0x455/0x6d0 [ 1258.935000] ? pipe_to_user+0x170/0x170 [ 1258.935020] ? fsnotify_perm.part.0+0x22d/0x620 [ 1258.935037] ? security_file_permission+0xb1/0xe0 [ 1258.935051] ? pipe_to_user+0x170/0x170 [ 1258.935064] do_splice_to+0x10e/0x160 [ 1258.935078] splice_direct_to_actor+0x2fe/0x980 [ 1258.935093] ? pipe_to_sendpage+0x380/0x380 [ 1258.935111] ? do_splice_to+0x160/0x160 [ 1258.935125] ? security_file_permission+0xb1/0xe0 [ 1258.935142] do_splice_direct+0x1c4/0x290 [ 1258.935154] ? splice_direct_to_actor+0x980/0x980 [ 1258.935165] ? avc_policy_seqno+0x9/0x70 [ 1258.935182] ? security_file_permission+0xb1/0xe0 [ 1258.935203] do_sendfile+0x553/0x11e0 [ 1258.935222] ? do_pwritev+0x270/0x270 [ 1258.935236] ? wait_for_completion_io+0x270/0x270 [ 1258.935251] ? rcu_read_lock_any_held+0x75/0xa0 [ 1258.935261] ? vfs_write+0x354/0xb10 [ 1258.935278] __x64_sys_sendfile64+0x1d1/0x210 [ 1258.935292] ? __ia32_sys_sendfile+0x220/0x220 [ 1258.935307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1258.935319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1258.935333] do_syscall_64+0x33/0x40 [ 1258.935345] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1258.935353] RIP: 0033:0x7fad5ec00b19 [ 1258.935365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1258.935372] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1258.935386] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1258.935393] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1258.935400] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1258.935407] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1258.935414] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1258.959036] ------------[ cut here ]------------ [ 1258.961687] FAULT_INJECTION: forcing a failure. [ 1258.961687] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.961931] WARNING: CPU: 1 PID: 7876 at kernel/cgroup/cgroup.c:1395 cset_cgroup_from_root+0x1a8/0x2a0 [ 1258.961940] Modules linked in: [ 1258.962346] CPU: 0 PID: 7870 Comm: syz-executor.2 Not tainted 5.10.225 #1 [ 1258.962645] [ 1258.963004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1258.963351] CPU: 1 PID: 7876 Comm: syz-executor.6 Not tainted 5.10.225 #1 [ 1258.963710] Call Trace: [ 1258.963730] dump_stack+0x107/0x167 [ 1258.964066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1258.964395] should_fail.cold+0x5/0xa [ 1258.964756] RIP: 0010:cset_cgroup_from_root+0x1a8/0x2a0 [ 1258.964773] Code: 50 08 00 be ff ff ff ff 48 c7 c7 08 3a 02 85 e8 4e ae ad 02 31 ff 41 89 c4 89 c6 e8 d2 49 08 00 45 85 e4 75 07 e8 78 50 08 00 <0f> 0b e8 71 50 08 00 48 89 ea 83 e5 07 48 b8 00 00 00 00 00 fc ff [ 1258.965159] ? create_object.isra.0+0x3a/0xa20 [ 1258.965486] RSP: 0018:ffff88803abc7b20 EFLAGS: 00010012 [ 1258.965820] should_failslab+0x5/0x20 [ 1258.966127] RAX: 0000000000000759 RBX: ffff88800cf1e400 RCX: ffffc90009857000 [ 1258.966138] RDX: 0000000000040000 RSI: ffffffff81384eb8 RDI: 0000000000000005 [ 1258.966635] kmem_cache_alloc+0x5b/0x310 [ 1258.967069] RBP: ffffffff85676f3c R08: 0000000000000000 R09: 0000000000000003 [ 1258.967080] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 1258.967431] create_object.isra.0+0x3a/0xa20 [ 1258.967807] R13: ffff88800d3e4000 R14: ffff88800cca4800 R15: ffff88800ed4c9c0 [ 1258.968152] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1258.968167] __kmalloc+0x16e/0x390 [ 1258.968483] FS: 00007fa83f182700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1258.968890] alloc_pipe_info+0x1e5/0x590 [ 1258.969194] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1258.969518] ? __lock_acquire+0xbb1/0x5b00 [ 1258.969534] splice_direct_to_actor+0x774/0x980 [ 1258.969833] CR2: 0000001b2d721000 CR3: 000000000e6aa000 CR4: 0000000000350ee0 [ 1258.970214] ? _cond_resched+0x12/0x80 [ 1258.970603] Call Trace: [ 1258.970951] ? inode_security+0x107/0x140 [ 1258.971782] ? __warn+0xe2/0x1f0 [ 1258.972243] ? pipe_to_sendpage+0x380/0x380 [ 1258.972255] ? avc_policy_seqno+0x9/0x70 [ 1258.972265] ? selinux_file_permission+0x92/0x520 [ 1258.972279] ? do_splice_to+0x160/0x160 [ 1258.973186] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1258.974115] ? security_file_permission+0xb1/0xe0 [ 1258.975158] ? report_bug+0x1c1/0x210 [ 1258.975607] do_splice_direct+0x1c4/0x290 [ 1258.975622] ? splice_direct_to_actor+0x980/0x980 [ 1258.976511] ? handle_bug+0x41/0x90 [ 1258.977014] ? avc_policy_seqno+0x9/0x70 [ 1258.977033] ? security_file_permission+0xb1/0xe0 [ 1258.977934] ? exc_invalid_op+0x14/0x50 [ 1258.978429] do_sendfile+0x553/0x11e0 [ 1258.978452] ? do_pwritev+0x270/0x270 [ 1258.979351] ? asm_exc_invalid_op+0x12/0x20 [ 1258.979852] ? wait_for_completion_io+0x270/0x270 [ 1258.979869] ? rcu_read_lock_any_held+0x75/0xa0 [ 1258.980691] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1258.981568] ? vfs_write+0x354/0xb10 [ 1258.982030] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1258.982051] cgroup_path_ns_locked+0x6c/0x110 [ 1258.983088] __x64_sys_sendfile64+0x1d1/0x210 [ 1258.983453] proc_cpuset_show+0x19a/0x510 [ 1258.983472] proc_single_show+0x121/0x1f0 [ 1258.984468] ? __ia32_sys_sendfile+0x220/0x220 [ 1258.984931] traverse.part.0+0xd7/0x620 [ 1258.984953] seq_read_iter+0x934/0x12b0 [ 1258.986114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1258.986616] ? kmem_cache_free+0xa7/0x2d0 [ 1258.986632] ? __kasan_slab_free+0x122/0x160 [ 1258.987454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1258.987940] seq_read+0x3dd/0x5b0 [ 1258.987954] ? seq_read_iter+0x12b0/0x12b0 [ 1258.988802] do_syscall_64+0x33/0x40 [ 1258.990518] ? fsnotify_perm.part.0+0x22d/0x620 [ 1258.992229] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1258.992917] ? security_file_permission+0xb1/0xe0 [ 1258.994496] RIP: 0033:0x7fbe22abab19 [ 1258.995175] ? seq_read_iter+0x12b0/0x12b0 [ 1258.995191] vfs_read+0x228/0x620 [ 1258.996832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1258.997532] __x64_sys_pread64+0x201/0x260 [ 1258.998581] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 [ 1258.999625] ? ksys_pread64+0x1b0/0x1b0 [ 1258.999644] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.007737] ORIG_RAX: 0000000000000028 [ 1259.007746] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1259.007753] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1259.007760] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.007767] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1259.007775] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 [ 1259.009867] FAULT_INJECTION: forcing a failure. [ 1259.009867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1259.021486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.021501] do_syscall_64+0x33/0x40 [ 1259.021512] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.021527] RIP: 0033:0x7fa841c0cb19 [ 1259.022429] CPU: 0 PID: 7871 Comm: syz-executor.4 Not tainted 5.10.225 #1 [ 1259.022784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.023754] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.023759] Call Trace: [ 1259.023785] dump_stack+0x107/0x167 [ 1259.025321] RSP: 002b:00007fa83f182188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1259.025665] should_fail.cold+0x5/0xa [ 1259.026475] RAX: ffffffffffffffda RBX: 00007fa841d1ff60 RCX: 00007fa841c0cb19 [ 1259.027480] __alloc_pages_nodemask+0x182/0x600 [ 1259.028318] RDX: 0000000000000049 RSI: 0000000020000080 RDI: 0000000000000003 [ 1259.028992] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1259.029008] ? do_syscall_64+0x33/0x40 [ 1259.033183] RBP: 00007fa841c66f6d R08: 0000000000000000 R09: 0000000000000000 [ 1259.033730] ? __unwind_start+0x523/0x7e0 [ 1259.034907] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000 [ 1259.035359] alloc_pages_current+0x187/0x280 [ 1259.035375] ? lock_acquire+0x197/0x470 [ 1259.036993] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 [ 1259.037825] push_pipe+0x2b5/0x6d0 [ 1259.037844] iov_iter_get_pages+0x6b4/0xf40 [ 1259.038770] irq event stamp: 160 [ 1259.039577] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1259.041206] hardirqs last enabled at (159): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 1259.041735] bio_iov_iter_get_pages+0x22a/0x1200 [ 1259.043334] hardirqs last disabled at (160): [] _raw_spin_lock_irq+0x3e/0x40 [ 1259.043352] softirqs last enabled at (0): [] copy_process+0x16ed/0x7800 [ 1259.043959] ? bvec_alloc+0x17e/0x2f0 [ 1259.043982] ? bio_alloc_bioset+0x2a1/0x600 [ 1259.044770] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 1259.044791] ---[ end trace 4154f30edf6293a4 ]--- [ 1259.045756] ? bio_add_pc_page+0x100/0x100 [ 1259.045771] ? bvec_alloc+0x210/0x2f0 [ 1259.058446] FAULT_INJECTION: forcing a failure. [ 1259.058446] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.061068] ? iov_iter_npages+0x1fd/0xa70 [ 1259.061086] iomap_dio_bio_actor+0x77a/0xef0 [ 1259.061109] iomap_dio_actor+0x36f/0x560 [ 1259.109475] iomap_apply+0x289/0x810 [ 1259.109801] ? iomap_dio_rw+0x90/0x90 [ 1259.110136] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1259.110642] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1259.111103] ? mark_held_locks+0x9e/0xe0 [ 1259.111467] ? filemap_check_errors+0xa5/0x150 [ 1259.111867] __iomap_dio_rw+0x6cd/0x1110 [ 1259.112227] ? iomap_dio_rw+0x90/0x90 [ 1259.112570] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1259.112986] ? down_read+0x10f/0x430 [ 1259.113322] ? down_write+0x160/0x160 [ 1259.113657] iomap_dio_rw+0x31/0x90 [ 1259.113978] ext4_file_read_iter+0x2c7/0x4c0 [ 1259.114368] generic_file_splice_read+0x455/0x6d0 [ 1259.114787] ? pipe_to_user+0x170/0x170 [ 1259.115140] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.115550] ? security_file_permission+0xb1/0xe0 [ 1259.115969] ? pipe_to_user+0x170/0x170 [ 1259.116324] do_splice_to+0x10e/0x160 [ 1259.116658] splice_direct_to_actor+0x2fe/0x980 [ 1259.117081] ? pipe_to_sendpage+0x380/0x380 [ 1259.117463] ? do_splice_to+0x160/0x160 [ 1259.117810] ? security_file_permission+0xb1/0xe0 [ 1259.118235] do_splice_direct+0x1c4/0x290 [ 1259.118596] ? splice_direct_to_actor+0x980/0x980 [ 1259.119013] ? avc_policy_seqno+0x9/0x70 [ 1259.119381] ? security_file_permission+0xb1/0xe0 [ 1259.119806] do_sendfile+0x553/0x11e0 [ 1259.120147] ? do_pwritev+0x270/0x270 [ 1259.120482] ? wait_for_completion_io+0x270/0x270 [ 1259.124927] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.125332] ? vfs_write+0x354/0xb10 [ 1259.125659] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.126048] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.126449] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.126901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.127350] do_syscall_64+0x33/0x40 [ 1259.127672] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.128113] RIP: 0033:0x7fb1ac5e0b19 [ 1259.128442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.130027] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.130688] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1259.131306] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1259.131920] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.132538] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1259.133169] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1259.133806] CPU: 1 PID: 7874 Comm: syz-executor.5 Tainted: G W 5.10.225 #1 [ 1259.134540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.135491] Call Trace: [ 1259.135928] dump_stack+0x107/0x167 [ 1259.136540] should_fail.cold+0x5/0xa [ 1259.137346] ? alloc_pipe_info+0x10a/0x590 [ 1259.138068] should_failslab+0x5/0x20 [ 1259.138714] kmem_cache_alloc_trace+0x55/0x320 [ 1259.139487] alloc_pipe_info+0x10a/0x590 21:09:39 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 6) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:09:39 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = shmget(0x3, 0x4000, 0x4, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000080)=""/221) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:39 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x1f, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb, 0x20000}, 0xc) 21:09:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 53) 21:09:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="b9490b9198bbce42e15db543f8ec81c00325253089d8001eb4b2e7a20e8e369f9831a112c70fd97e0916605b1d2efd67bc29926b3a3f5dca4c2ebacbe35561cb49358d2694fe266edcc713ccb98422c56694bc61e67ac064abab39e6b96959050d16", 0x62}, {&(0x7f0000000080)}, {&(0x7f0000000180)="b6bc0dbe16a812d01f87fb4ad07939320dbd86c7e66b426314403f8df0729d1716e7752ca021e386d3f21cbd2a8ac5373c7d54fc89b510b38338750cdf3706cea3c09a", 0x43}, {&(0x7f00000002c0)="16dca69a647ed1042957e7761daef26876ac73874fc47b434637d2df8288579fc4e7c17acda2ff959f7fcb2ddcb135b2c0159c1287552c243655a56ac86f5c0140e40104bf2c2223a51c77523b264d075166ceb4652cd87bb8d39860a24b15f9708e4d927466bdad8173de1abbd1c05e56ca290cad1f7ff8cfbc9d0f759c464aad89e8904129ea529b84d5bcb87ff3c8c2fce5e3fbc0ce", 0x97}], 0x4, 0x6) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 9) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 1) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:09:39 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cpuset\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) [ 1259.140170] ? __lock_acquire+0xbb1/0x5b00 [ 1259.143027] splice_direct_to_actor+0x774/0x980 [ 1259.143534] ? _cond_resched+0x12/0x80 [ 1259.143994] ? inode_security+0x107/0x140 [ 1259.145048] ? pipe_to_sendpage+0x380/0x380 [ 1259.146177] ? avc_policy_seqno+0x9/0x70 [ 1259.147122] ? selinux_file_permission+0x92/0x520 [ 1259.148244] ? do_splice_to+0x160/0x160 [ 1259.149168] ? security_file_permission+0xb1/0xe0 [ 1259.150291] do_splice_direct+0x1c4/0x290 [ 1259.151244] ? splice_direct_to_actor+0x980/0x980 [ 1259.152365] ? avc_policy_seqno+0x9/0x70 [ 1259.153324] ? security_file_permission+0xb1/0xe0 [ 1259.154450] do_sendfile+0x553/0x11e0 [ 1259.155333] ? do_pwritev+0x270/0x270 [ 1259.156219] ? wait_for_completion_io+0x270/0x270 [ 1259.157346] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.158417] ? vfs_write+0x354/0xb10 [ 1259.159280] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.160319] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.161379] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.162596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.163791] do_syscall_64+0x33/0x40 [ 1259.164646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.165842] RIP: 0033:0x7f82add6db19 [ 1259.166703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.171004] RSP: 002b:00007f82ab2e3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.172772] RAX: ffffffffffffffda RBX: 00007f82ade80f60 RCX: 00007f82add6db19 [ 1259.174426] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 21:09:39 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x8, 0xff}, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x6, 0xff, 0x7f, 0x0, 0xcd, 0x8, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x9, 0x7, 0xd3d5848fc450f141, 0x0, 0x80000000, 0x80, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r0, 0xe) preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/171, 0xab}, {&(0x7f00000002c0)=""/150, 0x96}, {&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/229, 0xe5}, {&(0x7f0000000540)=""/76, 0x4c}], 0x5, 0xffff, 0x8000) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100), &(0x7f0000000140)={'U+', 0x6}, 0x16, 0x0) [ 1259.176079] RBP: 00007f82ab2e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.185087] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1259.185785] R13: 00007ffea2effc0f R14: 00007f82ab2e3300 R15: 0000000000022000 [ 1259.204381] ------------[ cut here ]------------ [ 1259.204420] WARNING: CPU: 1 PID: 7876 at kernel/cgroup/cgroup.c:1395 cset_cgroup_from_root+0x1a8/0x2a0 [ 1259.204427] Modules linked in: 21:09:39 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x80, 0x8, 0xb3, 0xe3, 0x0, 0x2, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x10000, 0x1ff, 0x9, 0x0, 0x1722, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x3) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x4, 0x800, 0x2}) 21:09:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 2) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 21:09:40 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x4002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) sendmsg$nl_generic(r0, &(0x7f0000000880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x6ec}, 0x1, 0x0, 0x0, 0x24008045}, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000080)=""/73, 0x49, 0x5) 21:09:40 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = dup(r0) openat2(r2, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x484000, 0x2, 0x1a}, 0x18) [ 1259.204459] CPU: 1 PID: 7876 Comm: syz-executor.6 Tainted: G W 5.10.225 #1 [ 1259.204475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 21:09:40 executing program 0: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000140)={0x3c, 0x30, 0x16, 0x9, 0x6, 0x116f, 0x4, 0x10b, 0x1}) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000400)="e1e83229229f92ad8c36697b978d2bc7ca3d418f2025a57bcd0033b839885103445cd0c2d818f999b7da2c3862a7ae15c585ac8dc54395933994781ac709a94de5692bd2d2c0aa77f6d484bb86a0c902741b34244d094566adfcb52cdb377b40ccf4e7584ec7401b93206e376b01003cf7eec209eb1b4d59aa282edcb4d4053ed49942547b5b171fadacf4ecb82e142e8d919c408f7b01308812c17b4ae88b4bb957a9982da8ffe5cc45ae3bc6bc4f970f5e8e63d69ac00847", 0xb9, 0xf30}, {&(0x7f0000000180)="73ae27eb53925ee3e3771cc53fd2766d554f5aefdbf819d020eecf41d5f4d31cfa74631ea22ec09ee77a495acb2476bff3d906449fd45a560721f1d53a7c3255701b60375824271771cf28813d197701db823a4617b7e9a3c5688d0f87a120705eda76774bf7429f808ec4d92e0058a20c60b67d2e703de93ba2036392f39cbf67dd7ccfef", 0x85}, {&(0x7f00000002c0)="882b62dcdcce312c3e09f68f725fa4f3f1500efc922e8655c22751c2cf5f574be0d0336ae1a9c4ab089fa33884574e5a337251b2691669a968609e6148f324f0ed81dedd0d88949dacd6bd0e1d63585eb97e740e896b7dc5cf2dedc48c4e39ee539d654035d281a0b5cb7f61649f7345e5182e1e755347a3dd965ba8af90e76c3c1594f7e56563429e49d9fdfcf59d5ac50824c3700d4e40b3b5924dcb4d9d5ff7b637c915480f9016ba6169b31d3b82ae16f614ee", 0xb5, 0x8}], 0xa0000a, &(0x7f0000000780)=ANY=[@ANYBLOB="6d61703d61636f726e2c6d61703d6f66662c646d6f64653d3078303030303030cf704aced3e4c5ea2d99303030306366303030302c6d61703d6f66662c736d61636b66736861743d2c657569643c5de322da892ea2ff56b3fb81005002e888c3bc051927c768e1670a175fa72ded3cf2f88fea969435d342fd86ba9e518137fd01d30c9e2b51a3ab95c466e3bcc5e075486a0ad550033d742fa032fbb10f1dd3482be3a204b7b2fb4face7c9db60182a0599f641a9cad636e423df21af5d7957bf2d4a5be51c59ca8f3cf8f9a6df424d60d5d90ca1a91e2b4677d3fa7b3c1a761802ebf277ba173c4be01da1b26d118bbf86dd0277890f2625b8a7eb03ecbddcfa7868a0d0e4da3a0df23b152639ec65380f4eeb6a2035c85c99d424d46f675b95c3721a7f9d8e63218fcce2df2e18a219216ce64624d526717703403117a114dbf4831765fb08ce06b007a44cca6eb923cbcfda6345f3a18d05b056ac23d68f1b7c6e4cf312f237381a183197", @ANYRESDEC, @ANYBLOB="2c66736d616769633d3078303030303030303030303030383030302c6f626a5f747970653d6e65742f726f75f46500874d6cbaea5d3a015352ebad2e1774c11991db40b1425cd0dfec6064372436767ee6713954b874876a8603c08e34338091ec85ef2c00"]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000540)) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x40, 0x8, 0x98, 0x0, 0x9, 0x300, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000100), 0x4}, 0x1d09c, 0x18, 0xbb5, 0x6, 0x5, 0xfffffffc, 0x2, 0x0, 0x3, 0x0, 0x200}, 0xffffffffffffffff, 0x9, r1, 0xe) [ 1259.204503] RIP: 0010:cset_cgroup_from_root+0x1a8/0x2a0 [ 1259.204535] Code: 50 08 00 be ff ff ff ff 48 c7 c7 08 3a 02 85 e8 4e ae ad 02 31 ff 41 89 c4 89 c6 e8 d2 49 08 00 45 85 e4 75 07 e8 78 50 08 00 <0f> 0b e8 71 50 08 00 48 89 ea 83 e5 07 48 b8 00 00 00 00 00 fc ff [ 1259.204550] RSP: 0018:ffff88803abc7b20 EFLAGS: 00010012 [ 1259.204574] RAX: 000000000000015f RBX: ffff88800cf1e400 RCX: ffffc90009857000 [ 1259.204592] RDX: 0000000000040000 RSI: ffffffff81384eb8 RDI: 0000000000000005 [ 1259.204610] RBP: ffffffff85676f3c R08: 0000000000000000 R09: 0000000000000003 [ 1259.204627] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 [ 1259.204646] R13: ffff88800d3e4000 R14: ffff88800cca4800 R15: ffff88800ed4c680 [ 1259.204671] FS: 00007fa83f182700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1259.204690] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1259.204716] CR2: 00007fbe2000f718 CR3: 000000000e6aa000 CR4: 0000000000350ee0 [ 1259.204725] Call Trace: [ 1259.204751] ? __warn+0xe2/0x1f0 [ 1259.204779] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1259.204804] ? report_bug+0x1c1/0x210 [ 1259.204833] ? handle_bug+0x41/0x90 [ 1259.204860] ? exc_invalid_op+0x14/0x50 [ 1259.204885] ? asm_exc_invalid_op+0x12/0x20 [ 1259.204924] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1259.204952] ? cset_cgroup_from_root+0x1a8/0x2a0 [ 1259.204988] cgroup_path_ns_locked+0x6c/0x110 [ 1259.205019] proc_cpuset_show+0x19a/0x510 [ 1259.205051] proc_single_show+0x121/0x1f0 [ 1259.205079] traverse.part.0+0xd7/0x620 [ 1259.205115] seq_read_iter+0x934/0x12b0 [ 1259.205149] ? kmem_cache_free+0xa7/0x2d0 [ 1259.205181] ? __kasan_slab_free+0x122/0x160 [ 1259.205210] seq_read+0x3dd/0x5b0 [ 1259.205238] ? seq_read_iter+0x12b0/0x12b0 21:09:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x1, 0xffffffffffffffff, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x7f) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1259.205279] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.205316] ? security_file_permission+0xb1/0xe0 [ 1259.205348] ? seq_read_iter+0x12b0/0x12b0 [ 1259.205376] vfs_read+0x228/0x620 [ 1259.205411] __x64_sys_pread64+0x201/0x260 [ 1259.205441] ? ksys_pread64+0x1b0/0x1b0 [ 1259.205475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.205504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.205532] do_syscall_64+0x33/0x40 21:09:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 1259.205560] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.205576] RIP: 0033:0x7fa841c0cb19 [ 1259.205607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.205622] RSP: 002b:00007fa83f182188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1259.205650] RAX: ffffffffffffffda RBX: 00007fa841d1ff60 RCX: 00007fa841c0cb19 [ 1259.205668] RDX: 0000000000000049 RSI: 0000000020000080 RDI: 0000000000000003 [ 1259.205685] RBP: 00007fa841c66f6d R08: 0000000000000000 R09: 0000000000000000 [ 1259.205702] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000 [ 1259.205721] R13: 00007ffc747a7c6f R14: 00007fa83f182300 R15: 0000000000022000 [ 1259.205750] irq event stamp: 726 [ 1259.205781] hardirqs last enabled at (725): [] _raw_spin_unlock_irqrestore+0x38/0x40 [ 1259.205810] hardirqs last disabled at (726): [] _raw_spin_lock_irq+0x3e/0x40 [ 1259.205842] softirqs last enabled at (594): [] asm_call_irq_on_stack+0x12/0x20 [ 1259.205873] softirqs last disabled at (165): [] asm_call_irq_on_stack+0x12/0x20 [ 1259.205884] ---[ end trace 4154f30edf6293a5 ]--- [ 1259.254764] FAULT_INJECTION: forcing a failure. [ 1259.254764] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.254783] CPU: 1 PID: 7893 Comm: syz-executor.5 Tainted: G W 5.10.225 #1 [ 1259.254789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.254793] Call Trace: [ 1259.254805] dump_stack+0x107/0x167 [ 1259.254818] should_fail.cold+0x5/0xa [ 1259.254830] ? create_object.isra.0+0x3a/0xa20 [ 1259.254843] should_failslab+0x5/0x20 [ 1259.254854] kmem_cache_alloc+0x5b/0x310 [ 1259.254869] create_object.isra.0+0x3a/0xa20 [ 1259.254881] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1259.254896] kmem_cache_alloc_trace+0x151/0x320 [ 1259.254912] alloc_pipe_info+0x10a/0x590 [ 1259.254923] ? __lock_acquire+0xbb1/0x5b00 [ 1259.254937] splice_direct_to_actor+0x774/0x980 [ 1259.254950] ? _cond_resched+0x12/0x80 [ 1259.254960] ? inode_security+0x107/0x140 [ 1259.254970] ? pipe_to_sendpage+0x380/0x380 [ 1259.254981] ? avc_policy_seqno+0x9/0x70 [ 1259.254991] ? selinux_file_permission+0x92/0x520 [ 1259.255003] ? do_splice_to+0x160/0x160 [ 1259.255016] ? security_file_permission+0xb1/0xe0 [ 1259.255032] do_splice_direct+0x1c4/0x290 [ 1259.255043] ? splice_direct_to_actor+0x980/0x980 [ 1259.255053] ? avc_policy_seqno+0x9/0x70 [ 1259.255070] ? security_file_permission+0xb1/0xe0 [ 1259.255091] do_sendfile+0x553/0x11e0 [ 1259.255113] ? do_pwritev+0x270/0x270 [ 1259.255126] ? wait_for_completion_io+0x270/0x270 [ 1259.255139] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.255150] ? vfs_write+0x354/0xb10 [ 1259.255166] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.255179] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.255193] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.255204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.255217] do_syscall_64+0x33/0x40 [ 1259.255228] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.255236] RIP: 0033:0x7f82add6db19 [ 1259.255247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.255253] RSP: 002b:00007f82ab2e3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.255265] RAX: ffffffffffffffda RBX: 00007f82ade80f60 RCX: 00007f82add6db19 [ 1259.255272] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1259.255279] RBP: 00007f82ab2e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.255286] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1259.255293] R13: 00007ffea2effc0f R14: 00007f82ab2e3300 R15: 0000000000022000 21:09:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 7) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) 21:09:40 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x3000) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000000c0)=""/30) pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000000)=[r1, r2]}, 0x2) [ 1259.708496] FAULT_INJECTION: forcing a failure. [ 1259.708496] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.709597] CPU: 0 PID: 7920 Comm: syz-executor.2 Tainted: G W 5.10.225 #1 [ 1259.710311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.711035] Call Trace: [ 1259.711276] dump_stack+0x107/0x167 [ 1259.711601] should_fail.cold+0x5/0xa [ 1259.711942] ? __iomap_dio_rw+0x1ee/0x1110 [ 1259.712322] should_failslab+0x5/0x20 [ 1259.712659] kmem_cache_alloc_trace+0x55/0x320 [ 1259.717091] __iomap_dio_rw+0x1ee/0x1110 [ 1259.717455] ? lock_release+0x680/0x680 [ 1259.717811] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1259.718221] ? down_read+0x10f/0x430 [ 1259.718550] ? down_write+0x160/0x160 [ 1259.718889] iomap_dio_rw+0x31/0x90 [ 1259.719213] ext4_file_read_iter+0x2c7/0x4c0 [ 1259.719602] generic_file_splice_read+0x455/0x6d0 [ 1259.720024] ? pipe_to_user+0x170/0x170 [ 1259.720380] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.720812] ? security_file_permission+0xb1/0xe0 [ 1259.721235] ? pipe_to_user+0x170/0x170 [ 1259.721583] do_splice_to+0x10e/0x160 [ 1259.721921] splice_direct_to_actor+0x2fe/0x980 [ 1259.722333] ? pipe_to_sendpage+0x380/0x380 [ 1259.722714] ? do_splice_to+0x160/0x160 [ 1259.723064] ? security_file_permission+0xb1/0xe0 [ 1259.723492] do_splice_direct+0x1c4/0x290 [ 1259.723854] ? splice_direct_to_actor+0x980/0x980 [ 1259.724275] ? avc_policy_seqno+0x9/0x70 [ 1259.724636] ? security_file_permission+0xb1/0xe0 [ 1259.725083] do_sendfile+0x553/0x11e0 [ 1259.725425] ? do_pwritev+0x270/0x270 [ 1259.725762] ? wait_for_completion_io+0x270/0x270 [ 1259.726187] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.726592] ? vfs_write+0x354/0xb10 [ 1259.726927] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.727320] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.727721] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.728178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.728630] do_syscall_64+0x33/0x40 [ 1259.728985] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.729432] RIP: 0033:0x7fbe22abab19 [ 1259.729758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.731348] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.732007] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1259.732625] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1259.733858] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.735099] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1259.736342] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 21:09:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 10) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) close(r4) 21:09:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x20, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0xc, 0x204, 0x402}) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x5, 0xfff}) pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 21:09:40 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@dev, @loopback}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r1, r0, 0x0, 0x100000001) (fail_nth: 54) 21:09:40 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000100)=""/80, 0x50, 0x4) 21:09:40 executing program 7: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x7, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000080)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000000c0)={0x9, 0x204, 0x402}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000140)={0x6, 0xff}) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x2, 0x8, 0xfffd}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000001c0)={0x1ff, 0x9, 0x52}) 21:09:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x101801, 0x0) r2 = signalfd4(r0, &(0x7f0000000140)={[0x7]}, 0x8, 0x100000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@dev, @loopback}, &(0x7f0000000300)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendfile(r3, r1, 0x0, 0x100000001) (fail_nth: 8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f0000000100)) [ 1259.792477] FAULT_INJECTION: forcing a failure. [ 1259.792477] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.797732] CPU: 1 PID: 7927 Comm: syz-executor.3 Tainted: G W 5.10.225 #1 [ 1259.798413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.799104] Call Trace: [ 1259.799335] dump_stack+0x107/0x167 [ 1259.799648] should_fail.cold+0x5/0xa [ 1259.799974] ? kmem_cache_alloc+0x2a6/0x310 [ 1259.800343] ? create_object.isra.0+0x3a/0xa20 [ 1259.800767] should_failslab+0x5/0x20 [ 1259.801097] kmem_cache_alloc+0x5b/0x310 [ 1259.801446] ? mempool_alloc+0x155/0x360 [ 1259.801792] create_object.isra.0+0x3a/0xa20 [ 1259.802166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1259.802598] kmem_cache_alloc+0x159/0x310 [ 1259.802955] bvec_alloc+0x148/0x2f0 [ 1259.803269] bio_alloc_bioset+0x40a/0x600 [ 1259.803622] ? bvec_alloc+0x2f0/0x2f0 [ 1259.803948] ? iov_iter_npages+0x1fd/0xa70 [ 1259.804313] iomap_dio_bio_actor+0x518/0xef0 [ 1259.804699] iomap_dio_actor+0x36f/0x560 [ 1259.805079] iomap_apply+0x289/0x810 [ 1259.805398] ? iomap_dio_rw+0x90/0x90 [ 1259.805725] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1259.806215] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1259.806802] ? mark_held_locks+0x9e/0xe0 [ 1259.807683] ? filemap_check_errors+0xa5/0x150 [ 1259.808565] __iomap_dio_rw+0x6cd/0x1110 [ 1259.809456] ? iomap_dio_rw+0x90/0x90 [ 1259.810298] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1259.811294] ? down_read+0x10f/0x430 [ 1259.812088] ? down_write+0x160/0x160 [ 1259.812945] iomap_dio_rw+0x31/0x90 [ 1259.813731] ext4_file_read_iter+0x2c7/0x4c0 [ 1259.814684] generic_file_splice_read+0x455/0x6d0 [ 1259.815742] ? pipe_to_user+0x170/0x170 [ 1259.816611] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.817626] ? security_file_permission+0xb1/0xe0 [ 1259.818664] ? pipe_to_user+0x170/0x170 [ 1259.819519] do_splice_to+0x10e/0x160 [ 1259.820340] splice_direct_to_actor+0x2fe/0x980 [ 1259.821351] ? pipe_to_sendpage+0x380/0x380 [ 1259.822282] ? do_splice_to+0x160/0x160 [ 1259.823141] ? security_file_permission+0xb1/0xe0 [ 1259.824189] do_splice_direct+0x1c4/0x290 [ 1259.825077] ? splice_direct_to_actor+0x980/0x980 [ 1259.825891] ? avc_policy_seqno+0x9/0x70 [ 1259.826584] ? security_file_permission+0xb1/0xe0 [ 1259.827412] do_sendfile+0x553/0x11e0 [ 1259.828064] ? do_pwritev+0x270/0x270 [ 1259.828714] ? wait_for_completion_io+0x270/0x270 [ 1259.829540] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.830328] ? vfs_write+0x354/0xb10 [ 1259.830963] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.831731] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.832532] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.833085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.833524] do_syscall_64+0x33/0x40 [ 1259.833842] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.834276] RIP: 0033:0x7fad5ec00b19 [ 1259.834594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.836126] RSP: 002b:00007fad5c176188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.836806] RAX: ffffffffffffffda RBX: 00007fad5ed13f60 RCX: 00007fad5ec00b19 [ 1259.837404] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1259.838002] RBP: 00007fad5c1761d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.838600] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1259.839198] R13: 00007ffff88f06df R14: 00007fad5c176300 R15: 0000000000022000 [ 1259.857102] FAULT_INJECTION: forcing a failure. [ 1259.857102] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.858314] CPU: 1 PID: 7929 Comm: syz-executor.4 Tainted: G W 5.10.225 #1 [ 1259.859260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.860216] Call Trace: [ 1259.860523] dump_stack+0x107/0x167 [ 1259.864951] should_fail.cold+0x5/0xa [ 1259.869103] ? create_object.isra.0+0x3a/0xa20 [ 1259.869625] should_failslab+0x5/0x20 [ 1259.870056] kmem_cache_alloc+0x5b/0x310 [ 1259.870529] create_object.isra.0+0x3a/0xa20 [ 1259.871042] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1259.871635] kmem_cache_alloc+0x159/0x310 [ 1259.872121] ? mempool_free_pages+0x20/0x20 [ 1259.872629] mempool_alloc+0x148/0x360 [ 1259.873098] ? mempool_resize+0x7d0/0x7d0 [ 1259.873584] ? lock_downgrade+0x6d0/0x6d0 [ 1259.874059] ? ext4_map_blocks+0x87c/0x1910 [ 1259.875086] bio_alloc_bioset+0x36e/0x600 [ 1259.875578] ? bvec_alloc+0x2f0/0x2f0 [ 1259.876037] ? iov_iter_npages+0x1fd/0xa70 [ 1259.876534] iomap_dio_bio_actor+0x518/0xef0 [ 1259.877086] iomap_dio_actor+0x36f/0x560 [ 1259.877574] iomap_apply+0x289/0x810 [ 1259.878023] ? iomap_dio_rw+0x90/0x90 [ 1259.878468] ? trace_event_raw_event_iomap_apply+0x430/0x430 21:09:40 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r0, &(0x7f0000000080)=""/73, 0x49, 0x5) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000180)=0x2) 21:09:40 executing program 1: shmat(0x0, &(0x7f0000866000/0x4000)=nil, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0xfffffffffffffda6) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$SG_IO(r3, 0x2285, &(0x7f00000001c0)={0x0, 0xfffffffffffffffc, 0xeb, 0x3, @buffer={0x0, 0xd4, &(0x7f0000000080)=""/212}, &(0x7f00000003c0)="2b9933dc0a0b7947b4e6935bc5d12c8c16de0cc58754010000181ffb004dd855a1620bc2b219df4f4e852fb9b3265659bb208336b593306d9d152430c8184639cce001cec9587bd99379b859bacaaa9416a30e0c9d00009b845f501e515e6152f7181452ff319bbe5d1073a544a80776911d6470582940301e2c461a7140e8cf6f89f3f5470d79959dfdd33de0eccc13d58d0dd0e77389aa0382f72a128a166772e1c78e6561e3c6d5b31603e561b45c959da546bf3f1a05b2b7f4c24f2741e8b0aa0b3e2939b4821a73ff3a88a8d1ff0baa405425fbd38cae287212063df07ea2d04dcfad3aab45636885", &(0x7f0000000000)=""/6, 0x0, 0x10010, 0x1, &(0x7f0000000180)}) fstat(r0, &(0x7f0000000300)) [ 1259.879165] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1259.879177] ? mark_held_locks+0x9e/0xe0 [ 1259.879198] ? filemap_check_errors+0xa5/0x150 [ 1259.879222] __iomap_dio_rw+0x6cd/0x1110 [ 1259.879233] ? iomap_dio_rw+0x90/0x90 [ 1259.879259] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1259.879279] ? down_read+0x10f/0x430 [ 1259.879292] ? down_write+0x160/0x160 [ 1259.879308] iomap_dio_rw+0x31/0x90 [ 1259.879321] ext4_file_read_iter+0x2c7/0x4c0 [ 1259.879336] generic_file_splice_read+0x455/0x6d0 [ 1259.879348] ? pipe_to_user+0x170/0x170 [ 1259.879367] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.879383] ? security_file_permission+0xb1/0xe0 [ 1259.879397] ? pipe_to_user+0x170/0x170 [ 1259.879409] do_splice_to+0x10e/0x160 [ 1259.879423] splice_direct_to_actor+0x2fe/0x980 [ 1259.879438] ? pipe_to_sendpage+0x380/0x380 [ 1259.879452] ? do_splice_to+0x160/0x160 [ 1259.879466] ? security_file_permission+0xb1/0xe0 [ 1259.879483] do_splice_direct+0x1c4/0x290 [ 1259.879495] ? splice_direct_to_actor+0x980/0x980 [ 1259.879505] ? avc_policy_seqno+0x9/0x70 [ 1259.879522] ? security_file_permission+0xb1/0xe0 [ 1259.879540] do_sendfile+0x553/0x11e0 [ 1259.879560] ? do_pwritev+0x270/0x270 [ 1259.879574] ? wait_for_completion_io+0x270/0x270 [ 1259.879587] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.879598] ? vfs_write+0x354/0xb10 [ 1259.879614] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.879627] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.879642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.879653] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.879667] do_syscall_64+0x33/0x40 [ 1259.879678] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.879686] RIP: 0033:0x7fb1ac5e0b19 [ 1259.879697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.879704] RSP: 002b:00007fb1a9b56188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.879717] RAX: ffffffffffffffda RBX: 00007fb1ac6f3f60 RCX: 00007fb1ac5e0b19 [ 1259.879724] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1259.879731] RBP: 00007fb1a9b561d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.879738] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000002 [ 1259.879745] R13: 00007ffdc57c633f R14: 00007fb1a9b56300 R15: 0000000000022000 [ 1259.947026] FAULT_INJECTION: forcing a failure. [ 1259.947026] name failslab, interval 1, probability 0, space 0, times 0 [ 1259.947040] CPU: 1 PID: 7942 Comm: syz-executor.2 Tainted: G W 5.10.225 #1 [ 1259.947047] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1259.947051] Call Trace: [ 1259.947065] dump_stack+0x107/0x167 [ 1259.947078] should_fail.cold+0x5/0xa [ 1259.947091] ? create_object.isra.0+0x3a/0xa20 [ 1259.947109] should_failslab+0x5/0x20 [ 1259.947121] kmem_cache_alloc+0x5b/0x310 [ 1259.947135] ? ext4_sb_block_valid+0x382/0x680 [ 1259.947150] create_object.isra.0+0x3a/0xa20 [ 1259.947162] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1259.947179] kmem_cache_alloc+0x159/0x310 [ 1259.947194] ? mempool_free_pages+0x20/0x20 [ 1259.947204] mempool_alloc+0x148/0x360 [ 1259.947220] ? mempool_resize+0x7d0/0x7d0 [ 1259.947231] ? lock_downgrade+0x6d0/0x6d0 [ 1259.947242] ? ext4_map_blocks+0x87c/0x1910 [ 1259.947269] bio_alloc_bioset+0x36e/0x600 [ 1259.947282] ? bvec_alloc+0x2f0/0x2f0 [ 1259.947295] ? iov_iter_npages+0x1fd/0xa70 [ 1259.947312] iomap_dio_bio_actor+0x518/0xef0 [ 1259.947336] iomap_dio_actor+0x36f/0x560 [ 1259.947352] iomap_apply+0x289/0x810 [ 1259.947364] ? iomap_dio_rw+0x90/0x90 [ 1259.947378] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 1259.947396] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1259.947407] ? mark_held_locks+0x9e/0xe0 [ 1259.947427] ? filemap_check_errors+0xa5/0x150 [ 1259.947442] __iomap_dio_rw+0x6cd/0x1110 [ 1259.947453] ? iomap_dio_rw+0x90/0x90 [ 1259.947477] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1259.947498] ? down_read+0x10f/0x430 [ 1259.947510] ? down_write+0x160/0x160 [ 1259.947527] iomap_dio_rw+0x31/0x90 [ 1259.947541] ext4_file_read_iter+0x2c7/0x4c0 [ 1259.947557] generic_file_splice_read+0x455/0x6d0 [ 1259.947569] ? pipe_to_user+0x170/0x170 [ 1259.947588] ? fsnotify_perm.part.0+0x22d/0x620 [ 1259.947607] ? security_file_permission+0xb1/0xe0 [ 1259.947623] ? pipe_to_user+0x170/0x170 [ 1259.947638] do_splice_to+0x10e/0x160 [ 1259.947655] splice_direct_to_actor+0x2fe/0x980 [ 1259.947673] ? pipe_to_sendpage+0x380/0x380 [ 1259.947690] ? do_splice_to+0x160/0x160 [ 1259.947706] ? security_file_permission+0xb1/0xe0 [ 1259.947726] do_splice_direct+0x1c4/0x290 [ 1259.947741] ? splice_direct_to_actor+0x980/0x980 [ 1259.947752] ? avc_policy_seqno+0x9/0x70 [ 1259.947773] ? security_file_permission+0xb1/0xe0 [ 1259.947795] do_sendfile+0x553/0x11e0 [ 1259.947818] ? do_pwritev+0x270/0x270 [ 1259.947834] ? wait_for_completion_io+0x270/0x270 [ 1259.947850] ? rcu_read_lock_any_held+0x75/0xa0 [ 1259.947860] ? vfs_write+0x354/0xb10 [ 1259.947877] __x64_sys_sendfile64+0x1d1/0x210 [ 1259.947891] ? __ia32_sys_sendfile+0x220/0x220 [ 1259.947906] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1259.947917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1259.947930] do_syscall_64+0x33/0x40 [ 1259.947942] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1259.947950] RIP: 0033:0x7fbe22abab19 [ 1259.947961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1259.947968] RSP: 002b:00007fbe20030188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1259.947981] RAX: ffffffffffffffda RBX: 00007fbe22bcdf60 RCX: 00007fbe22abab19 [ 1259.947988] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 1259.947995] RBP: 00007fbe200301d0 R08: 0000000000000000 R09: 0000000000000000 [ 1259.948002] R10: 0000000100000001 R11: 0000000000000246 R12: 0000000000000001 [ 1259.948009] R13: 00007ffc56b4c92f R14: 00007fbe20030300 R15: 0000000000022000 VM DIAGNOSIS: 21:09:39 Registers: info registers vcpu 0 RAX=000000000000fa5e RBX=0000000000000001 RCX=ffffc90003827000 RDX=0000000000040000 RSI=ffffffff8129b721 RDI=0000000000000001 RBP=0000000000000200 RSP=ffff88801b15f0a0 R8 =0000000000000000 R9 =ffffffff868686e7 R10=0000000000000000 R11=0000000000000001 R12=0000000000000065 R13=0000000000000216 R14=ffff88804a113480 R15=0000000000000000 RIP=ffffffff8129b723 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb1a9b56700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fbe2002ff78 CR3=000000001abce000 CR4=00350ef0 DR0=0000000020000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000ff0000000000000000ff000000 XMM01=6e657300656c6966646e657300706f64 XMM02=ff00000100000000000000ff00000000 XMM03=00007fb1ac6c77c800007fb1ac6c77c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000000005b RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822daba1 RDI=ffffffff879ef1c0 RBP=ffffffff879ef180 RSP=ffff88803abc74c8 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=000000000000005b R13=000000000000005b R14=ffffffff879ef180 R15=dffffc0000000000 RIP=ffffffff822dabf8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa83f182700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d721000 CR3=000000000e6aa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000